Employee Management

Last Updated: Tuesday, 01 January 2017 02:43AM v091bh12


REOL Services has established, tested and proven procedures to mitigate internal risk.

  • Isolated development, staging and production environments
  • IAM users locked in IAM groups (with policy reviews)
  • IAM Access credentials expiration
  • MFA/2FA enforcement
  • Authenticated VPN pass-through, no direct access
  • Identity Federation
  • Our credential management is decentralized

In a hypothetical event of employee dismissal or resignation a similar procedure is activated (details omitted):

  1. production and staging access revoked
  2. development access revoked, NFS flushed, shared user/home directory inaccessible
  3. Git, GitHUB credentials removed from organization, 2FA deactivated
  4. VPN credentials flushed from main cert
  5. Network access disabled (static IP reassigned to IoT)
  6. RADIUS WiFI access points cleared
  7. Propagation of SSH keys removal from BLESS (if applicable)
  8. SSO disabled for access to local domains (openResty+LUA nginx based, mysql backed central authority)
  9. Automated scrubbing to remove local user, web-server configurations, and services provisioned to the specific employee

Expected turn-around is under 20 minutes from start.


Learn more:

AWS Security Best Practices