The alert hit at 02:13. Someone was using credentials they should never have had.
Attribute-Based Access Control (ABAC) slams the gate fast. It uses attributes—user tags, resource tags, context data—to decide in real time who gets access. No fixed roles. No static policies to forget about. ABAC lets your rules breathe. It adapts as identities, resources, and environments change.
In AWS, CloudTrail logs are the black box recorder. Every call, every action—captured. But too many teams store the logs and never mine them. That’s where ABAC CloudTrail query runbooks come in. A runbook turns your rules into executable queries. The right one will pull up every event where access was granted or denied based on a specific attribute set. You see the exact line where policy met reality.
Start by binding attribute logic into IAM policies: user.department = resource.department, resource.classification = "public". Then, write CloudTrail Insights queries to find violations. For example, list GetObject calls where requester tags don’t match bucket tags. Track source IP attributes against expected ranges. Identify privilege escalations tied to unapproved attributes.