Best Practices for IONOS Cloud Security Products
Secure user access management
User access management is crucial for a secure cloud environment. It prevents unauthorized access, mitigates data breaches, and ensures regulatory compliance. This topic explores practical examples and best practices for securing user access in a public cloud environment.
Implement strong authentication mechanisms
For enhanced user access security, it is vital to use secure and strong authentication mechanisms that apply to any user, independent of whether it is the owner of an account or users added to the account with roles of administrators or read-only access. You need to use:
1. The service login credentials are confidential information and must be handled accordingly. Usually, they consist of a user identifier, such as an email address and a strong password.
2. The service login credentials require a strong user identifier and password. For example, an email address and a strong password. Common and weak passwords, such as the following, are frequently found in breach lists:
123456
password
qwerty
abc123
letmein
Warning: Using any of the above-mentioned passwords or easily guessable patterns is strongly discouraged, as they are highly vulnerable to brute-force attacks.
The source of this information is based on an analysis of various data breaches and password dumps that have occurred over the years. Websites and services such as Have I Been Pwned and data security reports often compile and analyze this data to raise awareness about the importance of strong passwords and security practices.
3. Complex passwords are difficult for humans to remember, so use safe password vaults to store data across multiple services securely. It also helps to use different complex passwords across multiple services and allows the introduction of password retention periods. This protects you if one service gets compromised; other services might not be affected. In any case, passwords do not belong in easy-to-access places like post-its stuck to your monitor.
4. The essential step of strong authentication is using unique, complex, and lengthy passwords. To make it secure, it is recommended that all user accounts utilize Multi-Factor Authentication (MFA). MFA requires multiple verification forms, such as passwords and a unique code, to reduce unauthorized access risks.
The IONOS Cloud platform supports Multi-Factor Authentication, which users can enable for their accounts. Contract owners and users with administrative privileges can manage users within the User Management module, and enforce MFA on additional users, requiring them to complete the activation process before using granted services or resources.
Applying the Principle of Least Privilege (PoLP)
Adhering to the principle of least privilege is crucial for minimizing the risk of unauthorized or unintended actions by users. In the IONOS Cloud platform, the owner of a contract and users with administrative privileges will receive maximum access to the platform, which also includes the right to manage the privileges and permissions of other users.
It is recommended to adhere to the following practices to mitigate the impact of compromised accounts or insider threats:
assess which users must have administrative privileges.
evaluate granting users the minimum level of access necessary to perform their job functions.
regularly review and only update access permissions as roles and responsibilities change.
Within the IONOS Cloud platform, you can create custom group profiles with fine-grained privileges, limiting access to only the necessary resources and actions. By assigning roles based on job responsibilities and regularly reviewing access permissions, you can ensure users have the appropriate level of access without unnecessary privileges.
IONOS role and permission concept
The IONOS role and permission concept is explained in detail:
The first user who creates an account at IONOS becomes the respective account owner and the user:
receives all privileges and permissions.
cannot be revoked from this role.
will be the recipient of all legal communications. For example, changes in contract conditions like updates of terms and conditions, as well as invoices.
will always be allowed to access all resources within the account—independent of who created the resource/is the owner of the resource.
has the right to add or remove additional users to or from the account, respectively.
Perform regular access reviews and audits to identify and address security vulnerabilities or excessive user privileges:
Periodically review user accounts, permissions, and activity logs to ensure compliance with security policies
Promptly revoke access for users who no longer require it, for instance, when a user's role within your organization has changed and no longer requires access.
Establish routines to revoke access in a timely manner from users who have resigned.
Users in an Administrator role
The user can be promoted to the "Administrator" role, which automatically grants the user all privileges and permissions to all resources. The user in an administrator role:
has the same privileges as the account owner, except for changing the the payment method.
is authorized to add or remove users from the account except the owner's user account.
Users with explicit privileges and permissions
A "User" can be given explicit privileges and permissions.
Review and audit user access regularly
Regular access reviews and audits are essential for identifying security vulnerabilities and excessive user privileges. Use the IONOS Activity Log Service API to monitor user activity and generate access reports. Review the reports to identify anomalies, such as unusual login patterns, and take appropriate action to mitigate risks. The reports contain the following:
User login data that indicates when did the user log in.
Data on device indicates the device information and the IP address.
Resource actions indicate what action was executed. Example: reading, creating, updating, or deleting resources.
User awareness is crucial for securing cloud environments. Educate users about best practices for password management, phishing awareness, and recognizing social engineering attempts. Encourage the use of strong, unique passwords and regular password updates.
Conclusion
Secure user access management is crucial for maintaining resource integrity and confidentiality in public cloud environments. Implementing strong authentication, PoLP, regular access review, and user education enhances security posture. In the next topic, we will explore best practices for securing Virtual Machines (VM) within the public cloud.
Last updated