-
公开(公告)号:US20220191206A1
公开(公告)日:2022-06-16
申请号:US17119868
申请日:2020-12-11
Applicant: Amazon Technologies, Inc.
Inventor: John Byron Cook , Neha Rungta , Carsten Varming , Daniel George Peebles , Daniel Kroening , Alejandro Naser Pastoriza
Abstract: Methods, systems, and computer-readable media for analysis of role reachability using policy complements are disclosed. An access control analyzer determines two nodes in a graph that potentially have a common edge. The nodes correspond to roles in a provider network, and the roles are associated with first and second access control policies that grant or deny access to resources. The access control analyzer performs a role reachability analysis that determines whether the first role can assume the second role for a particular state of one or more key-value tags. The role reachability analysis determines a third access control policy authorizing a negation of a role assumption request for the second role. The role reachability analysis performs analysis of the third access control policy with respect to a role assumption policy for the second role for the particular state of the one or more key-value tags.
-
公开(公告)号:US11757886B2
公开(公告)日:2023-09-12
申请号:US17119868
申请日:2020-12-11
Applicant: Amazon Technologies, Inc.
Inventor: John Byron Cook , Neha Rungta , Carsten Varming , Daniel George Peebles , Daniel Kroening , Alejandro Naser Pastoriza
IPC: H04L9/40 , H04L41/0604 , H04L41/22 , G06F21/62 , G06F16/901
CPC classification number: H04L63/101 , G06F21/62 , H04L41/0627 , H04L41/22 , H04L63/0435 , H04L63/10 , H04L63/105 , H04L63/20 , G06F16/9024
Abstract: Methods, systems, and computer-readable media for analysis of role reachability using policy complements are disclosed. An access control analyzer determines two nodes in a graph that potentially have a common edge. The nodes correspond to roles in a provider network, and the roles are associated with first and second access control policies that grant or deny access to resources. The access control analyzer performs a role reachability analysis that determines whether the first role can assume the second role for a particular state of one or more key-value tags. The role reachability analysis determines a third access control policy authorizing a negation of a role assumption request for the second role. The role reachability analysis performs analysis of the third access control policy with respect to a role assumption policy for the second role for the particular state of the one or more key-value tags.
-
公开(公告)号:US20240314134A1
公开(公告)日:2024-09-19
申请号:US18674692
申请日:2024-05-24
Applicant: Amazon Technologies, Inc.
Inventor: John Byron Cook , Neha Rungta , Carsten Varming , Daniel George Peebles , Daniel Kroening , Alejandro Naser Pastoriza
IPC: H04L9/40 , H04L41/0604 , H04L41/22
CPC classification number: H04L63/101 , H04L41/0627 , H04L41/22 , H04L63/0435 , H04L63/20 , H04L63/105
Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph including nodes and edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using role assumption steps for a particular state of the attributes. The attributes may include transitive attributes that persist during the role assumption steps.
-
公开(公告)号:US12034727B2
公开(公告)日:2024-07-09
申请号:US17119855
申请日:2020-12-11
Applicant: Amazon Technologies, Inc.
Inventor: John Byron Cook , Neha Rungta , Carsten Varming , Daniel George Peebles , Daniel Kroening , Alejandro Naser Pastoriza
IPC: H04L9/40 , H04L41/0604 , H04L41/22
CPC classification number: H04L63/101 , H04L41/0627 , H04L41/22 , H04L63/0435 , H04L63/20 , H04L63/105
Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph including nodes and edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using role assumption steps for a particular state of the attributes. The attributes may include transitive attributes that persist during the role assumption steps.
-
公开(公告)号:US20220191205A1
公开(公告)日:2022-06-16
申请号:US17119855
申请日:2020-12-11
Applicant: Amazon Technologies, Inc.
Inventor: John Byron Cook , Neha Rungta , Carsten Varming , Daniel George Peebles , Daniel Kroening , Alejandro Naser Pastoriza
Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph comprising a plurality of nodes and one or more edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on one or more key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using one or more role assumption steps for a particular state of the one or more attributes. The one or more attributes may comprise one or more transitive attributes that persist during the one or more role assumption steps.
-
-
-
-