This page is primarily for the cloud.gov team. It's public so that you can learn from it. For help using cloud.gov, see the user docs.
See how our AWS accounts work, including the list of accounts we have, how we manage our admin credentials, and how to file and escalate support tickets.
Levels of access
While we try to minimize interaction with AWS directly (explained in next section), there are three different levels of AWS IAM access, provided to different roles:
- Full administrative accounts: This is be provided to the people known in our compliance documentation as the “Cloud Operations team”.
- Read-only accounts: This is provided to GSA Security staff, who need access for incident response.
Restoring access for team members
If cloud.gov team members have lost access to their MFA application or need to reset their password, verify their identity and coordinate or pair with them.
- Find their user in AWS console.
- Delete any AWS access keys they may have in their account.
- Remove their MFA device.
- Reset their password and download the CSV from Amazon.
- Use https://fugacious.18f.gov to send them their credentials. Set the expiration to 2 views / 12 hours.
- Slack DM the Fugacious link to them. Remind them to set their two-factor authentication via MFA device.
*** Setting up two-factor authentication (required)
To set up multi-factor authentication (MFA):
- Click your account name in the upper right corner.
- Click ‘Security Credentials’.
- You might think this would be where you’d be able to add MFA. Sadly, no.
- Click ‘Users’ in the left-side menu.
- Search for your own username.
- Click your username.
- Click the resulting ‘Security credentials’ tab.
- Look for the words ‘Assigned MFA device’. If the words ‘No’ appear next to them, click the pencil icon and proceed from there.
Changing AWS configuration
As mentioned previously, the cloud.gov team tries to minimize the amount of direct access and manipulation made to AWS directly, instead favoring automation and configuration-as-code through BOSH and Terraform. Terraform is used to do the bootstrapping of the AWS environment—this information can be found in the cg-provision repository. This includes:
- EC2 instances for BOSH
- Networking (VPCs)
- Security groups
- User accounts to be used by BOSH and the various brokers
- S3 buckets for use by Cloud Foundry (the system itself, not tenants)
Any new/changed AWS configuration should be done in that repository and applied via Terraform.