<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Rian Brooks-Kane</title>
    <description>The latest articles on DEV Community by Rian Brooks-Kane (@rianbk).</description>
    <link>https://dev.to/rianbk</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2644135%2Fe057f038-c802-4302-8b08-b8dc23a483e8.png</url>
      <title>DEV Community: Rian Brooks-Kane</title>
      <link>https://dev.to/rianbk</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rianbk"/>
    <language>en</language>
    <item>
      <title>How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance</title>
      <dc:creator>Rian Brooks-Kane</dc:creator>
      <pubDate>Sat, 18 Jan 2025 05:48:16 +0000</pubDate>
      <link>https://dev.to/aws-builders/how-to-centrally-manage-aws-root-access-best-practices-for-enhanced-security-and-governance-57o8</link>
      <guid>https://dev.to/aws-builders/how-to-centrally-manage-aws-root-access-best-practices-for-enhanced-security-and-governance-57o8</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimages.unsplash.com%2Fphoto-1485761954900-f9a29f318567%3Fcrop%3Dentropy%26cs%3Dtinysrgb%26fit%3Dmax%26fm%3Djpg%26ixid%3DM3wxMTc3M3wwfDF8c2VhcmNofDM0fHxzZWN1cmV8ZW58MHx8fHwxNzM3MTc5MDkzfDA%26ixlib%3Drb-4.0.3%26q%3D80%26w%3D2000" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimages.unsplash.com%2Fphoto-1485761954900-f9a29f318567%3Fcrop%3Dentropy%26cs%3Dtinysrgb%26fit%3Dmax%26fm%3Djpg%26ixid%3DM3wxMTc3M3wwfDF8c2VhcmNofDM0fHxzZWN1cmV8ZW58MHx8fHwxNzM3MTc5MDkzfDA%26ixlib%3Drb-4.0.3%26q%3D80%26w%3D2000" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Do you manage more than one AWS account? If you’re following AWS’s best practices for multi-account design, chances are you have several accounts—all managed under an AWS Organisation. You’ve likely gone into each account to configure a strong password and enable Multi-Factor Authentication (MFA), guided by alerts from AWS Security Hub.&lt;/p&gt;

&lt;p&gt;This approach, however, can become unwieldy and time-consuming, especially when provisioning new accounts.&lt;/p&gt;

&lt;p&gt;Fortunately, AWS has introduced new features to make this process centralised, automated, and more secure.&lt;/p&gt;

&lt;p&gt;💡 &lt;strong&gt;What is AWS Root Access, Root Account, or Root User?&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
It’s simply the email address you used to create your AWS account. This account has unrestricted access to all resources and settings, making it critical to manage securely.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introducing AWS’s New Centralised Root Access Management Capability
&lt;/h2&gt;

&lt;p&gt;By leveraging AWS Organisations, we can now centrally secure the root user credentials across all AWS accounts within the organisation. This new capability enables us to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Eliminate root user credentials in member accounts, removing the risk of long-term privileged credentials.&lt;/li&gt;
&lt;li&gt;Streamline the creation of secure AWS accounts from the outset, avoiding the need to configure a password and MFA for each new account.&lt;/li&gt;
&lt;li&gt;Prevent the "forgot password" recovery flow for root users, stopping unauthorised attempts to gain access to the account.&lt;/li&gt;
&lt;li&gt;Use a single root user and MFA key for all accounts, simplifying management and enhancing security.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How to Centralise Root Access Management
&lt;/h2&gt;

