The EMR Studio instructions appear to be intended for people to set up the studio in the Organizations management account, which is against AWS best practices. Like, you *really* don't want to do that. @abysinha
The docs recommend that the person setting up EMR Studio also have full permissions to AWS SSO. It think it's likely the case that a security team would not be happy about a data team introducing a new authentication method on their own.
https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-studio-admin-role.html
They additionally don't split the AWS SSO permissions, which *have* to be in the Org mgmt acct, from the rest of the EMR permissions, implying they are expecting these actions to be taken in the same account.
And it's a *lot* of permissions. Basically full access to VPC configuration, a bunch of service catalog stuff...not things you just want to hand over in your Org mgmt account. Ever.
Not only that, but you don't actually tell EMR the AWS SSO instance id, which is weird. You just tell it to use "SSO auth", and that's that. What happens when AWS SSO supports multiple instances?
So now you've got your EMR Studio in your Org management account, and you have to create a service role for it to access resources. So now you're handing Studio *users* permissions in your mgmt account, or potentially worse, cross-account permissions *from* mgmt into the Org
This is, frankly, a nightmare
You can follow @ben11kehoe.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.