AWS Infrastructure

AWS IAM Assuming Roles

Assume Role via AWS Web Console Important Due to the security implications, IAM policies are set up by default to only allow the root AWS account to assume roles into other accounts. Log into the AWS root acccount Example AWS root login Click on [email protected] @ example-root-aws drop down at the top of the console and select Switch Role Enter the AWS account id of the member account in the Account field Use OrganizationAccountAccessRole as the Role (Optional) Pick Display Name and choose a Color for the role Example AWS switch role Assume Role via CLI (using aws-vault) First, ensure that the proper profiles are setup following Authorization.

AWS IAM Authorization

You can access AWS by Web console or AWS CLI. Authorization via Web Console Authorization using AWS CLI Authorization is setup using aws-vault documented here.


Route 53 Best Practices

Use very short TTLs on SOA records (E.g. 60 seconds or less) Delegate Zones to every organization or use dedicated zones per organization (e.g.,, Use ALIAS records to map zone apex record to ELBs