&lt;p&gt;To enable centralised root access management, follow these steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log in to your &lt;strong&gt;AWS organisation’s management account&lt;/strong&gt; (the top level account in your AWS organisation).&lt;/li&gt;
&lt;li&gt;Go to the &lt;a href="https://us-east-1.console.aws.amazon.com/iam/?ref=rianbk.com" rel="noopener noreferrer"&gt;&lt;strong&gt;IAM Dashboard&lt;/strong&gt;&lt;/a&gt; and then &lt;strong&gt;Root access management&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuexxfyca6c2q62ymtnhn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuexxfyca6c2q62ymtnhn.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="509"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Click &lt;strong&gt;Enable&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuh28ys0uo7ofqi5h72sz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuh28ys0uo7ofqi5h72sz.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;For &lt;strong&gt;Capabilities&lt;/strong&gt; , enable both &lt;strong&gt;Root credentials management&lt;/strong&gt; and &lt;strong&gt;Privilege root accounts in member accounts&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7m26tvp6m4ljg2s4xm78.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7m26tvp6m4ljg2s4xm78.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="195"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;While optional, I highly recommend enabling this step. It allows you to designate a second AWS account (another root user) to have &lt;a href="https://rianbk.com/secure-your-aws-management-account-with-delegated-administrator/" rel="noopener noreferrer"&gt;delegated access&lt;/a&gt; to manage centralised root access controls.
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For this, select a security-focused account or the account where you typically manage administrative functions. This adds an extra layer of security and redundancy, ensuring your centralised controls remain accessible even if there’s an issue with the primary account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzr53j9bv5b323irujh84.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzr53j9bv5b323irujh84.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="124"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Click &lt;strong&gt;Enable&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo4shxhcvhc6om3pm7ycl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo4shxhcvhc6om3pm7ycl.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="70"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that everything is enabled, if you want to change any of the settings that you configured, you can do this from the &lt;a href="https://us-east-1.console.aws.amazon.com/iam/home?ref=rianbk.com#/account_settings" rel="noopener noreferrer"&gt;Account Settings&lt;/a&gt; page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzljgy9q3miaotkk5qtdl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzljgy9q3miaotkk5qtdl.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="330"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Actions Available with Root Access Management&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;After enabling Root Access Management, you can perform privileged actions on your member root accounts. As this is a new feature, the available actions are currently limited, but AWS plans to expand these options in the future.&lt;/p&gt;

&lt;p&gt;💡 Before the introduction of the Root Access Management feature, these actions required logging in with the root user credentials directly. Now, with centralised delegated access, they can be performed securely without needing to use the root credentials.&lt;/p&gt;

&lt;p&gt;At the time of writing, the following actions are supported:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Delete S3 Bucket Policy:&lt;/strong&gt; If an S3 bucket policy is misconfigured and denies access to users within your account, the root account can delete this policy to restore access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Delete SQS Queue Policy:&lt;/strong&gt; Similar to S3 bucket policies, this allows you to delete misconfigured SQS Queue policies that block access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Delete Root User Credentials:&lt;/strong&gt; Remove the root user credentials from an account, eliminating the risk associated with long-term privileged credentials.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Deleting Root User Credentials
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;On the &lt;a href="https://us-east-2.console.aws.amazon.com/iam/home?ref=rianbk.com#/organizations/root-access-management" rel="noopener noreferrer"&gt;Root Access Management&lt;/a&gt; console, locate the account for which you want to remove the root user credentials. Then, select &lt;strong&gt;Take Privileged Action&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy16oez7q25ic27fn1rha.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy16oez7q25ic27fn1rha.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="771"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select &lt;strong&gt;Delete Root User Credentials&lt;/strong&gt;. You’ll be provided with a report showing whether the root console password or access keys have been used. Once you’ve reviewed the report, click &lt;strong&gt;Delete Root User Credentials&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fea42uzh94uucg1mx0jvh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fea42uzh94uucg1mx0jvh.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="430"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The console will now indicate that this account no longer has root user credentials present.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6lq6e7hajby6tkvxp6uu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6lq6e7hajby6tkvxp6uu.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="800" height="774"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Repeat this process for each remaining account until the root user credentials have been removed from all member accounts.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Things to know
&lt;/h2&gt;

&lt;p&gt;Here are a few important things to know about Root Access Management.&lt;/p&gt;

&lt;h3&gt;
  
  
  New AWS Accounts
&lt;/h3&gt;

&lt;p&gt;When you create new accounts through AWS Organisations, they will automatically be created without root user credentials and will be managed by Root Access Management.&lt;/p&gt;

&lt;h3&gt;
  
  
  Root User Access
&lt;/h3&gt;

&lt;p&gt;If you need to perform an action that requires root user access in a member account, you can temporarily enable &lt;strong&gt;Allow Password Recovery&lt;/strong&gt; for the account using the &lt;strong&gt;Take Privileged Action&lt;/strong&gt; menu. This will allow you to initiate a &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reset-root-password.html?ref=rianbk.com" rel="noopener noreferrer"&gt;password reset request&lt;/a&gt;, which will send a reset email to the root account’s registered email address. Its also recommended that you delete the Root User Credentials once your done.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security Hub
&lt;/h3&gt;

