Skip to main content

Revoking User Access

Introduction

In the event of a cyber attack or similar malicious activity e.g. some user credentials are compromised, there may be a requirement to revoke user access on the Modernisation Platform (MP).

This page attempts to break down the various users/identities that exist on MP and explain what you would need to do to revoke access.

Individual IAM Users

MOJ Member Access

MP members who are MOJ employees access environments using AWS SSO which links GitHub Teams to various roles/environments.

Removing user access from GitHub Teams etc. is the responsibility of the relevant application team as explained here, however you could contact the Ops Engineering team who manage our GitHub organisation who will be able to revoke access.

Collaborator Access

Collaborator access is for non-MOJ employees who require access to AWS. These users are defined in the collaborators.json file.

Use this guide to remove a collaborator (NB the Terraform must be run locally as a superadmin user)

Modernisation Platform Team Access

MP team members access environments using AWS SSO and in very few circumstances via Superadmin access

Removing access for MP team members is documented here

We also have a testing-ci user, defined in code here which is used for automated tests. It’s access is limited to the testing-test account and essential core resources. To remove this user raise a PR to remove the user or edit the access of the associated policy.

MOJ Master Users

There are a limited set of users who have access to the Root account (“MOJ Master”) for the organisation.

These users are defined in the root account repo

Any PRs raised to remove a users access would need to be approved by a member of operations-engineering or aws-root-account-admin-team.

Teams

GitHub Teams are linked to AWS environments via the environment/*.json files in the MP repo.

To remove a teams’ access/association with an AWS environment:

  1. Edit the relevant environment/*.json file by removing the team name from the github_slug definition for the particular environment e.g. "github_slug": "modernisation-platform", becomes "github_slug": "",

  2. Note that only one change to a environment/*.json file can be made per PR/run due to current constraints around how the automation works.

  3. Raise a PR and once merged the scheduled baseline job will run to update the access accordingly.

Automation Users (IAM roles/policies)

Member Roles

OIDC CI/CD Role

To allow automated access to MP member environments we provide an optional “OIDC CI/CD” role - modernisation-platform-oidc-cicd which is explained in more detail here

To remove this role for member accounts through code:

  1. Edit the relevant environment/*.json file by removing the team name from the github-oidc-team-repositories definition for the particular environment e.g. "github-oidc-team-repositories": ["modernisation-platform"] becomes "github-oidc-team-repositories": [""]

  2. Note that only one change to a environment/*.json file can be made per PR/run due to current constraints around how the automation works.

  3. Raise a PR and once merged the scheduled baseline job will run to update the access accordingly.

CircleCI Role

Digital Prison Reporting make use of CircleCI for their pipeline. We manage a circleci_iam_role on their behalf which is defined in code here

Removing access would be as simple as raising a PR to either remove this code entirely or edit the permissions of the associated policy so that it has limited or no access.

MP Platform Management Roles

Here is a list of roles/identities that are used to manage the Modernisation Platform with links to the code that creates them. In the event of a compromise we would likely need to follow the steps in the next section to revoke permissions whilst the security incident is being investigated.

Bootstrap

Core Logging

Core Network Services

  • dns - Role to allow ci/cd to update DNS records for ACM certificate validation
  • read-log-records - Role to allow developer SSO user to read DNS records for ACM certificate validation for local plan

Core Shared Services

  • image-builder - Role to allow member developer SSO user to perform required shared services tasks
  • LambdaInvoke - Role for EventBridge Scheduler to trigger Lambda Function
  • member-shared-services - Role to allow member developer SSO user to perform required shared services tasks

Core VPC

  • member-delegation - A role that sits in the core-vpc accounts and can be assumed by relevant member accounts and ModernisationPlatform account in order to manage networking infrastructure (e.g. DNS, flow logs and EC2’s networking)
  • member-delegation-read-only - Read only role for developer sso plans and for viewing via the console

Modernisation Platform

Urgent Disabling Access to IAM Roles

If there is an urgent need to restrict access related iam roles then consider the following two approaches:

Revoking IAM role temporary security credentials

To ensure all current sessions using the role are stopped the you can follow the guidance on AWS for revoking sessions permissions

This method attaches a new inline policy to the role that denies all permissions to all actions. It includes a condition that applies the restrictions only if the user assumed the role before the point in time when you revoke the permissions. If the user assumes the role after you revoked the permissions, then the deny policy does not apply to that user.

Disabling permissions for temporary security credentials

A more ‘belt and braces’ approach would be to follow the AWS guidance on denying access to all sessions associated with a role

This procedure denies permissions to all users that have permissions to assume a role with a policy like this:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Deny",
      "Action": "*",
      "Resource": "*"
    }
  ]
}

Risks/Caveats

This runbook describes how to revoke access through code which will permanently revoke access in the cleanest manner. In some cases this would not be the quickest way to revoke access.

Depending on the severity of the compromise there should be some thought around whether it would be better to temporarily use “clickops” to remove access before code changes can be released or whether there should be a dedicated mechanism (pipeline etc.) which can temporarily quarantine a user identity while a security incident is being investigated.

If any roles/identities related to the running of the MP platform are compromised then revoking access will likely remove our ability to make any further updates via code/pipeline so this action should not be taken lightly.

This page was last reviewed on 12 February 2024. It needs to be reviewed again on 12 August 2024 by the page owner #modernisation-platform .
This page was set to be reviewed before 12 August 2024 by the page owner #modernisation-platform. This might mean the content is out of date.