Users
Public Oath
Fluid Attacks will look for an authorization architecture that properly balances access control, maintainability and comfort.
We will constantly look for better ways of securing access to our Cloud.
Architecture
- The
users
component ofcommon
owns the authentication and authorization logic for AWS and Cloudflare. - It is managed as code using Terraform.
- There are three types of AWS roles:
- Development: An IAM role called
dev
. - Production: An IAM role
for each main component (e.g
integrates_prod
).prod_common
role is the super-admin role. - External users: There is one external user
as part of our subscription
with Clouxter
called
erika.bayona
.
- Development: An IAM role called
- Each role has an associated KMS key.
- Developers can assume roles by authenticating via
aws-okta-processor.
They must have proper access on Okta to assume certain roles like
prod_common
. - KMS keys are used
for encrypting and decrypting secrets
using Mozilla SOPS.
- The
prod_common
role can access all KMS keys. - All
prod_*
roles can access both their own KMS key anddev
. - The
dev
role can only access thedev
KMS key.
- The
- Components that require it also have their own Cloudflare API tokens that allow them to perform actions like writing cache, dns and page rules.
Contributing
Please read the contributing page first.