Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Excerpt

This hands-on exercise shows how to find non-compliant resources in AWS Config and how to whitelist them for Configreview IAM Access Analyzer Findings and take actions with those findings.

Part 1 – Remove Outside Access to a Resource

...

We have prepared the cu-training AWS account with roles named example-role-NETID, one role for each of the training participants.

...

  1. Repeat the steps in Part 1B to find the Finding about "your" example-role-NETID Role.
  2. Drill into the finding details.
  3. Click on Rescan to tell Access Analyzer to review the Finding and check whether the access still exists.
    • If the access remains unchanged, so will the Finding details.
    • If you have successfully deleted "your" example-role-NETID Role, or changed the trust policy so that it no longer trusts the bad-actor Role, then the status of the Finding will be changed to (tick) ResolvedResolved.

Part 2 – Archive a Finding

...

In this exercise, you will use Access Analyzer to archive a finding allowing public access to an S3 bucket. This indicates one-time review and approval for that access.

We have prepared the cu-training AWS account with S3 buckets named my-public-web-site-NETID, one bucket for each participant. We used these same publicly readble buckets readable buckets in AWS Config - Hands-on Exercise

Part 2A – Login an get to Access Analyzer

...

In this exercise scenario, we have decided that it is indeed our intention that my-public-web-site-NETID be publicly readable. Therefore we just need to tell Access Analyzer that this is intended access.

  1. Under Nest Next steps click on the Archive button.
    • The status of the Finding will turn to Archived.
  2. If you wish, you can now navigate back to the main Access analyzer page , and click on the Archived tab to search for your S3 bucket and confirm that the related finding is indeed archived.

...