You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Once an account has been provisioned. There are a number of configuration items to set before providing the account to its eventual owner. Admin role creation, linking the account with a campus Identity Provider, and enabling logging are just a few of the items. Some of these can be completed programmatically, but others are a strictly manual process. Below are some examples of how the community is tackling this work.

Cornell University Example

In consultation with Cornell IT Security Office and Cornell financial administrators, two "standard" configurations of AWS accounts have been defined, one for general uses and one for research. Each configuration follows AWS, Cornell, and security best practices. Not all best practices can be implemented by policy and configuration. Individual AWS users also need to follow best practices see the Cloudification Services Tech Blog and AWS IAM best practices documentation.

See: https://confluence.cornell.edu/display/CLOUD/Standard+AWS+Account+Configurations

AWS Account Setup Example GitHub Repo: https://github.com/CU-CommunityApps/aws-account-setup-example

 

University of Arizona Example

The University of Arizona has a set of CloudFormation templates we use to set up new central IT accounts.

U of A CloudFormation Template Library: https://bitbucket.org/ua-ecs/service-catalog/src/431a87662f35546324e786b0ce9e7befee16d8fa/portfolios/account-foundation/?at=master

 

University of Iowa Example

Dave Miller presenting on May 22nd, 2017.

Dave Miller - University of Iowa - AWS Account Management-1.m4v

  • No labels