&lt;p&gt;It’s worth noting that Security Hub’s findings and best practices haven’t been updated to recognise this feature yet. As a result, you may still see alerts about the root user account not having MFA enabled.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ohmwi1fwsbsio22yrba.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ohmwi1fwsbsio22yrba.png" alt="How to Centrally Manage AWS Root Access: Best Practices for Enhanced Security and Governance" width="582" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts on Root Access Management
&lt;/h2&gt;

&lt;p&gt;Centralised Root Access Management simplifies and secures AWS root access across all your accounts. By enabling these features, you eliminate long-term root credentials, streamline account creation, and can perform privileged actions without using the root user account. It’s a small step that delivers significant security and management benefits and well worth implementing today.&lt;/p&gt;

&lt;p&gt;Photo by &lt;a href="https://unsplash.com/@jeisblack?utm_source=ghost&amp;amp;utm_medium=referral&amp;amp;utm_campaign=api-credit" rel="noopener noreferrer"&gt;Jason Mavrommatis&lt;/a&gt; / &lt;a href="https://unsplash.com/?utm_source=ghost&amp;amp;utm_medium=referral&amp;amp;utm_campaign=api-credit" rel="noopener noreferrer"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How to use Amazon Web Services for Free</title>
      <dc:creator>Rian Brooks-Kane</dc:creator>
      <pubDate>Sun, 15 Dec 2024 08:13:00 +0000</pubDate>
      <link>https://dev.to/aws-builders/how-to-use-amazon-web-services-for-free-4kpd</link>
      <guid>https://dev.to/aws-builders/how-to-use-amazon-web-services-for-free-4kpd</guid>
      <description>&lt;p&gt;Now, I don’t often get asked in the corporate world, “How can I use AWS for free?” (although it has happened), but it’s a question that occasionally comes up at user groups, events, and within the builder community. And it’s a good one! The truth is, you &lt;em&gt;can&lt;/em&gt; use AWS for free—at least to a certain extent—but there are a few important rules and limitations you’ll need to understand to make the most of it. Whether you’re a beginner exploring cloud services or an experienced developer looking to test new features, the AWS Free Tier is an excellent way to get started without spending a cent.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is the AWS Free Tier?
&lt;/h2&gt;

&lt;p&gt;This is where things can get a bit confusing from the start—AWS actually has &lt;strong&gt;three&lt;/strong&gt; types of "free tiers":&lt;/p&gt;

&lt;h3&gt;
  
  
  1) 12-Months Free
&lt;/h3&gt;

&lt;p&gt;For 12 months (starting from the creation of the AWS account), free usage of specific service usage. Some examples of this today include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;750 Hours of Amazon EC2 per month&lt;/li&gt;
&lt;li&gt;5 GB of standard storage Amazon S3&lt;/li&gt;
&lt;li&gt;30 GB of Amazon Elastic Block Storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you exceed the free usage quotas or your 12-month period ends, standard pay-as-you-go rates apply.&lt;/p&gt;

&lt;p&gt;🔗 You can see a list of the specific service usage included under the 12-Months Free tier &lt;a href="https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&amp;amp;all-free-tier.sort-order=asc&amp;amp;awsf.Free+Tier+Types=tier%2312monthsfree&amp;amp;awsf.Free+Tier+Categories=*all" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  2) Always Free
&lt;/h3&gt;

&lt;p&gt;Available to both existing and new AWS accounts, this specific service usage is free indefinitely. Some examples of this today include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;25 GB of DynamoDB&lt;/li&gt;
&lt;li&gt;1 Million AWS Lambda requests&lt;/li&gt;
&lt;li&gt;1 TB of data transfer out with Amazon CloudFront&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you can create a workload that fits within these limits, you will never incur a cost for these services.&lt;/p&gt;

