Add a Community Repo Here (email contact on repo for access): https://github.internet2.edu/cloud
Once an account has been provisioned. There are a number of configuration items to set before providing the account to its eventual owner. Admin role creation, linking the account with a campus Identity Provider, and enabling logging are just a few of the items. Some of these can be completed programmatically, but others are a strictly manual process. Below are some examples of how the community is tackling this work.
Cornell University Example
In consultation with Cornell IT Security Office and Cornell financial administrators, two "standard" configurations of AWS accounts have been defined, one for general uses and one for research. Each configuration follows AWS, Cornell, and security best practices. Not all best practices can be implemented by policy and configuration. Individual AWS users also need to follow best practices see the Cloudification Services Tech Blog and AWS IAM best practices documentation.
See: https://confluence.cornell.edu/display/CLOUD/Standard+AWS+Account+Configurations
AWS Account Setup Example GitHub Repo: https://github.com/CU-CommunityApps/aws-account-setup-example
University of Arizona Example
The University of Arizona has a set of CloudFormation templates we use to set up new central IT accounts.
U of A CloudFormation Template Library: https://bitbucket.org/ua-ecs/service-catalog/src/431a87662f35546324e786b0ce9e7befee16d8fa/portfolios/account-foundation/?at=master
University of Iowa Example
Dave Miller presenting on May 22nd, 2017.
University of Illinois Example
University of Illinois uses Active Directory and Shibboleth to grant access to an AWS account. AWS accounts configured under our campus contract use Shibboleth as the default login mechanism to the AWS Console. More information can be found here: https://answers.uillinois.edu/page.php?id=71883