User access management is crucial for a secure cloud environment. It prevents unauthorized access, mitigates data breaches, and ensures regulatory compliance. This topic explores practical examples and best practices for securing user access in a public cloud environment.
For enhanced user access security, it is vital to use secure and strong authentication mechanisms that apply to any user, independent of whether it is the owner of an account or users added to the account with roles of administrators or read-only access. You need to use:
1. The service login credentials are confidential information and must be handled accordingly. Usually, they consist of a user identifier, such as an email address and a strong password.
2. The service login credentials require a strong user identifier and password. For example, an email address and a strong password. Common and weak passwords, such as the following, are frequently found in breach lists:
123456
password
qwerty
abc123
Warning: Using any of the above-mentioned passwords or easily guessable patterns is strongly discouraged, as they are highly vulnerable to brute-force attacks.
The source of this information is based on an analysis of various data breaches and password dumps that have occurred over the years. Websites and services such as and data security reports often compile and analyze this data to raise awareness about the importance of strong passwords and security practices.
3. Complex passwords are difficult for humans to remember, so use safe password vaults to store data across multiple services securely. It also helps to use different complex passwords across multiple services and allows the introduction of password retention periods. This protects you if one service gets compromised; other services might not be affected. In any case, passwords do not belong in easy-to-access places like post-its stuck to your monitor.
4. The essential step of strong authentication is using unique, complex, and lengthy passwords. To make it secure, it is recommended that all user accounts utilize Multi-Factor Authentication (MFA). MFA requires multiple verification forms, such as passwords and a unique code, to reduce unauthorized access risks.
The IONOS Cloud platform supports , which users can enable for their accounts. Contract owners and users with administrative privileges can manage users within the module, and enforce MFA on additional users, requiring them to complete the activation process before using granted services or resources.
Adhering to the principle of least privilege is crucial for minimizing the risk of unauthorized or unintended actions by users. In the IONOS Cloud platform, the owner of a contract and users with administrative privileges will receive maximum access to the platform, which also includes the right to manage the privileges and permissions of other users.
It is recommended to adhere to the following practices to mitigate the impact of compromised accounts or insider threats:
assess which users must have administrative privileges.
evaluate granting users the minimum level of access necessary to perform their job functions.
regularly review and only update access permissions as roles and responsibilities change.
Within the IONOS Cloud platform, you can create custom group profiles with , limiting access to only the necessary resources and actions. By assigning roles based on job responsibilities and regularly reviewing access permissions, you can ensure users have the appropriate level of access without unnecessary privileges.
The IONOS role and permission concept is explained in detail:
The first user who creates an account at IONOS becomes the respective account owner and the user:
receives all privileges and permissions.
cannot be revoked from this role.
will be the recipient of all legal communications. For example, changes in contract conditions like updates of terms and conditions, as well as invoices.
will always be allowed to access all resources within the account—independent of who created the resource/is the owner of the resource.
Perform regular access reviews and audits to identify and address security vulnerabilities or excessive user privileges:
Periodically review user accounts, permissions, and activity logs to ensure compliance with security policies
Promptly revoke access for users who no longer require it, for instance, when a user's role within your organization has changed and no longer requires access.
Establish routines to revoke access in a timely manner from users who have resigned.
The user can be promoted to the "Administrator" role, which automatically grants the user all privileges and permissions to all resources. The user in an administrator role:
has the same privileges as the account owner, except for changing the the payment method.
is authorized to add or remove users from the account except the owner's user account.
A "User" can be given explicit privileges and permissions.
Regular access reviews and audits are essential for identifying security vulnerabilities and excessive user privileges. Use the to monitor user activity and generate access reports. Review the reports to identify anomalies, such as unusual login patterns, and take appropriate action to mitigate risks. The reports contain the following:
User login data that indicates when did the user log in.
Data on device indicates the device information and the IP address.
Resource actions indicate what action was executed. Example: reading, creating, updating, or deleting resources.
User awareness is crucial for securing cloud environments. Educate users about best practices for password management, phishing awareness, and recognizing social engineering attempts. Encourage the use of strong, unique passwords and regular password updates.
Secure user access management is crucial for maintaining resource integrity and confidentiality in public cloud environments. Implementing strong authentication, PoLP, regular access review, and user education enhances security posture. In the next topic, we will explore best practices for securing within the public cloud.
has the right to add or remove additional users to or from the account, respectively.
The list of privileges keeps growing as new services are subject to be reflected within the privilege management.
When new services get added, they are not granted to users by default. It must be shared by the "owner" or "administrators" explicitly.
When a user has the "privilege" to create a resource—for example, a new virtual data center—the user becomes the owner of this resource. Even when the "privilege" is revoked, the user still has access to the resources created as the user owns them.
In addition, users can receive the share permission to share a resource with other groups they are members of. Once they share it with another group, they can only grant permissions they also have on this resource.
In this context, sensitive resources, such as, images, snapshots, and backups contain confidential data and all these resources are explicitly shareable resources. Again, "Administrators" will always have access to these confidential resources and can create, use, update, and delete them. They can also share these resources with other account members who are in the role of "Users."
"Users" must receive explicit share permission to access these resources. For example, when a "User" has access to backups, they are allowed to use the backup to restore the data on a new instance and access the data. You must be aware if the user has the qualifications as well as the permission to do so. You may need to decide per individual user and the sensitivity of data included in the data source, such as customer data, confidential data, etc. The same applies to images as well as snapshots.
IONOS Cloud allows creating custom group profiles, limiting access to resources and actions, assigning roles based on job responsibilities, and reviewing access permissions to ensure appropriate user access without unnecessary privileges. For more information, see Assign privileges to a group.
Performing regular access reviews and audits is crucial for identifying and addressing any security vulnerabilities or excessive user privileges. Periodically review user accounts, permissions, and activity logs to ensure compliance with security policies and promptly revoke access for users who no longer require it. For instance, when a user's role within your organization has changed and no longer requires access, establish routines to revoke access in a timely manner from users who have resigned.