DEV Community

Andres Figueroa
Andres Figueroa

Posted on • Edited on

IAM: Prioritizing Security Is More Than a Method

Secure Creation of Root Account and IAM Administrator User in AWS

Delegating with Security: The Initial Flow in AWS IAM

Diagrama IAM

This diagram is not just a set of technical steps. It reflects how to start properly in AWS: with intention, with security, and by following best practices.

Everything begins with the Root user, the master access that should never be used for daily operations. We protect it with MFA because it is the most sensitive point. Then, we delegate. We create a user called IAM-Administrator, who will actually manage the environment. Separated from Root, with well-defined privileges, and also with MFA enabled. Because even the most privileged users must operate under double verification.

This diagram represents a conscious decision: it’s not just about connecting, but about delegating with confidence, protecting our account, and auditing with clarity.

A secure architecture begins not with commands, but with criteria.

IAM Lab: Secure Creation of Root Account and IAM Administrator User in AWS

🔐Stage 1: Initial Setup of the Root Account

Step 1: Create a new Root account using a valid email.

https://signin.aws.amazon.com/signup?request_type=register

Account

Creacion de cuenta Root

Step 2: Define secure credentials known only to the Root user.

Credenciales-Cuenta-Root

Step 3: Select a payment plan (avoid the free plan to enable full access to services).

Pago-Cuenta-Root

Step 4: Complete personal details for the Root account holder.

Registro-Datos-Cuenta-Root

Step 5: Register a valid credit or debit card to activate the account.

Tarjeta-Datos-Cuenta-Root

Step 6: Verify identity via a code sent to the associated email.

Identidad-Cuenta-Rot

Step 7: Once validated, access the billing console to confirm account activation.

IAM-Cuenta-Root

🔐 Stage 2: Enabling MFA on the Root Account

Step 8: In the IAM console, notice the security alert recommending MFA activation. Select “Add MFA.”

MFA-Alerta

Step 9: Choose the authentication method:

MFA

-Passkey or Security Key: A physical device connected via USB or NFC.
-Authenticator App: A mobile app (e.g., Google Authenticator) that generates temporary codes.
-Hardware TOTP Token: A physical key that displays one-time codes offline.

In this lab, we select Authenticator App.

Step 10: Scan the QR code with the Authenticator app and enter the temporary codes.

MFA-APP

Step 11: Confirm successful MFA activation on the Root account.

MFA-Exit

MFA Done

👤 Stage 3: Creating the IAM Administrator User

Step 12: Create a new IAM user to delegate administration, following the principle of not operating directly with Root.

User

Step 13: Assign the name IAM-Administrator to the new user.

Create-User

Step 14: Attach the AdministratorAccess policy, granting full permissions over AWS services.

Polic-User

Step 15: Add tags for traceability and governance, for example:
-Owner: Root
-Project: Administrator
-MFAEnabled: Yes

Tag

Step 16: Confirm successful creation of the IAM Administrator user.

User-Done

En otra ventana posterior, nos enfocaremos en el Usuario Administrator.

🔑 Stage 4: Access and Configuration of the IAM Administrator User

Step 17: Sign in with the new IAM Administrator user.

Access-User

Step 18: Set a secure password that complies with AWS guidelines.

Passwor-User

Step 19: Confirm successful login with the new credentials.

Done-User

Step 20: Access the IAM service to continue security configuration.

IAM-User

Step 21: Notice the alert recommending MFA activation for the IAM user.

Alerta-MFA

Step 22: Repeat the MFA activation process using the Authenticator app.

MFA-User

Step 23: Scan the QR code and enter the generated temporary codes.

Authenticator-MFA-User

Step 24: Confirm successful MFA activation for the IAM Administrator user.

Done-MFA-User

Step 25: Validate that the user complies with the established security policies.

Dashboard-User

Step 26: Verify that the IAM Administrator user was created correctly from the Root account and is ready to operate securely.

Administrator

🧠 Final Reflection

This flow not only follows AWS security best practices, but also establishes a solid foundation for any cloud architecture.
Delegating, protecting, and tagging are actions that define a conscious architect.

Top comments (0)