Allowing multiple users to maintain AWS infrastructure

0

I am trying to build OUs and member accounts so that I can allow team members to maintain the services hosted on AWS. For example, I will have users in database account to maintain rds, users in sysadmin account to maintain the EC2/EFS, and users in the developer account to maintain lambda etc. However, users in these accounts are not able to share the same services they created. That is, when the database users login to AWS, they do not see the EC2/EFS created by the sysadmin. And the sysadmin users do not see the lambda created by the developers. I suppose the purpose of having different accounts is to allow each account to host their services separately and therefore billed seperately. So should I have all these users (database, sysadmin, developer) in one account so that they can share to maintain the services and infrastructure?

profile picture
Lottie
已提問 4 個月前檢視次數 156 次
1 個回答
1
已接受的答案

Hi,

Of course you can different users who has permissions to different AWS services.

let's say, you have number of users in AWS. Create permissions set in IAM as database, sysadmin, developer. https://docs.aws.amazon.com/singlesignon/latest/userguide/useraccess.html#howtodelegatessoaccess

Now attach the IAM policies to the permission set

  • database permission set --> AmazonRDSFullAccess
  • sysadmin permission set --> AmazonEC2FullAccess/AmazonElasticFileSystemFullAccess
  • developer permission set --> AWSLambda_FullAccess

Now start creating the IAM users in IAM identity center and map the above permission sets to them

profile picture
已回答 4 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南