systweak
Enterprise Tutorial

Initial Organization Setup & Account Provisioning

schedule 12 min read
event_available Updated Oct 24, 2023

Establish a secured foundation for your key management environment. This guide walks through the critical path from zero to a fully provisioned KMS organization with enforced governance controls.

Step 1: Create Your Organization Profile

The organizational unit acts as the root container for all cryptographic assets. During this phase, you will define the global region and licensing tier that determines the maximum number of key partitions available.

Terminal - CLI
kms-cli organization create
--name "Global-Finance-HQ"
--region "us-east-1"
--tier "enterprise"
image

Organization Creation Dashboard UI

Step 2: Initialize Root Administrator

The Root Administrator has unrestricted access. We strongly recommend hardware-backed MFA for this role. Use a team-managed mailbox for this identity to avoid continuity gaps during personnel transitions.

After entering the primary administrator details, the system prompts for security key registration. This is a non-bypassable control for enterprise tenants.

security

MFA Setup Screen

check_circle Best Practices

  • check Use FIDO2 compliant security keys for all admins.
  • check Establish a break-glass recovery procedure.
  • check Enforce 90-day key rotation on API credentials.

cancel Avoid These

  • close SMS-based MFA for privileged accounts.
  • close Sharing generic administrator credentials.
  • close Using root account access for routine tasks.

Step 3: Define Global Security Policies

Security policies are JSON-based documents that govern how keys are created, accessed, and destroyed. Enterprise organizations should require quorum approval for sensitive operations.

policy-template.json
{
  "Version": "2023-10-24",
  "Statement": {
    "Effect": "Allow",
    "Action": "kms:CreateKey",
    "Condition": {
      "Bool": { "kms:MultiFactorAuthPresent": "true" }
    }
  }
}