Trusted answers to developer questions
Trusted Answers to Developer Questions

Related Tags


How to secure our AWS accounts

Anjana Shankar

This shot lists five steps we can follow to secure our Amazon Web Services (AWS) account.

If our AWS root user account is compromised, every resource and data in our account can be exposed to attackers. Therefore, we should make sure we don’t share our account credentials with anyone. To keep our root account secure, it’s a good practice to:

  • Delete the access keys associated with the root account.
  • Enable Multi-Factor Authentication (MFA).

Following the principle of least privilege

In information security, the principle of least privilege dictates that we give users the least amount of access necessary to complete their tasks.

It is advised to grant users only the permissions that are necessary to do a particular job. We should start by denying all permissions, and then grant additional permissions as necessary for the user, group, or role.

Using IAM for all authorizations

Identity and Access Management (IAM) provides a way to create and manage users, groups, and roles that provide secure access to our AWS account and resources.

Using IAM roles

It is easier to maintain roles than users. When we assume an IAM role, a short-term temporary credential allows us to access the resource temporarily. After some time, the given temporary credential expires automatically.

Using an identity provider

An Identity Provider (IdP) is a trusted third-party company that creates and manages an AWS user identity and associated identity attributes.

Using an IDP allows us to use identities that are federated from our IDP for access control.


Securing our AWS account is crucial to the overall security of our applications. Thus, we should follow these steps to ward off security threats and safely use AWS.



View all Courses

Keep Exploring