Design Secure Access To AWS Resources

Published: (February 1, 2026 at 01:19 AM EST)
6 min read
Source: Dev.to

Source: Dev.to

Exam Guide: Solutions Architect – Associate

🛡️ Domain 1 – Design Secure Architectures

📘 Task Statement 1.1

Secure access means you can clearly answer the following questions:

  1. Who is trying to access AWS?
  2. What are they allowed to do?
  3. Where are they allowed to do it (which account / which resources)?
  4. How are they proving it’s really them (password, MFA, federation)?
  5. How long should that access last (temporary vs. long‑term)?

This task is mostly about identity + permissions + multi‑account setup.

Knowledge

1️⃣ Access Controls and Management Across Multiple Accounts

As a company grows, a single AWS account becomes messy:

ProblemImpact
Too many people and teams in one placePermissions become inconsistent and hard to audit
Inconsistent permissionsMistakes have a bigger blast radius
Hard to separate dev/test/prodIncreases operational risk

A multi‑account strategy helps you:

  • Isolate workloads (dev / prod)
  • Apply security rules consistently
  • Reduce risk

Common Patterns

PatternWhat it solvesBeginner way to think about it
AWS Organizations + Organizational Units (OUs)Managing many accounts as one familyA folder system for accounts + shared rules
AWS Control TowerSetting up multi‑account the standard wayA guided setup for a secure multi‑account environment
SCPs (Service Control Policies)Guardrails across accountsEven admins can’t do this” rules

Note: SCPs do not grant permissions. They only set the maximum allowed actions in an account/OU. You still need IAM permissions to allow anything.

2️⃣ AWS Federated Access and Identity Services

IAM & IAM Identity Center

Instead of creating an AWS username for every employee, many organizations use federation so people sign in with their existing corporate login.

ComponentDescription
IAM (Identity and Access Management)Core permissions engine – contains users, groups, roles, and policies
IAM Identity Center (AWS SSO)Central sign‑in for workforce access across accounts – ideal for multiple accounts and a single place to manage access

Simple Comparison

OptionBest forWhy it’s safer
IAM Users (long‑term)Small/simple setups, limited casesWorks, but passwords/keys can spread and are harder to manage safely
Federation / IAM Identity CenterTeams, companies, multiple accountsCentral login, easier off‑boarding, fewer long‑term credentials

Recommendation: Prefer roles + federation for humans, and avoid creating lots of IAM users with long‑term credentials.

3️⃣ AWS Global Infrastructure

Regions & Availability Zones

  • Some services are global (e.g., IAM, Route 53) – identity or permissions concepts apply broadly.
  • Many resources are regional – they live in a specific Region.

Your access rules may include where actions are allowed, for example:

  • “Only allow deployments in eu‑west-1
  • “Deny creating resources outside approved Regions

4️⃣ AWS Security Best Practices

Principle of Least Privilege

Least privilege means:

  1. Don’t give “admin” unless truly needed.
  2. Grant only the actions required for the job.
  3. Limit access to specific resources – avoid Resource: "*" whenever possible.

Examples

Too openBetter
Action: "*" on all S3 bucketsAction: "s3:GetObject" on a specific bucket/folder
Full EC2 managementAction: "ec2:StartInstances" / ec2:StopInstances on specific instance IDs

If you see broad permissions like Action: "*", the “best answer” is usually narrower permissions + conditions.

5️⃣ The AWS Shared Responsibility Model

ResponsibilityAWSCustomer
Physical infrastructureData‑center hardware, power, cooling
Underlying service infrastructureCompute, storage, networking
Availability of servicesService uptime SLAsArchitecture decisions (multi‑AZ, backups, DR)
Security of the cloudPhysical security, host OS, hypervisorIAM permissions, data encryption, network configuration

Security is shared:
AWS secures the cloud; you secure what you put in the cloud.

Skills

A – Apply Best Practices to IAM Users and Root Users

Multifactor Authentication (MFA)

  • The root user is the account’s master key.
  • Enable MFA on the root user and never use root for daily tasks.
  • Use roles or controlled identities for admin work.

Scenario tip: If a question says “root user used daily,” the fix is almost always: enable MFA and stop daily root usage.

