Account Strategy

Organize based on security and operational needs

This recomendation is from AWS but we’ve explicitly called it out so that we can apply our interpretation to it.

“… organize accounts using OUs based on function, compliance requirements, or a common set of controls rather than mirroring your organization’s reporting structure.”

Allowing for other AWS recommendations that we will adopt, if we need to expand our organisational structure, we anticipate that the structure will most likely follow the governance i.e. accounts governed by the same TDA committee will sit in the same OU.

AWS Design principles for your multi-account strategy

We have chosen to adopt the following recommendations

Initial Organisations Structure

Our initial target is similar to the AWS example Basic organization with CI/CD as a separate function.

We have added the Policy Staging OU but removed the Sandbox OU as we do not intend to target these types of accounts at launch.

Organisation structure
  • Root
    • Security
      • Prod
    • Infrastructure
    • Deployments
      • Prod
    • Workloads
      • Prod
      • Test
      • Dev
    • Policy Staging
      • In this example, a set of child OUs mirrors an overall OU structure

We expect that the following OUs will be required in the near future and will consider them soon

References

Design principles for your multi-account strategy