AWS Accounts
The AWS Accounts section allows you to onboard, manage, and delete AWS accounts in your Prism organization. Onboarded accounts are the target environments where users and groups receive access through assignments.
Prerequisites
- You must have access to the AWS accounts you want to onboard (for setting up the required trust policy and IAM permissions).
AWS Accounts List
The AWS Accounts page displays a paginated table of all onboarded accounts.
Table Columns
| Column | Description |
|---|---|
| Account Name | The display name for the AWS account in Prism |
| Account ID | The 12-digit AWS account identifier |
| JIT Owners | Users designated as JIT (Just-In-Time) access owners for this account |
| Actions | Available management actions |
Available Actions
| Action | Description | Link |
|---|---|---|
| Onboard Account | Add a new AWS account to Prism | Onboard Account |
| Rename Account | Change the display name of an account | Rename Account |
| Manage Owners | Assign JIT access owners to an account | Manage Owners |
| Delete Account | Remove an AWS account from Prism | Delete Account |
Understanding Account Onboarding
Before Prism can manage access to an AWS account, the account must be onboarded. This process establishes a trust relationship between Prism and the AWS account, allowing Prism to manage IAM Identity Center resources.
Prism supports two onboarding methods:
- Automated -- Prism generates a prepopulated CloudFormation template that sets up the required cross-account IAM role.
- Manual -- You manually create the required IAM roles and policies in the AWS account.
See Onboard Account for detailed instructions on each method.
JIT Account Owners
Each AWS account can have one or more JIT owners. JIT owners are users who can approve Just-In-Time (JIT) access requests for the account through the JIT Portal. This provides a controlled way to grant temporary, elevated access.
See Manage Owners for details on assigning JIT owners.
Onboard AWS Account
Onboard a new AWS account to bring it under Prism management. Once onboarded, you can create assignments to grant users and groups access to the account.
Prerequisites
- You must have the 12-digit AWS account ID for the account you want to onboard.
- You must have sufficient permissions in the AWS account to create IAM roles and policies.
Onboarding Methods
Prism provides multiple methods to onboard AWS accounts. Choose the method that best fits your workflow.
Method 1: Automated Onboarding
The automated method generates a prepopulated CloudFormation template that sets up the required cross-account IAM role for you.
Step-by-Step Guide
- Navigate to Admin Portal > AWS Accounts from the sidebar.
- Click the Onboard Account button.
- Select the Automated onboarding method.
- Fill in the required fields:
- AWS Account ID -- Enter the 12-digit AWS account ID.
- Account Name -- Enter a display name for the account in Prism.
- Click the generated CloudFormation link to open the AWS CloudFormation console with a pre-configured stack that creates the required cross-account IAM role.
- Review the stack in the AWS Console and click Create Stack.
- Once the stack is created, return to Prism and click Validate to verify that Prism can assume the role in the target account.
- If validation succeeds, click Onboard to complete the process.
Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
| AWS Account ID | Text (12 digits) | Yes | The AWS account's unique 12-digit identifier. Found in the AWS Console under account settings. |
| Account Name | Text | Yes | A friendly display name for the account in Prism (e.g., "Production", "Development", "Staging"). |
Use descriptive account names that help your team quickly identify the account's purpose. Names like "prod-us-east-1" or "dev-data-team" are more useful than generic names.
Method 2: Manual Onboarding
The manual method gives you full control over the IAM setup in the AWS account.
Step-by-Step Guide
- Navigate to Admin Portal > AWS Accounts from the sidebar.
- Click the Onboard Account button.
- Select the Manual onboarding method.
- Prism displays the required configuration:
- Trust Policy -- A JSON trust policy document that must be attached to an IAM role in the target account. Click the Copy button to copy it to your clipboard.
- Required IAM Policies -- A list of IAM policies that the role must have for Prism to manage the account.
- Go to the AWS Console for the target account and create the IAM role with the provided trust policy and required policies.
- Return to Prism and fill in:
- AWS Account ID -- Enter the 12-digit AWS account ID.
- Account Name -- Enter a display name for the account.
- Click Validate to verify that Prism can assume the role in the target account.
- If validation succeeds, click Onboard to complete the process.
The trust policy must be applied exactly as provided. Modifying the trust policy may prevent Prism from managing the account.
What Happens Next
After onboarding an account:
- The account appears in the AWS Accounts list.
- You can create assignments for the account.
- You can assign JIT owners to the account.
Troubleshooting
| Issue | Solution |
|---|---|
| Validation fails | Verify the AWS account ID is correct (12 digits). Ensure the trust policy and IAM permissions are correctly configured in the target account. |
Rename Account
Change the display name of an onboarded AWS account in Prism. Renaming an account only changes how it appears in the Prism interface -- it does not affect the AWS account itself.
Prerequisites
- The account must already be onboarded.
Step-by-Step Guide
- Navigate to Admin Portal > AWS Accounts from the sidebar.
- Locate the account you want to rename in the table.
- Click the Edit icon on the account's row.
- Enter the new display name for the account.
