Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guest Access to AWS Fleet Manager (Remote Desktop only) #5786

Closed
nbuckingham72 opened this issue Dec 12, 2023 · 7 comments
Closed

Guest Access to AWS Fleet Manager (Remote Desktop only) #5786

nbuckingham72 opened this issue Dec 12, 2023 · 7 comments
Assignees
Labels
good first issue Good for newcomers

Comments

@nbuckingham72
Copy link

User Story

I have a query involving granting temporary PPUD access to a guest user (MoJ partner). We need to allow them to have access to AWS Fleet Manager but only the RDP component. We need to disable terminal session access. Further RDP access will then be controlled via domain security groups. Terminal session access via ssm-user is a backdoor that we'd like to close off, but this can only be done in AWS. Can a profile be created to provide this level of access? Are the permissions that granular?

The profile should only be allowed access to the Development environment. I know this is easily done. It should also only have read only permissions to allow other aspects of AWS.

Value / Purpose

The guest user is performing some development work for the MoJ and needs access to the code base, which we are going to provide on a custom built EC2 instance. We need to lock down access to only this EC2 instance and only via remote desktop.

Useful Contacts

Nick Buckingham

Additional Information

I've reviewed the guide on user access but don't see a particular profile that meets our requirements, meaning a custom one may be required. Is this possible?

https://user-guide.modernisation-platform.service.justice.gov.uk/user-guide/creating-environments.html#access

Proposal / Unknowns

No response

Definition of Done

Guest user has remote desktop access to a single EC2 instance. Read only permissions on AWS and terminal session access via fleet manager is disabled for the user.

@nbuckingham72
Copy link
Author

Step 3 on page 953 might do what we need to lock down session manager access to a single EC2 instance.

https://docs.aws.amazon.com/pdfs/systems-manager/latest/userguide/systems-manager-ug.pdf

@SimonPPledger
Copy link
Contributor

can we add to an existing role or does it need to be a brand new role. Edd to discuss with Nick. To be done by a new member of the team, supported by Edd

@SimonPPledger SimonPPledger added good first issue Good for newcomers and removed needs refining labels Dec 19, 2023
@nbuckingham72
Copy link
Author

I'm easy, whatever works. As long as they can only access a single EC2 instance via fleet manager then we're good. This will be in January now.

@SimonPPledger
Copy link
Contributor

lets create new role with access to fleet manager only

@ep-93 ep-93 moved this from To Do to In Progress in Modernisation Platform Jan 10, 2024
@ep-93
Copy link
Contributor

ep-93 commented Jan 17, 2024

Role and policy created. Informed @SimonPPledger of it, and tested it. @sukeshreddyg has done all this work, and it works great! All we need when the time arises is the name of the third party (so we can created them collab access)

Apart from that, ticket complete, waiting Simons sign off.

@ep-93 ep-93 moved this from In Progress to Blocked in Modernisation Platform Jan 17, 2024
@nbuckingham72
Copy link
Author

Great news, so the role/policy only grant access to fleet manager and the terminal session option is disabled?

@ep-93
Copy link
Contributor

ep-93 commented Jan 22, 2024

Role created for collaborators.

@ep-93 ep-93 closed this as completed Jan 22, 2024
@github-project-automation github-project-automation bot moved this from Blocked to Done in Modernisation Platform Jan 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers
Projects
Archived in project
Development

No branches or pull requests

4 participants