AWS Landing Zone
Last updated
Last updated
An AWS Landing Zone is a secure, scalable, multi-account AWS environment based on best practices. It provides a foundation for cloud adoption, enabling organizations to deploy workloads with governance, security, and compliance from day one.
A pre-configured AWS environment with multiple accounts (e.g., security, logging, shared services, workloads)
Implements guardrails using Service Control Policies (SCPs), AWS Organizations, IAM, and centralized logging
Automates account creation, baseline networking (VPCs), and security controls
References:
Enterprise Cloud Adoption: Standardize environments for multiple business units
Regulated Industries: Enforce compliance (e.g., PCI, HIPAA) with automated guardrails
Startups/Scale-ups: Rapidly scale with secure, repeatable account structures
Account Structure: Define core accounts (security, log archive, shared services, workload)
Networking: Centralized VPCs, shared subnets, Transit Gateway, VPC peering
Security: SCPs, IAM roles, AWS Config, CloudTrail, GuardDuty, Security Hub
Automation: Use AWS Control Tower, custom Terraform, or CloudFormation
Below is a simplified example using Terraform to create an AWS Organization, core accounts, and baseline guardrails.
Tip: Store your SCP JSON in a policies/deny_s3_public.json
file for modularity.
WSL: Ensure your AWS credentials are accessible in your WSL home directory. Use wsl --mount
for shared filesystems if needed.
Why did the DevOps engineer refuse to deploy in an unprepared AWS account?
Because there was no landing zone—he didn’t want to crash the cloud party!
You can use to test your Terraform code for security and compliance. Example test to ensure S3 public access is denied:
Linux: Use the latest Terraform binary and AWS CLI. Install via your package manager or .
NixOS: Use for reproducible installs:
Always use environment variables or for credentials—never hard-code secrets.
For more advanced patterns, see and the .