B – Design a Flexible Authorization Model (Users, Groups, Roles, Policies)

ElementPurpose
PoliciesPermission rules (allow/deny)
RolesTemporary “job hats” you assume
UsersIndividual logins (human or service)
GroupsAttach the same policies to many users at once
  • Humans → sign in via Identity Center / federation → assume roles.
  • Applications / services → use roles (no long‑term access keys in code).

C – Role‑Based Access Control (RBAC) Strategy

  • Access is granted by assuming a role, not by permanent admin rights.

AWS STS (Security Token Service)

  • Issues temporary credentials → reduces long‑term secret exposure.
  • Enables clean cross‑account access.

Cross‑Account Access

  • Users in Account A assume a role in Account B.
  • No shared passwords, no copying access keys between accounts.

D – Multi‑Account Security Strategy

Control Tower & Service Control Policies

  • Use a structured account layout (e.g., prod / dev / security).
  • Apply org‑wide guardrails with SCPs to keep shared security functions isolated.

SCP Mindset

Policy typeEffect
IAM PoliciesWhat a principal can do (allow/deny)
SCPsWhat an account is ever allowed to do (maximum boundary)

Effective permissions = Allowed by IAM AND not blocked by SCP.

E – Determine Appropriate Use of Resource Policies

Some AWS services support resource‑based policies (e.g., S3 bucket policies, SNS topic policies, SQS queue policies). Use them when you need to:

  • Grant cross‑account access directly on the resource.
  • Allow services to act on your behalf (e.g., Lambda invoking an S3 bucket).
  • Apply conditions that are easier to express on the resource than in an IAM policy.

Summary

  • Identify who, what, where, how, and for how long access is needed.
  • Leverage multi‑account designs, AWS Organizations, and Control Tower for isolation and governance.
  • Prefer federation + roles over long‑term IAM users.
  • Apply least‑privilege principles, MFA, and SCPs to enforce guardrails.
  • Use resource policies where they simplify cross‑account or service‑to‑service permissions.

Keep these concepts handy for the Design Secure Architectures domain of the Solutions Architect – Associate exam.

Resource‑Based Policies

Definition: Policies that are attached directly to the resource.

Common examples

  • S3 buckets
  • SQS queues
  • SNS topics
  • KMS keys
  • Lambda functions

Typical uses

  • Cross‑account access to a bucket, queue, or topic
  • Service‑to‑service permissions
  • Enforcing conditions (e.g., “HTTPS only”)

Decision Table

Goal / QuestionBest tool
Give a user/role permissions generallyIdentity‑based policy (IAM policy)
Control access directly on the resourceResource‑based policy
Allow cross‑account access cleanlyOften role assumption + sometimes a resource policy (depends on the service)

When to Federate a Directory Service With IAM Roles

Federation is ideal when:

  • Users already have corporate identities (Google Workspace, Okta, Azure AD, AD, etc.)
  • You want easy onboarding and off‑boarding
  • You want fewer long‑term IAM users
AudienceRecommended approach
Workforce (employees/contractors)Federation / IAM Identity Center
Workloads (apps/services)IAM roles

Cheat Sheet

ScenarioRecommended solution
Many AWS accountsOrganizations / Control Tower + SCPs
Employees use corporate loginFederation / IAM Identity Center
Third‑party needs accessCross‑account role + temporary credentials (STS)
Avoid storing keys in codeUse roles (temporary credentials)
Restrict actions across the orgSCP guardrails
Grant access to a specific resourceResource‑based policy (or resource policy + role)

Recap Checklist ✅

If you can explain these ideas in simple terms, you are well‑prepared for Task Statement 1.1:

  1. The root user is protected with MFA and not used for daily work
  2. IAM roles are preferred over long‑term IAM users
  3. Least privilege is applied: only needed actions, only needed resources
  4. Multiple AWS accounts are managed centrally
  5. Cross‑account access uses role assumption: temporary credentials
  6. Workforce access uses federation or IAM Identity Center
  7. You understand when to use identity‑based vs. resource‑based policies

AWS Whitepapers and Official Documentation

These are the primary AWS documents behind Task Statement 1.1.
You don’t need to memorize them; use them to understand why AWS security works the way it does.

Core Whitepapers

Identity and Federation References

Multi‑Account and Governance References

Back to Blog

Related posts

Read more »

34.Copy Data to S3 Using Terraform

Lab Information The Nautilus DevOps team is currently performing data migrations, moving data from on‑premise storage systems to AWS S3 buckets. They have rece...