INTENT-BASED GOVERNANCE
    1.
    发明申请

    公开(公告)号:WO2022140072A1

    公开(公告)日:2022-06-30

    申请号:PCT/US2021/062697

    申请日:2022-01-11

    Abstract: Techniques for intent-based access control are described. A method of intent-based access control may include receiving, via a user interface of an intent-based governance service, one or more intent statements associated with user resources in a provider network, the one or more intent statements expressing at least one type of action allowed to be performed on the user resources, compiling the one or more intent statements into at least one access control policy, and associating the at least one access control policy with the user resources.

    COMPOSITIONAL REASONING TECHNIQUES FOR ROLE REACHABILITY ANALYSES IN IDENTITY SYSTEMS

    公开(公告)号:WO2022066414A1

    公开(公告)日:2022-03-31

    申请号:PCT/US2021/049462

    申请日:2021-09-08

    Abstract: Techniques are described for using compositional reasoning techniques to perform role reachability analyses relative to collections of user accounts and roles of a cloud provider network. Delegated role-based resource management generally is a method for controlling access to resources in cloud provider networks and other distributed systems. Many cloud provider networks, for example, implement identity and access management subsystems using this approach, where the concept of "roles" is used to specify which resources can be accessed by people, software, or (recursively) by other roles. An abstraction of the role reachability analysis is provided that can be used as input to a model-checking application to reason about such role reachability questions (e.g., which roles of an organization are reachable from other roles).

    ANALYSIS OF ROLE REACHABILITY WITH TRANSITIVE TAGS

    公开(公告)号:WO2022125760A1

    公开(公告)日:2022-06-16

    申请号:PCT/US2021/062584

    申请日:2021-12-09

    Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph comprising a plurality of nodes and one or more edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on one or more key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using one or more role assumption steps for a particular state of the one or more attributes. The one or more attributes may comprise one or more transitive attributes that persist during the one or more role assumption steps.

    DISTRIBUTED DECOMPOSITION OF STRING-AUTOMATED REASONING USING PREDICATES

    公开(公告)号:WO2022212579A1

    公开(公告)日:2022-10-06

    申请号:PCT/US2022/022646

    申请日:2022-03-30

    Abstract: Techniques are described for efficiently distributing across multiple computing resources satisfiability modulo theories (SMT) queries expressed in propositional logic with string variables. As part of the computing-related services provided by a cloud provider network, many cloud providers also offer identity and access management services, which generally help users to control access and permissions to the services and resources (e.g., compute instances, storage resources, etc.) obtained by users via a cloud provider network. By using resource policies, for example, users can granularly control which identities are able to access specific resources associated with the users' accounts and how those identities can use the resources. The ability to efficiently distribute the analysis of SMT queries expressed in propositional logic with string variables among any number of separate computing resources (e.g., among separate processes, compute instances, containers, etc.) enables the efficient analysis of such policies.

Patent Agency Ranking