It is recommended to organize workloads into separate AWS accounts rather than by organizational structure or departments. The most effective separation is based on:
Reason: In AWS, accounts act as a strong isolation boundary to limit risk spread. For example, you should use separate accounts to isolate production environments from development and testing environments to ensure safety and stability.
AWS Organizations is a tool that helps you automate the creation, management, and coordination of AWS accounts within a large organization.
When creating new accounts through Organizations, be careful with the email address used, as this is the root account and will be used to recover the password if needed.
Organizations also allow you to group accounts by usage purpose through Organizational Units (OU).
For example, you can group accounts belonging to production environments into one OU, and development accounts into another OU to apply appropriate policies.
You can restrict AWS account behaviors by using Service Control Policies (SCPs) — policies applied at the organization, OU, or specific account level.
SCPs allow you to:
For example, you can create an SCP that prevents users from creating resources outside the Asia Pacific region if your organization only wants to operate services in that region.
AWS Control Tower is a tool that simplifies this entire setup process. It helps you:
With AWS Organizations, you can apply AWS service configurations across all accounts in your organization.
Some practical examples:
You should separate security administration accounts from billing or general operational accounts.
Some services like:
SEC01-BP01 Isolate workloads by account
SEC01-BP02 Secure root user account and its attributes