-
Notifications
You must be signed in to change notification settings - Fork 106
Add secure infra docs #1184
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Add secure infra docs #1184
Changes from all commits
Commits
Show all changes
45 commits
Select commit
Hold shift + click to select a range
8aa9032
Add secure infra docs
jonathanfrappier d982b69
Minor updates
jonathanfrappier 54c628a
Add ingress/egress doc
jonathanfrappier 2948f75
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier aa07161
Fixes from initial review
jonathanfrappier 1b7a20d
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier 13d9e44
Add draft for secure infra access
jonathanfrappier 53e5625
Reorg lateral movement
jonathanfrappier c49110e
Add zero trust doc
jonathanfrappier b7816a0
First draft complete - ready for CJ review
jonathanfrappier 792a42e
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier 2c6d144
Fix extra comma in redirects
jonathanfrappier 31b7041
Remove random character in redirect
jonathanfrappier df3e35b
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier 9933f2a
Improve clarity of security integration text
cjobermaier ab42082
Merge branch 'main' into WAF-405/add-secure-infrastructure
cjobermaier 8b158ad
review build culture
cjobermaier b4c57b3
added description
cjobermaier 5291950
finish review
cjobermaier f30cb18
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 20b1089
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 7a5a02b
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 77d37d5
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier eb80c6b
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 4f35936
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier aa4ec4d
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 78b8df7
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier e9c900f
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier ebf7e24
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 762b615
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 65b66a2
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 8a1e71e
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 0989582
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier ed27524
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 912f503
Add multiple redirects to redirects.jsonc
cjobermaier 254607b
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier a20b8b0
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier f5c480c
Update content/well-architected-framework/docs/docs/secure-systems/in…
jonathanfrappier 33f028e
Merge branch 'main' into WAF-405/add-secure-infrastructure
cjobermaier 173d17c
Updates from feedback
jonathanfrappier 00f0bca
Apply feedback from review
jonathanfrappier e799e7c
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier 4eaffe1
Additional feedback from review
jonathanfrappier b818b19
Merge branch 'main' into WAF-405/add-secure-infrastructure
jonathanfrappier cfcbb3a
Update prompts.md with WIP note and new prompts
cjobermaier File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
125 changes: 125 additions & 0 deletions
125
...ed-framework/docs/docs/secure-systems/infrastructure/build-culture-security.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,125 @@ | ||
| --- | ||
| page_title: Build a culture of security automation | ||
| description: Learn how to build security into your organization's culture. | ||
| --- | ||
|
|
||
| # Build a culture of security automation | ||
|
|
||
| Security is no longer a separate function in modern | ||
| infrastructure. Organizations must incorporate security in all phases of | ||
| infrastructure deployment and software development lifecycles (SDLC). | ||
|
|
||
| Waiting for security teams to review and approve changes manually can lead to delays, increased risk of human error, and inconsistent security practices. Waiting for audits and compliance checks to verify your security program does not allow you to respond to emerging threats, leaving your organization vulnerable. | ||
|
|
||
| When you build a culture of security automation, you integrate security practices and | ||
| tools into your organization's culture, processes, and workflows. Approaching | ||
| security as a necessary part of your organization's culture, you can: | ||
|
|
||
| **Developer Experience:** | ||
|
|
||
| - Developers get immediate feedback on security issues through their workflows. | ||
| - Security becomes part of the development workflow, not an external gatekeeper. | ||
| - Learning happens in context when teams discover security issues. | ||
|
|
||
| **Operations Teams:** | ||
|
|
||
| - Infrastructure security through familiar code-based workflows. | ||
| - Security policies enforced and deployed automatically, reducing manual oversight burden. | ||
| - Compliance becomes a byproduct of standard operations rather than a special process. | ||
