AWS account management and separation
We recommend that you organize workloads in separate accounts and group accounts based on function, compliance requirements, or a common set of controls rather than mirroring your organization’s reporting structure. In AWS, accounts are a hard boundary. For example, account-level separation is strongly recommended for isolating production workloads from development and test workloads.
Manage accounts centrally: AWS Organizations automates AWS account creation and management, and control of those accounts after they are created. When you create an account through AWS Organizations, it is important to consider the email address you use, as this will be the root user that allows the password to be reset. Organizations allows you to group accounts into organizational units (OUs), which can represent different environments based on the workload’s requirements and purpose.
Set controls centrally: Control what your AWS accounts can do
by only allowing specific services, Regions, and service actions at the appropriate level.
AWS Organizations allows you to use service control policies (SCPs) to apply permission guardrails at
the organization, organizational unit, or account level, which apply to all AWS Identity and Access Management
Configure services and resources centrally: AWS Organizations helps
you configure AWS services
Use the delegated administration feature of security services to separate the accounts used for management from the organizational billing (management) account. Several AWS services, such as GuardDuty, Security Hub, and AWS Config, support integrations with AWS Organizations including designating a specific account for administrative functions.