https://github.com/devsecops/controlplane
Your infrastructure is moving and so is your root of trust. This project helps to define a new control plane for locking down access and policies.
https://github.com/devsecops/controlplane
Last synced: 23 days ago
JSON representation
Your infrastructure is moving and so is your root of trust. This project helps to define a new control plane for locking down access and policies.
- Host: GitHub
- URL: https://github.com/devsecops/controlplane
- Owner: devsecops
- License: apache-2.0
- Created: 2016-04-09T00:13:03.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2016-08-07T20:01:30.000Z (over 9 years ago)
- Last Synced: 2025-01-21T14:46:36.827Z (about 1 year ago)
- Homepage:
- Size: 437 KB
- Stars: 9
- Watchers: 13
- Forks: 8
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
#Control Plane + Target Account(s)
The Control Plane pattern allows for relative ease of use while balancing security needs such as, blast radius containment, minimal attack surface, privileged access management, and least privilege.
---
Guiding Principles for this pattern:
* Native use of Cloud Provider
* Blast Radius Containment
* Minimize Attack Surface
* Privileged Access Management
* Least Privilege
##Basic Structure
The basic Control Plane pattern has a single or primary control plane and one or more target accounts that have a trust relationship with the control plane. Long-Term Credentials associated with Users are routinely in use in the primary control plane. Human access is brokered with MFA, and app access via Long-Term Credentials implements compensating controls.
An enhanced Control Plane pattern includes a second backup or recovery control plane, and each of the target accounts also has a trust relationship with the backup control plane. Minimal Long-Term credentials exist (only enough to seed-access to the backup control plane), and these credentials are stored securely for 'break-glass' scenarios.
###Image 1: Control Plane to Target(s) Relationship
Trust is delegated from a Principal Entity in a _trusting_ account to a Principal Entity in the _trusted_ account. This trust is granular, meaning that a specific Principal Entity in the _trusting_ account trusts a specific Principal Entity in the _trusted_ account. This is not an account-to-account trust (such a broad trust is likely to introduce a design flaw that would allow elevation of privilege).

***Note:*** Diagram to be updated to be generalized to any Cloud Provider ([Issue #3](https://github.com/devsecops/controlplane/issues/3)).
##Examples
Some examples of this pattern include:
* [Amazon Web Services](/docs/Amazon-Web-Services/)
* [Google Cloud]() (to be added: [Issue #4](https://github.com/devsecops/controlplane/issues/4))
* [Microsoft Azure]() (to be added: [Issue #5](https://github.com/devsecops/controlplane/issues/5))
#Appendix
##References
* [References](/docs/references)