&lt;p&gt;🔗 You can see a list of the specific service usage included under the Always Free tier &lt;a href="https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&amp;amp;all-free-tier.sort-order=asc&amp;amp;awsf.Free+Tier+Types=tier%23always-free&amp;amp;awsf.Free+Tier+Categories=*all" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  3) Trials
&lt;/h3&gt;

&lt;p&gt;AWS offers short-term free trials for specific services, which start when you first use the service. These trials are ideal for testing new features or services before committing to long-term use. Some examples of this today include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;750 Hours per month, for 90 days of Amazon Lightsail&lt;/li&gt;
&lt;li&gt;30 days of Amazon Macie&lt;/li&gt;
&lt;li&gt;30 days of Amazon GuardDuty&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🔗 You can see a list of the specific service usage available as a Free Trial &lt;a href="https://aws.amazon.com/free/?all-free-tier.sort-by=item.additionalFields.SortRank&amp;amp;all-free-tier.sort-order=asc&amp;amp;awsf.Free+Tier+Types=tier%23trial&amp;amp;awsf.Free+Tier+Categories=*all" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Devil in the detail
&lt;/h2&gt;

&lt;p&gt;One of the most common pitfalls with the AWS Free Tier is not paying close attention to the details. It’s not unusual to see posts on Reddit from someone who’s received a surprise bill despite believing they were safely within the Free Tier limits.&lt;/p&gt;

&lt;p&gt;Take the &lt;strong&gt;750 hours of Amazon EC2 usage per month for the first 12 months&lt;/strong&gt; as an example. Sounds fantastic, right? And it is—but it comes with some important "rules" that you need to be aware of:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Instance Type and Operating System Restrictions&lt;/strong&gt; :
The free tier &lt;strong&gt;only applies to t2.micro or t3.micro instances&lt;/strong&gt; running on Linux, RHEL, SLES, or Windows.
If you launch a different instance type or use an unsupported operating system, those costs will fall outside the Free Tier, and you’ll be billed accordingly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multiple Services in Use&lt;/strong&gt; :
Here’s where things get a bit tricky, particularly for those new to AWS: the service you’re using is often made up of multiple underlying services.

&lt;ul&gt;
&lt;li&gt;While the Free Tier provides &lt;strong&gt;750 hours of EC2 usage&lt;/strong&gt; , it &lt;strong&gt;doesn’t automatically include storage&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Fortunately, the Free Tier includes &lt;strong&gt;30 GB of Amazon Elastic Block Storage (EBS)&lt;/strong&gt;. However, if your storage exceeds 30 GB or you use additional EBS features—such as more than 1 GB of snapshots—you’re no longer covered under the Free Tier and will start incurring costs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;💡 Before you create or launch a service, take a moment to understand all the components that make up the service and whether each is covered under the Free Tier. This small step can save you from unpleasant surprises when the bill arrives.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;AWS Free Tier and AWS Organizations&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;A common question I get in the corporate world is: &lt;em&gt;How do the AWS Free Tiers work within an AWS Organisation?&lt;/em&gt; Especially for things like lab and sandbox accounts. Here’s how it works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Single Account Eligibility&lt;/strong&gt; :
Only one account within the AWS Organization can benefit from the Free Tier offers (The Management Account).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Aggregated Usage&lt;/strong&gt; :
Usage across all accounts in the AWS Organization is aggregated under &lt;strong&gt;consolidated billing&lt;/strong&gt;. This means that the combined usage of all member accounts counts towards the Free Tier limits.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Eligibility Start Date&lt;/strong&gt; :
The Free Tier eligibility for all member accounts begins on the day the &lt;strong&gt;management account&lt;/strong&gt; is created. If the management account’s Free Tier period has expired, none of the member accounts will be eligible for Free Tier benefits, even if they’re newly created.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Tips to Stay within the Free Tier
&lt;/h2&gt;

&lt;p&gt;Here are some good ways to stay within the Free Tier and reduce the chance of getting a unexpected bill.&lt;/p&gt;

&lt;h3&gt;
  
  
  Monitor your usage
&lt;/h3&gt;