|
|
||
| **Security Teams:** | ||
|
|
||
| - Shift from being gatekeepers to being enablers and consultants. | ||
| - Focus on defining policies and standards rather than manual reviews. | ||
| - Gain visibility into security posture across the entire organization. | ||
|
|
||
| ## What is security automation? | ||
|
|
||
| Security automation involves using tools and processes to automate security | ||
| tasks, such as scanning for vulnerabilities, managing secrets, applying | ||
| security patches, and monitoring for threats. You can automate these | ||
| tasks as code, instead of performing the tasks manually. By automating tasks | ||
| like policy provisioning, or scanning for secrets, your security posture improves. | ||
|
|
||
| <VideoEmbed url="http://youtube.com/watch?v=eamE18_WrW0"/> | ||
|
|
||
| Another important aspect of security automation and building a culture around | ||
| security is understanding that various compliance standards do not inhibit | ||
| innovation. It can be easy to blame compliance requirements for slowing down | ||
| development and infrastructure innovation. However, when you teach teams that | ||
| security and compliance give you the necessary guardrails to innovate, you can | ||
| build a culture that embraces security. | ||
|
|
||
| ## Deploy security as code with Terraform | ||
|
|
||
| You can adopt security as code practices using Terraform to automate | ||
| the deployment of security [policies as | ||
| code](/well-architected-framework/secure-systems/compliance-and-governance/policy-as-code) | ||
| in your infrastructure. You can manage policies for HashiCorp Vault, Boundary, | ||
| and Sentinel, as well as policies for public cloud providers and orchestration | ||
| platforms like Kubernetes and Nomad. | ||
|
|
||
| You can also use Terraform to manage common infrastructure components such as | ||
| user accounts, firewall configurations, and network settings. | ||
|
|
||
| - **Security policies become testable code:** Teams can unit test, peer review, and version control security configurations just like application code. | ||
| - **Prevents configuration drift:** Automated detection when infrastructure deviates from secure baselines, encouraging teams to maintain security standards. | ||
| - **Enables security guardrails:** Terraform can enforce organization-wide security policies that prevent non-compliant infrastructure deployment. | ||
| - **Democratizes security knowledge:** Security configurations are documented in code, making security requirements visible and understandable to all team members. | ||
| - **Creates security feedback loops:** Failed deployments due to security violations become learning opportunities rather than blame events. | ||
|
|
||
| This shifts security from being a "blocker" to being an integral part of how you | ||
| design and deploy infrastructure. | ||
|
|
||
| ## Shift security left with HCP Vault Radar | ||
|
|
||
| Security teams can help shift security left with HCP Vault Radar. Shifting security | ||
| left means software and infrastructure as code (IaC) developers integrate security tools into their | ||
| development process. HCP Vault Radar [scans for | ||
| secrets](/well-architected-framework/secure-systems/secrets/manage-leaked-secrets) | ||
| in source code during development, or once they commit their code to a version | ||
| control system (VCS) such as GitHub. | ||
|
|
||
| - **Continuous education:** Integrating scanning into the software development | ||
| lifecycle helps developers understand how secrets leak. | ||
| - **Immediate feedback:** Real-time alerts when developers commit secrets help | ||
| improve secure coding practices. | ||
| - **Integration with development workflows:** Security scanning becomes part of | ||
| the development process, not a separate security audit. | ||
| - **Cross-team visibility:** Security teams can see patterns and provide | ||
| targeted training based on actual findings. | ||
|
|
||
|
|
||
| HashiCorp resources: | ||
|
|
||
| - [Correlate HCP Vault Radar findings with HCP Vault](/hcp/tutorials/hcp-vault-radar-operations) | ||
| - [Boundary credential brokering with Vault](/boundary/tutorials/credential-management/hcp-vault-cred-brokering-quickstart) | ||
| - [Enforce policies in HCP Terraform using Sentinel](/terraform/tutorials/policy/policy-quickstart) | ||
|
|
||
| External resources: | ||
|
|
||
| - [NIST cyberssecurity framework](https://www.nist.gov/cyberframework) | ||
| - [Navigating behavioral change in security awareness and culture](https://www.ibm.com/think/insights/security-awareness-culture) | ||
| - [Why Culture Is the First Line of Defense in the Age of Agentic AI](https://www.cio.com/article/4043094/why-culture-is-the-first-line-of-defense-in-the-age-of-agentic-ai.html) | ||
|
|
||
| ## Next steps | ||
|
|
||
