Least Privilege Access

Architecture

Build a layered access control strategy using the access-policy module:

  • Service Policies for application roles with minimal required permissions
  • Permission Boundaries to cap maximum privileges for delegated administration
  • SCPs for organization-wide guardrails

When to Use

This pattern is ideal when you need:

  • To comply with security frameworks (SOC 2, ISO 27001, PCI-DSS)
  • Fine-grained control over what each service or user can access
  • Defense in depth through multiple policy layers
  • Audit trails showing explicit access grants

Considerations

  • Start with deny-all, then explicitly allow required actions
  • Review and audit policies regularly
  • Use resource restrictions whenever possible
  • Test policies in non-production environments first