In your software solution, you have databases, servers, network components and so on. Who can access your database? Which components can connect to your servers? You define a set of permissions and indicate that only those defined identities can access your trusted resources. Those permissions (which are acting as guardrails) is your data perimeter.
Setting up data perimeter helps improve your security strategy and work as coarse-grained access controls.
Ensure your identities and resources can be used from expected networks only. The expected networks could be your corporate network IP CIDR, VPC, your third-party partners trusted networks or other AWS services.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "EnforceNetworkPerimeter",
"Effect": "Deny",
"Principal": "*",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::<my-data-bucket>",
"arn:aws:s3:::<my-data-bucket>/*"
],
"Condition": {
"NotIpAddressIfExists": {
"aws:SourceIp": "<allowed-corporate-ip-cidr>"
},
"StringNotEqualsIfExists": {
"aws:SourceVpc": "<my-vpc>",
"aws:PrincipalAccount": [
"<third-party-account-a>"
]
},
"BoolIfExists": {
"aws:PrincipalIsAWSService": "false",
"aws:ViaAWSService": "false"
},
"ArnNotLikeIfExists": {
"aws:PrincipalArn": "arn:aws:iam::<my-account-id>:role/aws-service-role/*"
},
"StringEquals": {
"aws:PrincipalTag/data-perimeter-include": "true"
}
}
}
]
}
You need to have deeper understanding of AWS security controls to properly set up your data perimeter. DeepDefence with its vast experience in cloud security can help you achieve that. Contact us now!! We offer a free security assessment to new customers.