| In this section of how to Secure infrastructure, you learned why it is important to | ||
| build a culture where security is integrated into every aspect of your | ||
| organization's operations. Build a culture of security automation is part of the [Secure systems | ||
| pillar](/well-architected-framework/secure-systems). | ||
|
|
||
| Following these documents in order ensures a logical progression through the key | ||
| concepts and best practices, helping you build a strong foundation for your | ||
| organizations security program. | ||
|
|
||
| - Integrate Terraform and Vault into common industry | ||
| workflows, such as | ||
| [GitOps](/well-architected-framework/define-and-automate-processes/process-automation/gitops) | ||
| to further automate security practices. | ||
| - [Implement zero trust security and networking](/well-architected-framework/secure-systems/infrastructure/zero-trust-security) | ||
| - [How to secure cloud infrastructure with identity-based access control](/well-architected-framework/secure-systems/infrastructure/identity-new-perimeter) | ||
| - [Build a culture of security automation](/well-architected-framework/secure-systems/infrastructure/build-culture-security) **(this document)** | ||
| - [Secure network traffic with ingress and egress](/well-architected-framework/secure-systems/infrastructure/manage-network-ingress-egress) | ||
| - [Secure human access to infrastructure](/well-architected-framework/secure-systems/infrastructure/secure-access) | ||
| - [Prevent lateral movement](/well-architected-framework/secure-systems/infrastructure/prevent-lateral-movement) |
119 changes: 119 additions & 0 deletions
119
...ed-framework/docs/docs/secure-systems/infrastructure/identity-new-perimeter.mdx
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,119 @@ | ||
| --- | ||
| page_title: How to secure cloud infrastructure with identity-based access control | ||
| description: Identity is the new perimeter. Learn zero trust security, dynamic credentials, MFA, and least privilege access for cloud infrastructure. | ||
| --- | ||
|
|
||
| # Identity-based security for modern infrastructure | ||
|
|
||
| Modern infrastructure encompasses a mix of on-premises, cloud, and | ||
| software-as-a-service (SaaS) workloads. Securing modern infrastructure requires | ||
| a shift in focus to securing access to resources using identities, as the network | ||
| perimeter is no longer a reliable security boundary. | ||
|
|
||
| Identity has become the new perimeter for securing modern infrastructure. | ||
| Instead of relying on network security tools to secure access to resources, | ||
| organizations must focus on securing user and machine identities. In addition to | ||
| shifting focus to identities, organizations must also ensure all services meet the following criteria: | ||
|
|
||
| - **Follow the principle of least privilege:** Grant the minimum access necessary to perform their tasks. | ||
| - **Use strong authentication and authorization mechanisms:** Implement robust sign-in workflows, including multi-factor authentication (MFA), to access resources. | ||
| - **Use ephemeral credentials:** Use ephemeral, short-lived credentials to reduce the risk of credential theft. | ||
| - **Classify data:** Implement a data classification scheme for all services. | ||
| - **Isolate workloads and resources:** Limit the effect of potential security breaches. | ||
| - **Continuously monitor and audit access:** Detect and respond to potential threats. | ||
|
|
||
| <VideoEmbed url="https://www.youtube.com/watch?v=JrYBni2ojyE"/> | ||
|
|
||
| ## Benefits of identity-based security | ||
|
|
||
| Every user, machine, or service has an identity. Leveraging the identities of | ||
| your users through an identity provider (IdP) allows you to manage access to | ||
| resources more effectively. You can also leverage trusted platforms, such as | ||
| your cloud provider or self-managed infrastructure-as-a-service (IaaS) | ||
| platforms, to verify a workload's identity. | ||
|
|
||
| By adopting identity as the new perimeter, organizations can build a more secure | ||
| infrastructure that is better equipped to handle the challenges of modern | ||
| workloads. | ||
|
|
||
| Shifting security focus to identities provides several benefits: | ||
|
|
||
| - **Improved security**: By focusing on securing identities, organizations can | ||
| better protect against threats such as phishing, credential theft, and | ||
| insider threats. | ||
| - **Greater flexibility**: Identity-based security allows organizations to | ||
| securely manage access to resources across a mix of on-premises, cloud, and | ||
| SaaS workloads. | ||
| - **Enhanced user experience**: Identity-based security can provide a more | ||
| seamless user experience, reducing the need for users to remember multiple | ||
