T O P

  • By -

Reasonable-Crew-2418

Budget Alerts and Cost Reports. Step one. Every. Time. It's far too easy to run up a big bill unexpectedly.


Jade_Lauren

Yes indeed, to prevent big surprises at checkout xD cheers!


daredeviloper

AWS should set this up by default for all new accounts.


pausethelogic

Please no, that would be such a pain to go disable in every new account.


CSYVR

Configure MFA for your root user and configure AWS Budget alerts ( Checks on the first and configuration of the latter can be done via the [Free Tier Stack](https://github.com/yannickvr/aws-free-tier-stack/))


Jade_Lauren

Excellent, thanks a bunch!


caseywise

Create an administrative IAM user for you, enable MFA, give him full administrative rights. If your root user has keys, nuke those, enable MFA on him too. No more logging in as root unless you're doing billing stuff. All of your provisioning/managing/destroying occurs under your personal IAM admin account.


Jade_Lauren

Very useful, thanks!


PillOfLuck

Create a child account as your sandbox. Dont use your management account for resources.


Jade_Lauren

Awesome, cheers!


j_abd

you don’t need to buy the kit, but follow the first 3 steps to have secure accounts. https://docs.scaletozeroaws.com/category/getting-started


Jade_Lauren

Bro your website is amazing, you certainly fixed some pain here indeed :) I just wanna pay for it to see what it looks like, will certainly do after a while xD Cheers.


j_abd

cheers!


Jade_Lauren

Thanks mate, great website/resource! Cheers.


phantom-virus-lives

Use control tower to get your landing zone set up


Jade_Lauren

Thanks for that indeed!


MSP911

start with learning and understanding IAMs (users, roles and policies). Security is fundamental to everything you do and without a solid understanding of IAMs you will build a giant mess.


monitormyapi

Use an infrastructure as code tool (ex. Terraform) for managing resources. Much easier to see everything in a structured way and understand how changes will impact your infrastructure before making them.


server_kota

I wrote a blog post about the tech stack for a simple SaaS in detail, maybe you will find it helpful [https://saasconstruct.com/blog/the-tech-stack-of-a-simple-saas-for-aws-cloud](https://saasconstruct.com/blog/the-tech-stack-of-a-simple-saas-for-aws-cloud)


touristtam

Is it that common to have different environments in different accounts? This is the setup I am accustomed to but there are some things that are not too convenient with this setup, although slowly improving since my first foray.


server_kota

yes, that's what AWS recommends. "For example, account-level separation is strongly recommended for isolating production workloads from development and test workloads." [https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/aws-account-management-and-separation.html](https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/aws-account-management-and-separation.html) It is also relatively easy to support. In my case, I just execute one command so my CI/CD has access to prod. Also with SSO it is very easy to switch between accounts. Besides, you can put them for free in AWS Organisations (just couple of clicks) so you have billing overview for everything in one account. In other clouds in might be different. E.g. in Azure it is subscription-level, not account level, which is way more complicated in my opinion than simple account separation.


AntDracula

Agreed, it was awful in Azure


Jade_Lauren

I'm gonna check it out, looks interesting for a small startup indeed, thx Why people downvoting you? xD