All Products
Search
Document Center

Resource Access Management:Identify external access

Last Updated:Nov 08, 2024

This topic describes how to use an external access analyzer to identify allowed external access to resources in your resource directory or in the current account.

Overview

What is an external access analyzer?

An external access analyzer helps identify the resources that are shared with external accounts in the current account or your resource directory. Several Alibaba Cloud resources, such as Object Storage Service (OSS) buckets and Resource Access Management (RAM) roles, support resource-based policies that are attached to external identities. An external access analyzer continuously monitors shared resources in your resource directory or in the current account and generates findings for the resources. This helps identify unexpected resource sharing and reduce security risks of enterprises. Each finding contains information about the external identity that accesses the shared resources and the granted operation permissions.

Trust zone

When you create an analyzer, you can set the analyzer scope to Current Account or Resource Directory. The scope that you specify is the trust zone of the analyzer. The analyzer monitors the resources that can be analyzed in the trust zone. If an internal identity accesses the resources in the trust zone, the analyzer considers the access trusted. For example, if the trust zone is Current Account, the identities in the current account are considered trusted. The identities in other accounts are considered untrusted. If the trust zone is Resource Directory, the identities in the resource directory to which the current account belongs are considered trusted. The identities outside the resource directory are considered untrusted.

Types of resources that support an external access analyzer

  • OSS buckets

    An external access analyzer analyzes the access control lists (ACLs) and bucket policies of OSS buckets and generates findings based on the value of the Block Public Access parameter. If a bucket in the trust zone allows access from an entity outside the trust zone, such as an anonymous user, the analyzer generates an active finding for the bucket.

  • RAM roles

    An external access analyzer analyzes the trust policies of RAM roles. A trust policy is a resource-based policy that is specified when you create a RAM role. In a trust policy, you can specify the trusted entities that can assume the RAM role. If an entity outside the trust zone can assume the RAM role in the trust zone, the analyzer generates an active finding for the RAM role.

Create an external access analyzer

  1. Log on to the RAM console as a RAM user who has administrative rights.

  2. In the left-side navigation pane, choose Access Analyzing > Analyzers.

  3. In the top navigation bar, select a region.

    Note

    An external access analyzer analyzes only resources in the region where the analyzer resides. To analyze resources in other regions, you must create an analyzer in the regions. Resources that are deployed in the central region, such as RAM roles, can be monitored and analyzed by analyzers in any region.

  4. On the Analyzers page, click Create Analyzer. On the Create Analyzer page, enter an analyzer name, set Analyzer Type to External Access, and select an analyzer scope. Then, click Create Analyzer.

    Note

    Only the management account of a resource directory can set Analyzer Scope to Resource Directory.

    image

After you create the analyzer, the analyzer detects external access to the resources in the analyzer scope. The system requires a specific period of time to generate findings.

View and handle the external access findings

View the findings

You can view the findings on the Analyzers or Findings page.

The following figure shows the Analyzers page.

image

The following figure shows the Findings page.

image

Filter the findings

You can search for specific findings based on filter conditions, such as Resource, Resource Type, Resource Owner, and Status.

Note

The filter conditions in the console prevail.

For example, you can configure the following conditions to check whether public access exists.

image

View the details of a finding

In the finding list, find the finding that you want to manage and click the ID in the Finding ID column.

image

You can perform one of the following operations based on the finding:

  • If the resource sharing is expected, click Archive to archive the finding.

  • If the resource sharing is unexpected, click Go for Governance or Copy Resource URL to perform governance operations on the corresponding page. If the resource involved belongs to the current account, click Go for Governance. Otherwise, click Copy Resource URL.

Automatically archive the findings

Apart from manually archiving a single finding, you can create archive rules to automatically archive findings that do not require governance.

On the Findings page, configure filter conditions and click Save as Archive Rule to create an archive rule. After you create the archive rule, new findings are automatically archived.

image

Findings that are generated before the archive rule is created are not automatically archived. To archive the findings, perform the following operations: Go to the Analyzers page, click the name in the Analyzer Name column, click the Archive Rules tab, find the required archive rule, and then click Apply Archive Rule in the Actions column.

image