Enabling trusted access for AWS Account Management
Enabling trusted access for AWS Security Incident Response allows the delegated administrator of the management account
to modify the information and metadata (for example, primary or alternate contact details)
specific to each member account in AWS Organizations.
Use the following procedure to enable trusted access for AWS Security Incident Response in your
organization.
To perform these tasks, you must meet the following requirements:
- Console
-
To enable trusted access for AWS Security Incident Response
-
Sign in to the AWS Organizations
console. You must sign in as an IAM user, assume an IAM
role, or sign in as the root user (not recommended) in the
organization’s management account.
-
Choose Services in the navigation pane.
-
Choose AWS Security Incident Response in the list of services.
-
Choose Enable trusted access.
-
In the Enable trusted access for AWS Security Incident Response
dialog box, type enable to confirm it, and then
choose Enable trusted access.
- API/CLI
-
To enable trusted access for AWS Account Management
After running the following command, you can use credentials from the
organization's management account to call Account Management API operations that use the
--accountId
parameter to reference member accounts in an
organization.
-
AWS CLI: enable-aws-service-access
The following example enables trusted access for AWS Security Incident Response in the
calling account's organization.
$
aws organizations enable-aws-service-access \
--service-principal security-ir.amazonaws.com
This command produces no output if it's successful.