Cloud Fabric Explanation
    • 10 Sep 2024
    • 5 Minutes to read

    Cloud Fabric Explanation


    Article summary

    Overview of Skillable Cloud Fabrics

    With Cloud Slice, you can provide individual Subscriptions (Microsoft Azure) or accounts (AWS) that may contain one or more cloud resources (Virtual Machines (VMs), networks, databases, websites, etc.). Each student will have access to the cloud subscription or account that is provided to them, along with the resources contained within that subscription/account, for the duration of the lab. The combination of one of these subscriptions/accounts, along with the resources contained within it, is collectively referred to as a Cloud Slice.

    With our Cloud Slice feature, you can also use your Microsoft Azure subscription or Amazon Web Services (AWS) account to create temporary subscription/account credentials for your lab users that will grant them access to delegated and tightly controlled administrative functions of the subscription or account.

    Additionally, Skillable Studio offers cloud virtualization for both Azure and AWS. Using either option you can deploy a virtual machine in the cloud environment, and access the VM in the lab, or access it in the cloud environment directly.

    Access Control

    Both AWS and Azure use Access Control Policies (ACP) to control resource provisioning to limit access in the subscription/account used in the lab.

    • Azure uses ACPs to limit what the user can do. By default, Azure allows every resource to be provisioned. It is up to the lab author to define in the ACP what the lab user is explicitly allowed to provision in the lab. Following best practices, the lab author does this by creating an ACP that denies all resources except those that are explicitly permitted by the ACP.

    • AWS uses ACPs to specify what the user can do. By default, AWS disallows every resource from being provisioned, and it is up to the lab author to define what the user can explicitly provision in the lab.

    The key takeaway is the AWS and Azure use very different permissions models.

    To mitigate risk, before a lab with any cloud configuration for Azure or AWS can be published in Skillable Studio, the lab must be evaluated for risk of abuse using the Skillable Cloud Security standards review. For more information about security reviews, read our Cloud Security Review documentation. Labs that are in development do not require a cloud security review.

    Amazon Web Services

    Amazon Web Services is another cloud provider Skillable Studio supports as a lab fabric. Using Cloud Slice you can build lab profiles similar Azure. Using stack deployments, you can customize the environment and the level of access your users have.

    For AWS cloud slice, we define a permissions boundary (AWS policy) that determines the maximum permissions that could potentially be granted to a lab user. We allow AWS lab users to create users. However, they have to be created by using the predefined AWS labsecureaccess policy, which limits the permissions that created user can have.

    In AWS, no resources are permitted to be provisioned, unless a lab user has an ACP assigned that explicitly permits provisioning the specific resource, and a policy in the permission boundary that allows the lab user to access the resource in AWS.

    For example, to allow a user to create an EC2 instance (virtual machine), we have to explicitly permit it by policy in the ACP on the lab profile and by policy in the permissions boundary in AWS.

    Microsoft Azure

    Microsoft Azure is one of the cloud providers Skillable Studio supports as a lab fabric. Using Cloud Slice you can build labs that either do or do not contain a virtual machine (VM) and you can use resource templates known as ARM templates to potentially pre-provision resources. Then you can use policies known as ACP’s to limit what users may have access to in your subscription.

    For Azure cloud slice we define roles; Owner, Contributor, and Reader, to determine what permissions a lab user has over the resource group in the case of Cloud Slice Resource (CSR), or over the subscription in the case of Cloud Slice Subscription (CSS). These roles are subsets of similarly named built-in Azure roles. When you use the lab platform to create a lab user, you must assign the user one of these 3 roles in the lab profile Cloud settings.

    In Azure, all resources are permitted to be provisioned, based on lab user's role permissions unless it is explicitly denied in an Access Control Policy (ACP).

    For example, if you have an ACP that allows all resources to be provisioned and you have an account that has Owner or Contributor role, you can create almost any kind of resource. The only limitations are those defined by your Azure subscription and Resource Group limits set by Microsoft. To mitigate risk, you will need to author and configure on the lab profile an ACP that denies access to all resources except those resources that are explicitly permitted by the ACP.

    Related Topics

    • AWS Permission Boundaries: Following the principle of least privilege, the permissions boundary ensures that users you create have only the permissions they require to perform lab tasks.

    • AWS Virtualization: This document describes the steps required to create a virtual machine that is hosted in AWS.

    • Azure Compute Gallery virtualization: Azure Compute Gallery is a service that allows you to create and share custom virtual machine (VM) images in Azure and then deploy virtual machines based on those images.

    • Cloud Security Review: Labs that use cloud orchestration are require a Cloud Security Review before they are available outside of Skillable Studio.

    • Cloud Security Standards: This document explains the nature of the risk associated with Cloud Slice labs and the Cloud Security Standards Skillable uses to help customers mitigate that risk.

    • Create an Access Control Policy: This document provides basic information on the steps for creating a restrictive Access Control Policy that limits a lab to only the resources it requires and will meet the cloud security standards criteria for acceptance.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.