SP-018-001 Remote infrastructure control access policy
Procedure flowchart
Purpose
This procedure defines the process for granting remote access to AWS resources that are accessed directly (e.g. EC2 instances), as opposed to resources managed through the AWS console.
Scope
This procedure applies to all team members who require remote access to AWS resources.
Responsibilities
JD-001
- To approve the granting of remote access permissions to team members.
JD-005
- To ensure that the process of granting access follows the methodology established in this procedure.
JD-007
- To perform the technical operations described in this procedure and record the corresponding evidence.
Inputs
- Team member's full name.
- Team member's IP address.
Outputs
- An updated AWS security group granting remote access to the user.
- The credentials generated for allowing remote access.
Development
The process for granting remote access to an AWS resource must follow these steps:
-
Request the team member's IP address and full name.
-
Check whether an AWS security group already exists for the user. If not, create a new one. The security group name must be the user's full name converted to lowercase, with spaces replaced by hyphens and accents removed. For example, "Gerardo Fernández Moreno" becomes
gerardo-fernandez-moreno. -
Configure the security group with at least the following inbound rule:
Port IP Description 22 XXX.XXX.XXX.XXX (user's IP) User's location -
Attach the security group to the target resource.
-
Create a user account inside the resource, following the same naming convention as the security group.
-
Configure authentication credentials:
- If the resource accepts SSH connections: Generate a PEM key pair for the user (if one does not already exist) and add the public key to
/home/{username}/.ssh/authorized_keys. See the AWS documentation for detailed instructions. - If the resource does not accept SSH connections: Create a user with a password and share the credentials with the team member through Passbolt.
- If the resource accepts SSH connections: Generate a PEM key pair for the user (if one does not already exist) and add the public key to
Document signature meaning
- Author: JD-004 María Diez and/or JD-007 Gerardo Fernández
- Review: JD-005 Mr. Alfonso Medela
- Approval: JD-001 Ms. Andy Aguilar
Signature meaning
The signatures for the approval process of this document can be found in the verified commits at the repository for the QMS. As a reference, the team members who are expected to participate in this document and their roles in the approval process, as defined in Annex I Responsibility Matrix of the GP-001, are:
- Author: Team members involved
- Reviewer: JD-003 Design & Development Manager, JD-004 Quality Manager & PRRC
- Approver: JD-001 General Manager