Now running since 2021, Navan’s new system has proven to be a virtually zero-maintenance solution. The identity management process currently involves just a few automatic steps. First, the ULC component quickly reads whether the user is allowed to sign in to specific AWS accounts. It also reads whether the user has been locked out of AWS or Okta and should thus be removed from the remaining databases. And it reads from a custom database that tells ULC what attributes to field for a particular identity. As a result, Navan can follow the principle of least privilege—giving users the minimum amount of access they need for doing their jobs—by limiting developer access to AWS based on a specific list of attributes.
For example, when a new software architect comes on board, the cloud security team can map the architect’s account to the necessary privileges in advance to make provisioning simple. However, if an account is provisioned without preset privileges, the identity is instead given a default minimum set of attributes. These features streamline the process without limiting Navan’s ability to customize permissions. Even the default set of attributes can be based on some Okta data, such as the user’s department. Meanwhile, Navan has granular control over all privileges using permission sets through AWS IAM Identity Center.
On AWS, Navan has accelerated the process for provisioning and deprovisioning users, groups, and accounts. The previous system used to take 25–30 minutes to scan 10,000 users. Using AWS IAM Identity Center, it takes 1–2 minutes. The company is using its identity management solution to support multiple accounts in AWS Organizations and gain visibility into security and compliance across all accounts.
“At any given time, we can pull out the statistics about any given user: when they were provisioned, when they were deprovisioned, if it happened through the automated process, and more,” says Iurchenko. “We have all the details, which unlocks high visibility for our own security and compliance reasons.” Further, Navan has automated quarterly compliance tickets and stores all changes it makes in GitHub so that it has simple access to a full record. “Compliance audits have become much simpler,” says Gusakov.
On AWS, Navan engineered an automated solution that provides centralized governance and embarked on a journey to least privilege. “We’ve received great support from AWS with the services that we’re currently using,” says Iurchenko. “We have a very productive collaboration with the AWS team.”