- Click Save to apply the change.
Field Reference
| Field | Type | Required | Description |
|---|---|---|---|
| Account Name | Text | Yes | The new display name for the account in Prism. Does not affect the AWS account name. |
What Happens Next
After renaming an account:
- The new name is reflected immediately across the Prism interface, including the Assignments page and JIT Portal.
Use descriptive names that convey the account's purpose and environment. Examples: "Production - US East", "Staging - Data Team", "Dev - Frontend".
Manage Account Owners
Assign JIT (Just-In-Time) access owners to an AWS account. JIT owners are users who can approve JIT access requests for the account through the JIT Portal. This enables a controlled, time-limited access approval workflow.
Step-by-Step Guide
- Navigate to Admin Portal > AWS Accounts from the sidebar.
- Locate the account you want to manage owners for.
- Click the Manage Owners icon on the account's row.
- A multi-select list of available users is displayed.
- Select one or more users to designate as JIT owners for this account.
- Click Save to apply the changes.
The user list supports multi-select, allowing you to assign several owners at once. Having multiple owners ensures that JIT access requests can be approved even if one owner is unavailable.
What Happens Next
After assigning JIT owners:
- The selected users appear in the JIT Owners column for the account.
- When a user submits a JIT access request for this account through the JIT Portal, the designated owners receive the request for approval.
- Owners can approve or deny JIT access requests from the Approver interface.
Removing Owners
To remove a user as a JIT owner:
- Navigate to Admin Portal > AWS Accounts and click Manage Owners for the account.
- Deselect the user from the owners list.
- Click Save.
If an account has no JIT owners, JIT access requests for that account will default to Prism admins for approval.
Best Practices
- Assign multiple owners -- Ensure at least two or three owners per account to avoid bottlenecks when approvals are needed.
- Choose appropriate owners -- JIT owners should be senior team members or managers who understand the security implications of granting access.
- Review owners regularly -- As team structures change, review and update account ownership to keep it current.
Delete AWS Account
Remove an AWS account from your Prism organization. Deleting an account disconnects it from Prism management and revokes all assignments associated with the account.
Prerequisites
- The AWS account must already be onboarded.
- There must be no active assignments on the account. You must delete all assignments before deleting the account.
Step-by-Step Guide
- Navigate to Admin Portal > AWS Accounts from the sidebar.
- Locate the account you want to delete in the table.
- Click the Delete icon on the account's row.
- A confirmation dialog will appear, asking you to confirm the deletion.
- Review the account name and ID to ensure you are deleting the correct account.
- Click Confirm to proceed, or Cancel to abort.
Deleting an account is a significant action. The account will be completely removed from Prism, and all associated configuration (owners, display name, etc.) will be lost.
Pre-Deletion Checklist
Before deleting an account, complete the following steps:
- Delete all assignments -- Navigate to Assignments and remove all assignments for this account. The system will prevent deletion if active assignments exist.
- Notify affected users -- Inform users and group members who had access to the account.
- Document the change -- Record why the account was deleted for audit purposes.
What Happens Next
After deleting an account:
- The account is removed from Prism's database.
- The account disappears from the AWS Accounts list.
- All JIT owner associations for the account are removed.
- JIT access requests for the account can no longer be submitted.
Deleting removes the account from Prism's management but does not affect the AWS account itself. The account and its resources continue to exist in AWS. Any IAM roles created during onboarding remain in the AWS account and should be manually cleaned up if no longer needed.
Hierarchy View
If Org Services is enabled for your customer, a Hierarchy / List toggle appears in the header. The hierarchy view displays your AWS Organization structure as an expandable tree, showing how accounts are organized into Organizational Units (OUs).
Switching Views
- List (default) -- The standard paginated table of onboarded accounts.
- Hierarchy -- The AWS Organizations tree showing Root, OUs, and accounts.
All nodes are expanded by default. Click the expand/collapse arrow on any node to toggle its children.
Organization Tree Actions
Each node in the hierarchy tree has a three-dot menu with context-appropriate actions:
| Node Type | Available Actions |
|---|---|
| Root | Create Child OU |
| OU | Create Child OU, Delete OU |
| Account | Move Account |
Creating an Organizational Unit
- Switch to Hierarchy view.
- Click the three-dot menu on a Root or OU node.
- Select Create Child OU.
- Enter the OU name.
- Click Create.
The tree refreshes automatically after creation. A "Refreshing organization tree..." indicator is shown while the tree updates.
Deleting an Organizational Unit
- Click the three-dot menu on the OU you want to delete.
- Select Delete OU.
- Confirm the deletion.
The OU must be empty -- it cannot contain any accounts or child OUs. Move all accounts out of the OU before deleting it.
Moving an Account
- Click the three-dot menu on the Account you want to move.
- Select Move Account.
- Choose the destination OU from the dropdown list.
- Click Move.
The tree refreshes automatically after the move.
Use OUs to group accounts by environment (production, staging, development), team, or business unit. This organization helps when applying policies to groups of accounts.