【发布时间】:2020-03-04 15:22:47
【问题描述】:
我在 AWS 中使用密钥管理服务 (KMS),目前正在设置 key policies。
我创建了两个角色 KmsUser 和 KmsAdmin,并将以下密钥策略附加到我的 CMK:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "KMS KeyAdmin access",
"Effect": "Allow",
"Principal": {"AWS": [
"arn:aws:iam::1234567890:role/KmsAdmin",
"arn:aws:iam::1234567890:user/myadmin"
]},
"Action": [
"kms:Create*",
"kms:Describe*",
"kms:Enable*",
"kms:List*",
"kms:Put*",
"kms:Update*",
"kms:Revoke*",
"kms:Disable*",
"kms:Get*",
"kms:Delete*",
"kms:TagResource",
"kms:UntagResource",
"kms:ScheduleKeyDeletion",
"kms:CancelKeyDeletion"
],
"Resource": "*"
},
{
"Sid": "KMS KeyUser access",
"Effect": "Allow",
"Principal": {"AWS": [
"arn:aws:iam::1234567890:role/KmsUser"
]},
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncrypt*",
"kms:GenerateDataKey*",
"kms:DescribeKey"
],
"Resource": "*"
}
]
}
问题是,现在如果我尝试将我的密钥用作 myadmin 用户(附加了 AdministratorAccess 策略),我会在 CLI 中收到错误:
$ aws kms encrypt --key-id "alias/test-key" --plaintext fileb:///tmp/plaintext.dat
An error occurred (AccessDeniedException) when calling the Encrypt operation: User: arn:aws:iam::1234567890:user/myadmin is not authorized to perform: kms:Encrypt on resource: arn:aws:kms:eu-north-1:1234567890:key/99999999-9999-9999-9999-99999999999
特别奇怪的是,IAM policy simulator 告诉我一切都应该按预期工作:
如果我手动将 myadmin 用户添加为 Key User 策略的主体,则一切正常。
【问题讨论】:
-
其实以上政策是针对职责分离的。密钥管理员不应该能够使用密钥加密或解密数据。所以管理员可以管理密钥,但不能访问数据。密钥用户可以加密或解密数据,但不能管理密钥。所以正确的答案是使用 KmsUser 角色来解密/加密。
标签: amazon-web-services amazon-iam aws-kms aws-policies