Overview of Identity & Access Management
IAM is about managing WHO has access to WHAT and the RESOURCES. Who could be an user/group/org, where as what they can do is about their privileges and what resources/services they can consume.
Cloud IAM Objects
- Organization
- root node in the hierarchy
- Org Roles
- org admin
- control over all cloud resources – super user
- project creator
- controls project creation within the org
- Org resources
- org admin
- Folders
- represents multiple departments within an org
- Projects
- Each Dept can have one or more than one projects associated with them
- Each dept can have one or more projects within the folder.
- this provides clear demarcation of roles within the dept
- and granular delegation of access
- eg ORG
- DEPT-1
- Proj1-D1
- Proj2-D1
- DEPT-2
- Proj1-D2
- DEPT-1
- Resources
- individual resources / services aligned to each projects
- Roles
- Resource Manager Roles & Scope
- Org
- Admin
- Viewer
- Folder
- Admin
- Creator
- Viewer
- Project
- Creator
- Deleter
- Org
- IAM Role Types
- Primitive
- Default available roles
- Primitive roles have coarse-grained level of access
- Viewer
- Read only access
- Editor
- Includes view access +
- Deploy, Modify & Configure services
- Owner
- Includes Editor access +
- full admin access
- Viewer
- Pre-defined
- The predefined roles apply to a specific GCP service in a project
- These roles are not abstract
- Compute Admin
- full control of all compute engine
- eg compute.*
- full control of all compute engine
- Network Admin
- To create/modify/delete all network services
- Firewall rules & SSL certs not part of network admin role
- Storage Admin
- create/modify/delete all images, snapshots services
- Custom
- Provides layer of abstraction and can be controlled
- Primitive
- Resource Manager Roles & Scope
- Members
Create & Manage Orgs
- Orgs are created when a G Suite / Cloud Identity creates a GCP Project
- Super Admin – Cloud Identity & G Suite
- Assign org admin
- poc for recovery
- controls the lifecycle of Cloud Identity & G Suite
- Org Admin
- define IAM policies
- determine structure & resource hierarchy
- delegate – component (networking, billing etc) access through IAM roles
- Ideal to have the org admin and super admin assigned to different individuals
- Super Admin – Cloud Identity & G Suite
Notes
- Child policies cannot restrict access granted at the parent level
- Each child can have only one parent
- Resource hierarchy changes then policy hierarchy changes.
- Best practice
- assign policy at the lower level
