Skip to main content
⏳ Estimated read time: 3 min read

Role-Based Access Control (RBAC)

For Platform and DevOps Engineers

Overview

StackGen provides robust Role-Based Access Control (RBAC) and Governance features, enabling you to enforce security, compliance, and operational consistency across multiple teams and cloud environments. This document outlines StackGen’s RBAC model and governance capabilities in a user-friendly manner for Admins, DevOps Engineers, and Developers.

RBAC Levels and Roles

RBAC in StackGen ensures that only authorized users have access to infrastructure as code (IaC) resources and operations. The model is structured across different levels, namely Enterprise, Teams and User. Let's understand how RBAC permissions are scoped across these following levels:

Team Assigned Roles

LevelPermissions
Admin/Devops
  • Admin and DevOps users can create governance configurations within a Team.
  • Admin and DevOps users can enforce governance configurations for their assigned teams.
  • Developers have limited access and cannot modify governance settings.
DeveloperDevelopers can create and manage their own appStacks and repositories but cannot assign governance policies.

User Assigned Roles

A user in StackGen, depending on the tasks performed, can be assigned one of the following roles:

RoleDescription
Admin
  • Full control over team creation and membership.
  • Full control over governance configurations and assigning governance to teams to enforce security rules.
  • Can manage user roles.

Examples:
  • A governance configuration that enforces using specific IAM-permissions for accessing an S3 bucket
  • A governance configuration that only allows developers to use specific AWS resources.
DevOpsFull control over governance configurations and assigning governance to teams to enforce security rules.
DeveloperBasic access to resources within their workspace but cannot modify governance settings or access control policies.

Enterprise Wide Sharing

You can manage policies and modules at the enterprise level, thus ensuring that they are shared across teams.

Key Advantages of RBAC

Let's see how RBAC in StackGen can be applied to various user roles and across levels:

  • Custom IAM Policy Enforcement: StackGen enables role-based access to cloud resources by enforcing IAM (Identity and Access Management) policies. This lets your Admin and DevOps users assign policies that restrict access to specific resources based on user roles.
  • Policy enforcement: Security and compliance policies are enforced at different levels (Organization, Team, User). Thus ensuring that the Developers have limited access, ensuring they cannot override security policies set by Admin and DevOps users.
  • Governance configuration: Admin and DevOps users can define and apply governance configurations to enforce security and compliance across teams. These governance rules ensure that your Infrastructure-as-Code (IaC) adheres to your organizational security policies.

Assign Roles to Users (Members) Onboarded to StackGen

By default, StackGen assigns the role of Developer to a user (member) that's onboarded to the platform. Administrators can change the default assignments by following these steps:

  1. From the StackGen Home page, click the profile dropdown and select Settings.
  2. Click Members.
  3. You can select one or many users from the list. You can search for user(s) via the Search bar and refine your search by using the Role dropdown.
  4. You can select the Change Roles option by either clicking the:
    • More Actions dropdown to change role assignments for multiple users.
    • The ellipse ⋮ icon under Actions column for a single user.
  5. Select the roles that you want to assign to the users(s).
  6. Click Change Role.