&lt;p&gt;AWS provides an excellent dashboard to help you track your Free Tier usage. You can find it in the &lt;strong&gt;Billing and Cost Management console&lt;/strong&gt; under &lt;strong&gt;Cost and Usage Analysis&lt;/strong&gt;. This tool is a great way for ensuring you stay within your Free Tier limits and avoid unexpected charges.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8htiejp76gwv1akuzmbm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8htiejp76gwv1akuzmbm.png" alt="How to use Amazon Web Services for Free" width="800" height="518"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🔗 You can access the Free Tier usage dashboard directly via this link: &lt;a href="https://us-east-1.console.aws.amazon.com/billing/home#/freetier" rel="noopener noreferrer"&gt;AWS Free Tier Usage Dashboard&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Alerts
&lt;/h3&gt;

&lt;p&gt;There are two good built in ways to get usage alerts for the Free Tier.&lt;/p&gt;

&lt;h4&gt;
  
  
  AWS Free Tier Usage Alerts
&lt;/h4&gt;

&lt;p&gt;AWS automatically notifies you when you exceed &lt;strong&gt;85 percent of your Free Tier limit&lt;/strong&gt; for each service. However, it’s a good idea to check that this feature is enabled in your account. Here’s how to do it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Open the Billing Console&lt;/strong&gt; :
Go to the AWS Management Console and navigate to the &lt;a href="https://console.aws.amazon.com/billing/" rel="noopener noreferrer"&gt;Billing console&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Access Billing Preferences&lt;/strong&gt; :
Under &lt;strong&gt;User Preferences&lt;/strong&gt; , click &lt;strong&gt;Billing preferences&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Edit Alert Preferences&lt;/strong&gt; :
Look for the &lt;strong&gt;Alert Preferences&lt;/strong&gt; section and click &lt;strong&gt;Edit&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enable Free Tier Alerts&lt;/strong&gt; :
Ensure the option &lt;strong&gt;Receive AWS Free Tier alerts&lt;/strong&gt; is enabled.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhz367hxdjv6rq9yxz75.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnhz367hxdjv6rq9yxz75.png" alt="How to use Amazon Web Services for Free" width="715" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;💡 You can also specify an email address different from your root account email. I'd recommended this to ensure Free Tier notifications don’t get lost in other account-related emails.&lt;/p&gt;

&lt;h4&gt;
  
  
  AWS Budgets
&lt;/h4&gt;

&lt;p&gt;In addition to Free Tier usage alerts, i'd recommended to configure &lt;strong&gt;AWS Budgets&lt;/strong&gt; to notify you if you start incurring costs. You can easily do this using the &lt;strong&gt;Zero Spend Budget&lt;/strong&gt; template. Here’s how:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Open the Billing Console&lt;/strong&gt; :
Go to the AWS Management Console and navigate to the &lt;a href="https://console.aws.amazon.com/billing/" rel="noopener noreferrer"&gt;Billing console&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Navigate to Budgets&lt;/strong&gt; :
In the navigation pane, select &lt;strong&gt;Budgets&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Create a Budget&lt;/strong&gt; :

&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Create a budget&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Use a template&lt;/strong&gt; and choose the &lt;strong&gt;Zero Spend Budget&lt;/strong&gt; template.&lt;/li&gt;
&lt;li&gt;Enter your preferred email address for receiving alerts.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Create budget&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By setting up a Zero Spend Budget, you’ll be alerted if you exceed your Free Tier and start spending money.&lt;/p&gt;

&lt;p&gt;💡 It’s important to note that there can be a delay between when charges are incurred and when you receive a notification. This delay occurs due to how AWS billing operates, meaning it’s possible to accrue additional charges before the alert reaches you.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;The AWS Free Tier is a fantastic way to explore AWS, experiment with new ideas, learn and even run small-scale workloads without spending a cent. However, like any powerful tool, it comes with rules and limitations that you need to understand to avoid surprises. Don't be that next post on Reddit!&lt;/p&gt;

&lt;p&gt;Cover Photo by &lt;a href="https://unsplash.com/@blankerwahnsinn?utm_source=ghost&amp;amp;utm_medium=referral&amp;amp;utm_campaign=api-credit" rel="noopener noreferrer"&gt;Fabian Blank&lt;/a&gt; / &lt;a href="https://unsplash.com/?utm_source=ghost&amp;amp;utm_medium=referral&amp;amp;utm_campaign=api-credit" rel="noopener noreferrer"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
    </item>
  </channel>
</rss>
