AWS Multi-Account Landing Zone Guide — Organizations, IAM Identity Center, and Network Segmentation
Running everything in a single AWS account quickly becomes painful as teams, environments, and compliance needs grow. This post explains a practical multi-account landing zone using Organizations, OU structure, IAM Identity Center, shared networking, centralized logging, and security guardrails.
Why multi-account matters
A single AWS account looks simple at first, but the pain shows up quickly:
- production and development resources mix together
- IAM boundaries become unclear
- cost allocation gets messy
- blast radius becomes too large
- centralized audit and security control become difficult
That is why mature AWS environments usually move to a multi-account model early.
Principles to define first
- separate by environment:
prod,staging,dev - separate by function:
shared,security,logging,network - separate by access level: admin vs developer
- separate by cost ownership: service or team accounts
- separate by audit responsibility: logging and security accounts stay independent
The key idea is to treat an AWS account as a strong security boundary.
Recommended OU structure
Root
├─ Security
│ ├─ audit
│ └─ log-archive
├─ Infrastructure
│ ├─ network
│ └─ shared-services
├─ Workloads
│ ├─ prod
│ ├─ staging
│ └─ dev
└─ Sandbox
└─ experiments
This structure makes it easier to apply policy by OU.
Account roles
log-archive
- central CloudTrail storage
- Config snapshots
- long-term log retention
audit
- Security Hub aggregation
- GuardDuty aggregation
- IAM Access Analyzer
- read-only audit access
network
- Transit Gateway
- central egress VPC
- shared DNS
- IP planning
shared-services
- common CI/CD
- operational access via SSM
- shared artifact storage
- shared internal platforms
prod, staging, dev
- workload accounts for real applications
- can be split further by team or service
Build access around IAM Identity Center
In modern AWS environments, human access is usually better through IAM Identity Center than individual IAM users.
Recommended model:
- integrate with your corporate IdP
- use group-based access
- define permission sets per account type
- keep production admin access tightly controlled
Example roles:
Platform-AdminSecurity-AuditDeveloper-ReadOnly-ProdDeveloper-PowerUser-Dev
This makes onboarding and offboarding much easier.
Use SCPs as hard guardrails, not as detailed policy
SCPs sit above IAM policy, so they should be used carefully.
Common examples:
- block unapproved regions
- prevent CloudTrail disablement
- prevent GuardDuty or Config shutdown
- restrict root account usage
- block unapproved services
The practical rule is simple: use SCPs for things that must never happen.
Network design: central control vs full isolation
Networking is one of the biggest landing-zone design decisions.
Centralized model
- Transit Gateway
- central egress
- shared firewall and DNS
Pros:
- consistent policy
- easier visibility
Cons:
- higher dependency on the network account
- more complexity
Fully isolated model
- separate VPCs per account
- connect only where needed
Pros:
- stronger isolation
- higher team autonomy
Cons:
- duplicated effort and cost
A balanced pattern is often shared network account + isolated workload VPCs.
Centralize logs and security from day one
A real landing zone should include:
- organization-wide CloudTrail
- AWS Config aggregation
- GuardDuty at the organization level
- Security Hub aggregation
- centralized S3 log buckets
Without central logging, incident response becomes far harder than it should be.
Cost governance is also part of the landing zone
Multi-account design helps not only with security but also with financial responsibility.
Good practices:
- clear account naming
- enforced tag policies
- per-account budgets
- explicit handling of shared account cost allocation
Common mistakes
- keeping prod and dev in the same account
- continuing to create IAM users for people
- skipping a central logging account
- creating VPCs without IP planning
- overusing SCPs until teams cannot operate
A practical rollout sequence
- create AWS Organizations
- define the OU structure
- create
audit,log-archive,network, andshared-services - integrate IAM Identity Center with your IdP
- apply minimal SCP guardrails
- centralize logs and security
- onboard workload accounts
Closing thoughts
An AWS landing zone is not just a way to split accounts. It is a long-term operating model for access control, security, networking, cost governance, and auditability.
It may feel heavier at the beginning, but the cost of not having it grows much faster as the platform scales.