Access Control Policy
Last updated: August 6, 2025
Overview
To define standardized procedures and controls for granting, monitoring, and revoking access to AWS resources in alignment with AWS Identity and Access Management best practices.
Audience
All BizCloud Experts stakeholders involved in AWS operations, including:
IAM Administrators and Security Team members
Developers and System Operators
Contractors and Third-Party Service Providers
Purpose
This policy defines how AMS manages permissions to AWS resources using AWS Identity and Access Management (IAM), ensuring secure, consistent, and auditable access in accordance with AWS best practices (AWS IAM User Guide).
Scope
Applies to all BizCloud Experts AWS accounts, resources, and entities (users, applications, services) requiring access to AWS via IAM.
Key Concepts & Policy Types
Identity-based Policies
JSON documents attached to IAM users, groups, or roles that grant or deny permissions.
Resource-based Policies
Policies attached directly to AWS resources (e.g., S3 bucket policies, Lambda resource policies) specifying who can access the resource and under what conditions
Permissions Boundaries
Define the maximum permissions an IAM entity can obtain, preventing privilege escalation
Service Control Policies (SCPs)
Organization-level policies that set permission guardrails across AWS Organizations accounts, limiting allowed actions even if identity-based policies grant them
Policy Structure & Evaluation
Policy Elements
Version: Policy language version.
Statement: One or more permission statements with fields:
Sid (optional): Identifier for the statement.
Effect: Allow or Deny.
Action / NotAction: API operations covered.
Resource / NotResource: ARN(s) of AWS resources.
Condition: Contextual controls (e.g., MFA, IP address).
Evaluation Logic
SCPs evaluated first to enforce organization-wide guardrails.
Identity-based policies evaluated next.
Resource-based policies evaluated last.
An explicit Deny in any policy overrides all Allow statements.
If no statements apply, access is implicitly denied.
Principles & Best Practices
Least Privilege
Begin with no permissions and grant only what’s necessary.
Narrow scope using Action, Resource, and Condition.
Explicit Deny for Sensitive Operations
Deny high-risk actions (e.g., iam:DeleteUser) via dedicated statements.
Use Managed Policies
Leverage AWS-managed policies for standard roles.
Maintain custom, version-controlled “BizCloud Experts–managed” policies.
Role-Based Access Control (RBAC)
Assign permissions to groups and roles, not individual users.
Permissions Boundaries for Contractors
Cap contractor role privileges to prevent escalation.
Attribute-Based Access Control (ABAC)
Use resource tags (aws:ResourceTag/${TagKey}) in policy conditions to scale permissions.
MFA Enforcement
Require MFA via a Condition block (BoolIfExists: aws:MultiFactorAuthPresent) for sensitive operations.
Authentication & Credential Management
MFA Enforcement
Mandatory for all IAM users with console/API access.
Temporary Credentials
Prefer IAM roles and AWS STS over long-lived access keys; rotate any remaining keys every 90 days.
Root Account Protection
Remove root access keys; store credentials offline; enforce MFA.
Access Provisioning & Lifecycle
Role Creation
Use scoped managed/custom policies.
For cross-account scenarios, configure minimal trust policies.
Policy Authoring
Employ AWS policy grammar and least-privilege templates (e.g., AWS Policy Generator).
Onboarding/Offboarding
Automate via AWS SSO or IAM Identity Center; revoke access within 24 hours of departure.
Governance & Continuous Compliance
AWS Organizations & SCPs
Structure accounts into Organizational Units (OUs); apply SCPs per OU (e.g., restrict ec2:RunInstances to approved instance types).
IAM Access Analyzer
Regularly detect unintended public or cross-account access.
Automated Auditing
Enable CloudTrail in all regions; aggregate logs centrally.
Use AWS Config to continuously validate policy drift.
Monitoring & Incident Response
Monitoring
Track IAM events via CloudTrail, CloudWatch Events, and Security Hub.
Alert on suspicious actions (e.g., new policy creation, privilege escalations).
Incident Response
Revoke compromised credentials immediately.
Rotate keys and revoke active sessions.
Review CloudTrail for root cause.
Follow the BizCloud Experts Incident Response Plan.
Exceptions & Reviews
Exception Handling
Document exceptions in the ticketing system with Security and Architecture approval; set quarterly expiry.
Periodic Access Reviews
Validate active users, roles, groups, and remove unused permissions.
Enforcement
Non-compliance may result in access suspension, disciplinary action, or policy revisions. All violations are reported to Senior Management.
Review Cycle
This policy will be reviewed annually or following significant AWS IAM feature updates.