Implementation Summary
Glean provides customers with a Terraform module to execute. This Terraform module creates the managed policies that get attached to roles as permission boundaries. After the customer creates the permission boundaries, customers are encouraged to set up an SCP on the AWS account requiring all IAM roles created by Glean’s infrastructure orchestration to have the boundary applied. Glean supplies a sample of this SCP in the permission boundary provisioning Terraform package. New customers have the option of having Glean automatically provision this during the first deployment.The Permission Boundaries
Glean can provision 2 permission boundaries. They are:- The Orchestration Role Boundary
- ARN:
arn:aws:iam::GLEAN-ACCOUNT-ID:policy/glean/perm-boundary/glean-OrchestrationRolePermBoundary
- ARN:
- The Application Role Boundary
- ARN:
arn:aws:iam::GLEAN-ACCOUNT-ID:policy/glean/perm-boundary/glean-ApplicationRolePermBoundary
- ARN:
- IAM role creation/mutation
- IAM
PassRole
Glean requires the IAM role ARNs above for these managed policies to be the same as depicted.
Set up
New Customers
New customers have the option to have this automatically provisioned during the initial deploy. Glean will provide the customer with the sample SCP to apply, and the customer would apply it to the account.Existing Customers
For existing customers, please contact your Glean representative for the Terraform package. Once you receive this, you will:- Make adjustments to set the Terraform backend
- Update
tfvarsfiles (you will need to update the region to be that of the Glean deployment) - Run the Terraform
- Inform the Glean representative that this has been completed
- Glean will perform a deployment operation that will attach the permission boundaries everywhere
- Customers will set up the SCP as appropriate