Structure identities, policies, and monitoring for resilient access.
Require hardware or app MFA for console; protect root with MFA and minimal use.
Start with zero permissions; add actions/resources explicitly; review quarterly.
Use IAM roles for workloads, OIDC from CI, instance profiles; rotate any remaining keys.
Alert on CreateUser, AttachUserPolicy, console login anomalies.
Short STS lifetimes; automate key rotation where keys are unavoidable.
Restrict by IP, VPC endpoint, MFA presence, time window, and resource tags.