In this step your Cloud Administrators will either reuse an existing AWS Organizations management AWS account or use the standard AWS new account creation process to create a new “management” AWS account.
This step should take about 20 minutes to create a new AWS management account and just a few minutes to prepare an existing AWS management account.
AWS accounts are coarse grained resource containers that help you isolate and help secure different collections of cloud resources and data. Use of multiple AWS accounts can help make your use of cloud more secure by providing clear ownership and control boundaries and lowering the blast radius of any particular set of cloud resources.
In support of your initial need for team development environments, this guide first leads you through the process to create an initial set of foundation and builder team development AWS accounts. Later in the guide, you will create a series of test and production AWS accounts to isolate the formal test and production environments from your development environments.
Over the course of your cloud adoption journey, you will likely end up with a number of accounts ranging from a dozen or so to hundreds depending on the size of your application and data services portfolio and the granularity by which you choose to isolate the associated cloud resources and data across your environments and across the software development lifecycle (SDLC).
Determine whether you will create a new management AWS account or reuse an existing management AWS account in order to use AWS Control Tower to establish your initial landing zone.
Review Plan Your AWS Control Tower Landing Zone for guidance when considering whether or not to use an existing management AWS account.
If you plan to create a new management AWS account, proceed to the next step.
If you’d like to reuse an existing management AWS account, proceed to Create an IAM user for Administrative Bootstrap Purposes to ensure that you have a suitable AWS IAM administrative user account that you’ll use in the next section.
The initial AWS account that you create will be configured as a new management AWS account in which billing for AWS services consumed across accounts will be consolidated and your Cloud Administrators will provision new “member” AWS accounts for builder teams.
After you create your new management AWS account, you can make use of a standard process to move any existing AWS accounts into your new management AWS account so that you can easily consolidate billing and day-to-day management of all of your AWS accounts.
Visit Create an AWS Account and enter the the required information on the following page.
|Email address||A unique email address that identifies the AWS account and is the name of the AWS account root user.||Use the management AWS account root user email address that you already established. Since this email address is used to initially access your AWS account, be very careful that you enter the correct email address and that you have access to the email account.|
|Password||A password for the AWS account root user.||Ensure that you secure this value. In a later step, you’ll have the option to enable Multi-factor Authentication (MFA) - a highly recommended approach to help secure your AWS account.|
|AWS account name||A brief identifier for the AWS account.||For example,
Set your account to either personal or professional. Both types of accounts have the same functionality and features. Enter your personal or professional information and then read and accept the AWS Customer Agreement.
At this point, you’ll have an account created and you’ll get a confirmation email. However, you’ll need to enter billing information before you can continue.
Add a payment method and contact information for the billing method. You’ll go through a brief account verification process via a mobile device so enter a phone number you have current access to.
On the Select a Support Plan page, choose one of the available support plans. Since you’re going to be using AWS for formal development and eventually production purposes, we recommend that you start by selecting at least “Developer” support.
Before you transition any applications or data services to production, it’s strongly recommended that you upgrade to “Business” support.
Once you are preparing to host business critical workloads and data in the cloud, you should consider upgrading to “Enterprise” support levels.
See AWS Support Plans for a description of features and benefits of each level of support.
In a few minutes your account should be fully activated and you’ll receive a confirmation email. If you don’t, review the troubleshooting steps from the Create and Activate an AWS Account support page
It’s strongly recommended and an AWS security best practice to enable multi-factor authentication (MFA) to the AWS account root user and to avoid using the root user, even for administrative tasks, from this point forward.
See Enable MFA on the AWS Account Root User for instructions.
Do not create administrative access keys for the root user: Under no circumstances create programmatic access keys for your AWS account root user and administrative bootstrap users.
Using the root user, set the Alternate Contacts for your account so that notifications of billing, operations, and security events are routed to the proper teams. As a best practice, you can use email distribution lists so that notifications are set to multiple people in the same team.
Access Account Settings in the AWS Management Console to set the Alternate Contacts.
Although you will be provisioning cloud administrator and builder user accounts via the AWS Single Sign-on (SSO) service later in this guide, it is required that you first create an administrative bootstrap user account via the AWS Identity and Access Management (IAM) service and switch to that user to set up the next parts of your initial foundation.
This administrative user should be only used to complete your initial foundation setup and act as a “break glass” user in case access via AWS SSO user accounts encounters an issue.
While logged in as the root user, follow the instructions in Create an IAM user to create this administrative user.
Once the user has been created, sign into the AWS Management Console as the user and enable MFA to help secure the account. See Enable a Virtual MFA Device fo an IAM User.