| passwords or navigate complex network security tools. | ||
| - **Better compliance**: Identity-based security can help organizations meet | ||
| regulatory requirements by providing better visibility and control over | ||
| access to sensitive data and resources. | ||
|
|
||
| <VideoEmbed url="https://www.youtube.com/watch?v=5uNifnVlBy4"/> | ||
|
|
||
| ## Implement zero trust with Vault and Boundary | ||
|
|
||
| HashiCorp Vault allows you to adopt ephemeral, dynamic credentials, replacing | ||
| long-lived credentials with short-lived ones to reduce the risk of credential | ||
| theft. Vault dynamic credentials support multiple cloud providers like Amazon Web | ||
| Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), as well as | ||
| databases like MySQL, PostgreSQL, and MongoDB. | ||
|
|
||
| HashiCorp Boundary provides identity-aware access without requiring | ||
| network-level trust. Instead of opening firewall ports or managing VPN | ||
| connections, Boundary verifies user identity and grants just-in-time access to | ||
| specific resources based on their authenticated identity and assigned | ||
| permissions. | ||
|
|
||
| You can further enhance your security posture by integrating Vault and Boundary | ||
| to allow identity-based access to target resources without exposing or sharing | ||
| the target's credentials. Users authenticate to Boundary through a trusted | ||
| identity provider, and Boundary retrieves dynamic credentials from Vault to | ||
| access the target resource. | ||
|
|
||
| HashiCorp Terraform enables you to manage identity [policies as | ||
| code](/well-architected-framework/secure-systems/compliance-and-governance/policy-as-code), | ||
| ensuring consistent security configurations across all environments and making | ||
| your identity perimeter auditable and version-controlled. | ||
|
|
||
| HashiCorp resources: | ||
|
|
||
| - Follow the principles of [least | ||
| privilege](/well-architected-framework/secure-systems/identity-access-management/grant-least-privilege) | ||
| - Implement [strong authentication and authorization | ||
| mechanisms](/well-architected-framework/secure-systems/identity-access-management/implement-strong-sign-in-workflows) | ||
| - Use [ephemeral, short-lived | ||
| credentials](/well-architected-framework/secure-systems/identity-access-management/use-dynamic-credentials) | ||
| - Implement a [data classification | ||
| scheme](/well-architected-framework/secure-systems/data/classify-data) | ||
| - [Generate dynamic secrets in Vault](/vault/tutorials/db-credentials) | ||
| - [OIDC authentication to Boundary using Okta](/boundary/tutorials/identity-management/oidc-okta) | ||
| - [OIDC authentication to Vault using Okta](/vault/tutorials/auth-methods/vault-oidc-okta) | ||
| - [Connect to Kubernetes using Boundary and Vault](/boundary/tutorials/kubernetes-connect) | ||
|
|
||
| External resources: | ||
|
|
||
| - [What is identity and access management (IAM)?](https://www.ibm.com/think/topics/identity-access-management) | ||
| - [Zero trust architecture](https://www.nist.gov/publications/zero-trust-architecture) | ||
| - [The real AI risk isn’t AGI — it’s unregulated machine identity](https://www.cio.com/article/4075672/the-real-ai-risk-isnt-agi-its-unregulated-machine-identity.html) | ||
|
|
||
| ## Next steps | ||
|
|
||
| In this section of how to Secure infrastructure, you learned why it is important to | ||
| shift to using identity as the new security perimeter. Focusing security | ||
| programs around identity allows you create a more comprehensive security | ||
| strategy. How to secure cloud infrastructure with identity-based access control is part of the [Secure systems | ||
| pillar](/well-architected-framework/secure-systems). | ||
|
|
||
| Following these documents in order ensures a logical progression through the key | ||
| concepts and best practices, helping you build a strong foundation for your | ||
| organization's security program. | ||
|
|
||
| - [Implement zero trust security and networking](/well-architected-framework/secure-systems/infrastructure/zero-trust-security) | ||
| - [How to secure cloud infrastructure with identity-based access control](/well-architected-framework/secure-systems/infrastructure/identity-new-perimeter) **(this document)** | ||
| - [Build a culture of security automation](/well-architected-framework/secure-systems/infrastructure/build-culture-security) | ||
| - [Secure network traffic with ingress and egress](/well-architected-framework/secure-systems/infrastructure/manage-network-ingress-egress) | ||
| - [Secure human access to infrastructure](/well-architected-framework/secure-systems/infrastructure/secure-access) | ||
| - [Prevent lateral movement](/well-architected-framework/secure-systems/infrastructure/prevent-lateral-movement) | ||
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.