Skip to content

Commit 060e8a1

Browse files
IAM features (#715)
1 parent 40926aa commit 060e8a1

File tree

1 file changed

+71
-0
lines changed

1 file changed

+71
-0
lines changed
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
common_features:
2+
- CCC.F03 # Access/Activity Logs
3+
- CCC.F07 # Event Notifications
4+
- CCC.F13 # Infrastructure as Code
5+
- CCC.F14 # API Access
6+
- CCC.F17 # Alerting
7+
- CCC.F20 # Tagging
8+
features:
9+
- id: CCC.IAM.F01
10+
title: Global Identities
11+
description: |
12+
IAM identities are global across all regions. They are created
13+
and managed from a single global namespace.
14+
- id: CCC.IAM.F02
15+
title: IAM Users
16+
description: |
17+
Ability to create, manage, list and delete IAM users.
18+
IAM user represents a single person or application. Long-term
19+
credentials (username/password, access keys).
20+
- id: CCC.IAM.F03
21+
title: IAM Groups
22+
description: |
23+
Ability to create, manage, list and delete IAM groups.
24+
IMA group is a collection of users, roles or other groups.
25+
- id: CCC.IAM.F04
26+
title: IAM Roles / Service Principals
27+
description: |
28+
Ability to create, manage, list and delete IAM roles.
29+
IMA role is an identity for applications or services to
30+
access resources.
31+
- id: CCC.IAM.F05
32+
title: Managed Identities
33+
description: |
34+
Identity assigned to cloud resources (e.g., VMs, Functions) which
35+
are managed by the cloud vendor.
36+
- id: CCC.IAM.F06
37+
title: Federated Identity - SAML
38+
description: |
39+
Support for user authentication outside the cloud service
40+
provider using SAML. Authenticated federated identities can
41+
assume IAM roles.
42+
- id: CCC.IAM.F07
43+
title: Federated Identity - OIDC
44+
description: |
45+
Support for user authentication outside the cloud service
46+
provider using OIDC. Authenticated federated identities can
47+
assume IAM roles.
48+
- id: CCC.IAM.F08
49+
title: Custom Roles
50+
description: |
51+
Ability to create, manage, list and delete custom roles.
52+
Custom roles are user-defined roles that defines what
53+
actions are allowed.
54+
- id: CCC.IAM.F09
55+
title: Resource-Level Access
56+
description: |
57+
Ability to restrict where actions are allowed, rather than
58+
the entire service. Defines the scope of the assignment.
59+
- id: CCC.IAM.F10
60+
title: Policy Conditions
61+
description: |
62+
Ability to use conditions to add additional restrictions
63+
to the permission being granted. Allow access control rules
64+
to apply only when certain conditions are met.
65+
- id: CCC.IAM.F11
66+
title: Temporary Credentials
67+
description: |
68+
Ability to grant short-lived security credentials that provide
69+
access to resources for a limited period of time. These credentials
70+
are typically issued for a specific session or task and expire
71+
after a predefined duration.

0 commit comments

Comments
 (0)