Skip to content

Conversation

jonathanfrappier
Copy link
Contributor

@jonathanfrappier jonathanfrappier commented Sep 16, 2025

🎫 Jira task
🔍 Preview + other pages under iam.

@jonathanfrappier jonathanfrappier self-assigned this Sep 16, 2025
@github-actions github-actions bot added the WAF label Sep 16, 2025
Copy link

github-actions bot commented Sep 16, 2025

Vercel Previews Deployed

Name Status Preview Updated (UTC)
Dev Portal ✅ Ready (Inspect) Visit Preview Fri Sep 19 20:55:19 UTC 2025
Unified Docs API ✅ Ready (Inspect) Visit Preview Fri Sep 19 20:48:51 UTC 2025

Copy link

github-actions bot commented Sep 16, 2025

Broken Link Checker

No broken links found! 🎉

- Current best operational practices that define security controls (SOC 2, NIST,
ISO 127001).

Start with identifying the regulations and standards that apply to your
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This goes past 'what are access reqs' and starts having users do something. I would keep them separate. You could also combine the 'what is' part with the intro.

seem overwhelming. There are steps you can take to simplify identifying which
requirements you need, and collect the necessary documentation to implement the
access requirements.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since it looks like you want users to follow these documents in a specific order, you may want to list all of the steps/docs here? I can't remember if we do this in other WAF docs, or how we do it. We might add it to the bottom.

Because looking at create permissions, it looks like this is a collection.


Now that you have defined your access requirements, you can begin writing
policies that enforce permissions guardrails by using least privilege policies.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add something about what least privilege is. Add a resource to our best docs on least priv. Least priv is still a new concept.

access requirements](/well-architected-framework/secure-systems/identity-access-management/define-access-requirements),
you can use that information to write identity and access management (IAM) policies.

## What is least privilege
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can combine this with the intro.

have access to the specific resources they need. If a user’s credentials become
compromised using least privilege policies, the attacker can access just the
limited set of resources defined in the policy, reducing the potential damage.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think a diagram could be cool here showing the value of least priv

- Logging enabled and monitored for access to production.
- Centralized authentication and authorization for all services.

HashiCorp tools and services like [Vault](/vault/tutorials/get-started) and
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can give stronger examples of how our tools can help with least priv (I know this is a start to these docs, so you'll be adding more later).

requirements](/well-architected-framework/secure-systems/identity-access-management/define-access-requirements)
into policies for your systems.

## What are permissions
Copy link
Contributor

@cjobermaier cjobermaier Sep 17, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Might combine this with intro

Identity and Access Management (IAM) supports JSON-based policies. Other systems
like Active Directory may require scripting the policies in other languages like
PowerShell.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would add a code example to show users how a simple permission as code would look.

jonathanfrappier and others added 4 commits September 17, 2025 14:50
…entity-access-management/define-access-requirements.mdx

Co-authored-by: CJ <[email protected]>
…entity-access-management/define-access-requirements.mdx

Co-authored-by: CJ <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants