CIO Influence
CIO Influence News Cloud

Ermetic Releases Open Source Tool to Automatically Troubleshoot AccessDenied Errors on AWS

Ermetic Releases Open Source Tool to Automatically Troubleshoot AccessDenied Errors on AWS
Free Tool Analyzes AWS CloudTrail and Provides Least-Privilege Remediation Suggestions

Ermetic, the cloud infrastructure security company announced it has released a free open source tool for managing AccessDenied Events in Amazon Web Services (AWS) that automates time consuming cloud access policy troubleshooting and correction. Access Undenied on AWS analyzes AWS CloudTrail AccessDenied events, scans the environment to identify and explain the reasons for the events, and offers actionable least-privilege remediation suggestions.

Top iTechnology Drones News: Terra Drone Raises $70 Million in Series B Funding to Accelerate Growth and Worldwide Adoption of Unmanned Aircraft System Traffic Management (UTM) and Urban Air Mobility (UAM) solutions

The project is led by Noam Daham, research lead at Ermetic. You can read his blog introducing the tool here.

“Even if you know the policy type causing ‘access denied’, which isn’t always the case, you still need to find the policy and the statement inside the policy causing the denial, and replace it with a least-privilege alternative,” Noam Dahan. “Basically, you give the Access Undenied on AWS tool a CloudTrail event with an “Access Denied” outcome, and it will tell you how to fix it!”

Access Undenied on AWS addresses some of the peskiest Access Denied challenges encountered by DevOps and security teams on a daily basis, including:

  • Some AccessDenied messages still do not provide details. Among the services for which some, or even many, messages are lacking in detail are: S3, IAM, STS, CloudWatch, EFS, DynamoDB, Redshift, Opensearch and ACM.

Top iTechnology Drone News: Epirus Unveils Portable HPM Leonidas Pod, Expanding Advanced Electronic Warfare Product Portfolio

  • When the reason for AccessDenied is an explicit deny, users can have difficulty tracking down the specific policy and statement that generated the explicit deny. Specifically, when the reason is an explicit deny in a service control policy (SCP), it is difficult to find and assess every single policy in the organization that applies to the account.
  • Meanwhile, when the problem is a missing allow statement, it can still be challenging to create the least-privilege policy that allows the desired access without granting excessive permissions.

Access Undenied on AWS is available here, and supports policies for many resources and some of the most common condition keys. This open source project is also soliciting input from the community through contributions of new issues in the repository.

Top iTechnology Automative News: Nintex to Showcase Automation Innovations during Nintex ProcessFest 2022

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Semperis Extends Hybrid Identity Protection with Cyberattack Recovery Capabilities for Azure Active Directory

Snowflake Achieves FedRAMP High Authorization on AWS GovCloud US-West and US-East

Business Wire

Stamus Networks Announces Availability of Suricata Language Server

CIO Influence News Desk

Leave a Comment