Last Updated: September 2020
Author: Ben Potter, Security Lead, Well-Architected
This hands-on lab will guide you through the introductory steps to configure contacts for your AWS account and secure the root user. This process is not required for accounts you manage with AWS Organizations or AWS Control Tower . For more information see Security Foundations in the AWS Well-Architected security whitepaper . The skills you learn will help you secure your workloads in alignment with the AWS Well-Architected Framework .