-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use separate AWS accounts for Data Products / Teams #1687
Labels
data-platform-apps-and-tools
This issue is owned by Data Platform Apps and Tools
enhancement
enhancing an existing feature
Comments
bagg3rs
added
enhancement
enhancing an existing feature
data-platform-apps-and-tools
This issue is owned by Data Platform Apps and Tools
labels
Sep 27, 2023
Gary-H9
changed the title
↔️ Use separate AWS accounts for Data Products / Teams
↔️ Spike: Use separate AWS accounts for Data Products / Teams
Nov 14, 2023
2 tasks
This issue is being marked as stale because it has been open for 60 days with no activity. Remove stale label or comment to keep the issue open. |
This issue is being closed because it has been open for a further 7 days with no activity. If this is still a valid issue, please reopen it, Thank you! |
Added to #3107 |
jacobwoffenden
changed the title
↔️ Spike: Use separate AWS accounts for Data Products / Teams
Use separate AWS accounts for Data Products / Teams
Feb 15, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
data-platform-apps-and-tools
This issue is owned by Data Platform Apps and Tools
enhancement
enhancing an existing feature
User Story
As a Data Platform team member
I want to teams to be able to use AWS services and take ownership of their data
So that we can secure access to data and can allow innovation and not be held back by our platform
Value / Purpose
Questions
Hypothesis
If we give teams their own "storage" accounts
Then we give them the ability to use tooling within that account and we stop being a blocker (although we will still have controls on accounts to stop or alert on e.g. spend)
Additional Information
Would need AzureAD to be tied into AWS IAM Identity Center to ease user access
Definition of Done
The text was updated successfully, but these errors were encountered: