Skip to main content

Planning and implementing your landing zone

Enable regions to suit your business requirements

Choose your most commonly used region as your Home Region

Although Control Tower can govern multiple regions, it must be enabled from a single, home region. Identify the region where you expect to run most of your workloads and designate this as your Control Tower Home Region. If you are using an existing instance of AWS Identity Center, your home region must be the same region in which AWS Identity Center is configured.

The Control Tower home region houses key configuration items for your Landing Zone. The AWS Organization is created there, IAM Identity Center is enabled there, alongside S3 buckets for Cloudtrail data storage. AWS Config in the Audit account is also configured to aggregate findings into the home region.

Deny unused regions, govern all allowed regions

Control Tower provides the ability to deny use of most AWS regions and enable only the subset for your business needs. This reduces your attack surface, reduces the likelihood of workloads generating unnecessary cost and simplifies your governance and observability requirements.

The global region deny control can be set when you create or update your landing zone. This works in conjunction with the Control Tower governed region list, i.e. if the region isn’t enabled for governance, it will be denied. To further restrict region usage for specific Organizational Unit (OU), you can also implement the OU region deny control. Both of these controls are implemented using Service Control Policies (SCP). If a region is not denied, users can deploy resources to it, subject to IAM permissions. Ensure there are no resources in use in a region before denying it to avoid impact to your workloads.

The Control Tower Home Region is governed by default and cannot be ungoverned.

The Control Tower region-deny SCPs include exceptions that Control Tower requires to function.

Use AWS Identity Center to simplify access control

It is an AWS best practice to avoid use of IAM Users and instead to require identity federation for granting human access to AWS resources. This mitigates much of the risk of credential compromise as you no longer need to use long-lived AWS credentials. For centralized access management we recommend you use AWS IAM Identity Center to manage access to your accounts and permissions within those accounts.

Identity Center can be enabled in a single region and be available to users globally. If Identity Center is not enabled for your Organization, Control Tower will enable it for you in your Control Tower Home Region. If Identity Center is already enabled, it must be enabled in your Control Tower home region or the pre-flight checks will fail.

AWS Identity Center supports Permission Sets, which can be assigned to accounts in your AWS Organization and serve as a template for the creation of IAM roles in those accounts. When you associate an Identity Center user or group with a particular permission set in a particular account, it allows that user or group to assume the Permission Set defined role in that account. If you allow Control Tower to manage Identity Center, it will create some preconfigured groups and permission sets and assign these to accounts to give you a foundation for user access.

Integrate your corporate identity provider

Identity Center can be used to manage users and groups but if you have an existing corporate identity provider, you should connect it to Identity Center to maintain a single source of truth for your identities.

If you are using federated users and you want to make use of the default group and permission set configuration Control Tower sets up in Identity Center, you can create groups with the same names in your upstream provider and sync them to Identity Center. You can then assign users to these groups in identity provider to give them access to your enrolled accounts

Work towards least privilege access

The default Permission Sets Control Tower creates are designed for common use cases like AdministratorAccess and DeveloperAccess. For production workloads, particularly those involving sensitive data or other situations where security and compliance are critical concerns, best practice dictates you reduce permissions to the least access necessary. This can be achieved by using custom permission sets to specifically grant the required permissions and / or by applying service control policies to deny unnecessary access. AWS IAM Access Analyzer can help to identify necessary permissions, remove unused permissions and write least privilege policies.

Enable a Delegated Administrator Account

Control Tower enables Identity Center in the Organization management account. It is a best practice to minimize the need for anyone to have access to the management account as it controls the rest of your AWS Organization and cannot be constrained by preventative controls (SCP) to the same degree as member accounts. For this reason you should enable a delegated administrator account for Identity Center.

Permission sets deployed to the management account cannot be managed from the delegated administrator account, we recommend creating dedicated permission sets for the management account (for example MA_Administrator) which are only assumable by a highly restricted set of users.

Apply additional constraints on Control Tower managed roles

Control Tower creates various roles in member accounts which can be assumed by AWS services.

To protect against the cross-service confused deputy problem you can define a Resource Control Policy (RCP) to prevent identities from outside of your AWS Organization tricking services into assuming roles on their behalf.

You can also add Conditions to the Control Tower roles to further restrict access, but be aware that any changes to these roles may be overwritten on landing zone updates.

Protect your data with AWS Backup

The Control Tower AWS Backup integration can help you set up a best practice backup solution with a backup vault in each member account, a central vault in a shared account and some standard backup policies (hourly, weekly, daily, monthly). Backup can be enabled at the OU level and individual resources can be tagged to target them for the relevant backup schedule.

You can deploy additional backup plans to accounts as required, using your Control Tower customization method of choice (AFC, CfCT, AFT, StackSets). These can reuse the aws-controltower-BackupRole role or you can create new roles as needed.

If you have an existing backup solution you can opt out of this integration.

Expand your AWS Organization Structure to suit business requirements

Follow AWS Organizations multi-account best practices

In general, follow the AWS Organizations best practices relating to multi-account strategy and design of your Organizational Units (OUs) when using Control Tower. Keep it simple - start with the OUs you need to support your differential governance, security and policy requirements and avoid deep nesting - Control Tower supports a maximum of five levels of nesting.

Do not modify or delete the Control Tower Security OU

One of the few limitations Control Tower enforces on your Organization is that you cannot create additional accounts or OUs under the Security OU and you can’t move or delete the Control Tower created accounts (log archive, audit) accounts without breaking your Control Tower environment.

Do not delete all OUs to leave only the Security OU

Control Tower expects to have at least two OUs, one of which must be the security OU. You can delete the Sandbox OU that is created when you enable Control Tower but only if you have at least one other OU in your Organization.