| Account Type | Purpose | Key Services |
|---|---|---|
| Management | Organization root, billing, SCPs (minimal workloads) | Organizations, Billing, Cost Explorer |
| Log Archive | Centralized logging from all accounts | CloudTrail, Config, S3, CloudWatch Logs |
| Security/Audit | Security tooling and cross-account audit | Security Hub, GuardDuty, IAM Access Analyzer |
| Shared Services | Common infrastructure (AD, DNS, CI/CD) | Directory Service, Route 53, CodePipeline |
| Network | Transit Gateway, Direct Connect, VPN | Transit Gateway, Direct Connect, VPN |
| Sandbox | Experimentation with limited budget | Service Catalog, Budgets, Cost Controls |
| Workload (Dev/Prod) | Application environments | Application-specific services |
| Service | Resource Policy | Cross-Account Pattern |
|---|---|---|
| S3 | Bucket Policy | Grant access to principals from other accounts |
| KMS | Key Policy | Allow external accounts to use CMKs |
| SNS/SQS | Access Policy | Allow cross-account publish/subscribe |
| Lambda | Resource Policy | Allow invocation from other accounts |
| Secrets Manager | Resource Policy | Share secrets across accounts |
| ECR | Repository Policy | Share container images across accounts |
Identity-based: Attach to IAM users/roles - "what can this identity do?"
Resource-based: Attach to resources - "who can access this resource?" Cross-account access is often simpler with resource policies (no role assumption needed for some services)
| Option | Bandwidth | Latency | Encryption | Best For |
|---|---|---|---|---|
| Site-to-Site VPN | Up to 1.25 Gbps per tunnel | Variable (internet) | Yes (IPsec) | Quick setup, backup connection |
| Direct Connect | Up to 100 Gbps | Consistent, low | No (use VPN overlay) | Production workloads, large data transfer |
| VPC Peering | No limit (intra-region) | Lowest | Yes (in-transit) | Simple VPC-to-VPC, non-transitive |
| Transit Gateway | 50 Gbps per attachment | Low | VPN attachments only | Complex multi-VPC, hybrid networks |
| PrivateLink | Endpoint bandwidth | Low | Yes | Private access to services |
| Method | Use Case | Token Duration | Key Points |
|---|---|---|---|
| IAM Identity Center | Workforce access to multiple accounts | Configurable | Preferred for organization-wide SSO |
| SAML 2.0 Federation | Enterprise IdP integration | Up to 12 hours | AssumeRoleWithSAML, console access |
| Web Identity Federation | Mobile/web apps, social login | Up to 12 hours | Cognito or direct (Google, Facebook) |
| Custom Identity Broker | Legacy systems, special requirements | Configurable | Your code calls STS AssumeRole |
| AWS Directory Service | Windows workloads, AD integration | N/A | Managed AD, AD Connector, Simple AD |
User Pools: User directory for sign-up/sign-in. Returns JWT tokens. Good for app authentication.
Identity Pools: Exchange tokens for temporary AWS credentials. Provides direct AWS service access.