Remediating Cloud Entitlements' Risks from PAM36020 minutes to read
With the Cloud Entitlements feature in PAM360, you can identify and address identity-related risks within your AWS account directly from the interface with ease. Any detected risks can be mitigated through a streamlined remediation process, and previously remediated risks can be effortlessly restored using the Revert functionality if needed. Refer to the section below for detailed steps on how to remediate or revert PAM360-defined risks within your AWS account identities. By the end of this document, you will have a clear understanding of the steps involved in effectively remediating identity risks in your AWS account. Note: Excessive Privileges and Shadow Admins risks in your AWS account can be remediated or reverted directly from the PAM360 interface. Whereas the remaining pre-defined risks can be remediated from the AWS interface using the detailed steps provided below. 1. Remediating Cloud Entitlements' RisksThe risk remediation options for identity - such as Users, User Groups, and Roles - are accessible in two main ways: through the respective identity tab or the Risks tab.
Once you have accessed the identity details in PAM360, remediation actions for the selected risk are available under the Risks & Remediation tab. The following sections provide step-by-step instructions for remediating specific risks. 1.1 Remediating the Excessive Privileges RiskThe identities (IAM users and roles) possessing unused permissions are grouped under Excessive Privileges. Holding excess permissions will increase the risk of data exposure when an unauthorized identity gains access to the account. Refer to the section below for the remediation information for the excessive privileges risk. To automatically remediate the excessive privileges risk from PAM360 for the IAM users or roles in your AWS account, perform the following steps:
Upon remediation, PAM360 automatically replaces the existing policies with the suggested inline policy in IAM, adhering to the Principle of Least Privilege (PoLP). To remediate the risk manually from the AWS server using the PAM360 recommended inline policy, perform the following actions:
1.2 Remediating the Shadow Admin RiskTo remediate the Shadow Admin risk from PAM360 for the IAM users, user groups or roles in your AWS account, perform the following steps:
Upon remediation, the toxic permissions that grant the administrator privileges to the identity will get removed. To remediate the Shadow Admin risk manually from the AWS server using the PAM360 recommended inline policy, perform the following actions:
1.3 Remediating the Non-Rotated Passwords RiskAfter identifying the IAM users with non-rotated passwords in your AWS account using PAM360's Cloud Entitlements, you can remediate the risk by resetting password or enforcing password rotation on the next immediate login in AWS. This can be done either from the AWS console or AWS CLI. Refer to the sections below to remediate the risk. To remediate the risk from the AWS console, perform the following steps:
To remediate the risk from the AWS CLI, update the user's password settings and mark the password as requires a reset upon the user's next login. To do so, execute the following command: aws iam update-login-profile --user-name USERNAME --password-reset-required 1.4 Remediating the Non-MFA Users RiskAfter identifying the users without MFA in your AWS account using PAM360's Cloud Entitlements, perform the following actions to enable MFA in the AWS server.
For detailed instructions, refer to this document. 1.5 Remediating the Non-Rotated Access Keys RiskTo mitigate the risk posed by non-rotated access keys identified in AWS via PAM360 Cloud Entitlements, it is essential to rotate them. The key rotation process involves generating a new access key, associating it with the IAM user, and then securely deactivating and deleting the old, unrotated key. This process can be done directly via the AWS console or the AWS CLI, ensuring that access keys are regularly updated, thus enhancing security and reducing potential vulnerabilities associated with stale or compromised access keys. To remediate the risk from the AWS console, perform the following steps:
Now, you have rotated the access key for the IAM user. Remember to store the access key in a secure location. To remediate the risk from the AWS CLI, execute the following commands:
aws iam list-access-keys --user-name USERNAME aws iam list-access-keys --user-name USERNAME aws iam delete-access-key --access-key-id <OLD_ACCESS_KEY_ID> --user-name USERNAME Refer to this AWS documentation for more detailed information. Following any of the access key rotation methods ensures the security and integrity of AWS resources. Note: PAM360 allows you to secure the access key sharing by following these steps, 1.6 Remediating the Inactive Users RiskTo remediate the risk posed by inactive users identified in your AWS account, begin by disabling console access for these users from the AWS console. Assess whether the user’s inactivity requires complete access removal; if yes, proceed by deleting their console access to prevent AWS Management Console access. To remove console access, delete the user’s login profile using the following command: aws iam delete-login-profile --user-name USERNAME For detailed instructions, refer to this document. 1.7 Remediating the Inactive Roles RiskAfter identifying the inactive roles in your AWS account using PAM360's Cloud Entitlements, remediate the risk by deleting the IAM role from your AWS server. To remediate the risk from the AWS console, perform the following steps:
To remediate the risk from the AWS CLI, execute the following commands:
Following any of the remediation methods for inactive roles, ensures the security and integrity of AWS resources. Important Notes:
2. Reverting the Cloud Entitlements' RisksPAM360 provides an easy-to-use interface for reviewing and reverting remediated actions, ensuring permissions are always aligned with your organization’s requirements. Reverting a previously remediated risk can be especially valuable in instances where unexpected issues arise due to changes in permissions. For example, if remediation actions unintentionally remove necessary permissions, they can disrupt ongoing AWS processes or cause applications to stop functioning. Additionally, permissions may need to be reverted due to human error, such as misidentifying critical privileges during the remediation process. The ability to revert mitigated risks quickly in PAM360 helps maintain uninterrupted operations while adjusting permissions as needed. To revert a remediated risk in PAM360 Cloud Entitlements, follow these steps:
Note: Please exercise caution while reverting a risk, as the toxic permissions or policies remediated/removed could be restored to the identity and may trigger the PAM360-defined risks again. 3. Audits and Reports of Cloud EntitlementsPAM360 records all actions performed under Cloud Entitlements management as audits, providing comprehensive tracking. Customizable auditing options and notifications are available for specific operations. Access audits via Audit >> Cloud Entitlements and reports via Reports >> Query Reports >> Cloud Entitlements. Below is the list of reports that can be generated in PAM360 while managing the cloud entitlements.
| ||||||||