Technical controls provide one of the key means for Strategic Blue to enforce security, and ensure that the defined policies are fully and correctly implemented.
Role Based Access Control
The overall access we require is described in the Data Access section above. We further control this access internally through a number of job specific roles. This ensures that we as a company, and our staff, as individuals, have only the minimum access required to deliver our value
AWS
We make extensive use of AWS Organizations as a way to centrally manage multiple accounts. An AWS Organization is composed of a two-tier structure with multiple linked Accounts and a single Payer Account. The Payer Account also doubles as the management account, typically the location from which organization linked services are administered.
As a company, our AWS access is controlled through a central, Strategic Blue owned, AWS Account that acts as a bastion service. Our staff authenticate through this account, using AWS Identity & Access Management and MFA. Actions they can then take are determined by the internal roles they have been assigned as summarized below
Access for Rate Optimization
- Administrator access to commitment holding accounts (created specifically for our use when you onboard): Portfolio Management Team
- Reserved Instance and Saving Plan commitment management: Portfolio Management team
- AWS Payer Account level Cost and Usage read-only (e.g. Cost Explorer, account information, consolidated billing, free tier, budgets and service quotas): Account Managers, Technical Account Managers, Portfolio Management Team, Finance Team
It should also be noted that our developers have no direct access to production accounts.
Access for Resale
- Root account access (as required by AWS): limited to only two SC cleared, long-serving senior employees.
- Administrator account access: limited to only two SC cleared, long-serving senior employees. Provided by dedicated user accounts isolated from their accounts used for standard tasks.
- AWS Organization configuration (e.g. account consolidation/ deconsolidation and apply Security Control Policies): Technical Account Managers
- AWS Budgets and anomaly detection configuration: Technical Account Managers
- Creating and authorizing payments: Finance Team
- AWS Support ticket management: Account Managers, Technical Account Managers, Portfolio Management Team, Finance Team