Simple Enough Blog logo
  • Home 
  • Projects 
  • Tags 

  •  Language
    • English
    • Français
  1.   Blogs
  1. Home
  2. Blogs
  3. AWS multi-accounts: architectural solution or disguised organizational debt?

AWS multi-accounts: architectural solution or disguised organizational debt?

Posted on February 18, 2026 • 5 min read • 915 words
Aws   Architecture   Devops   Cloud   Helene  
Aws   Architecture   Devops   Cloud   Helene  
Share via
Simple Enough Blog
Link copied to clipboard

AWS multi-account setups are often presented as a universal best practice. In reality, they are a powerful structural tool that requires explicit technical, organizational, and security choices.

On this page
I. Introduction   II. AWS quotas are generally a signal of an architectural problem, not its cause   III. An AWS account is not a technical unit   IV. The classic mistake: creating accounts without a model   V. Security: the true core of multi-account   VI. IAM: complexity multiplied, not removed   VII. Automation: a non-negotiable condition   VIII. Billing: isolation ≠ control   IX. The false comfort of “+1” email addresses   X. What multi-account really does   Conclusion   🔗 Useful resources  
AWS multi-accounts: architectural solution or disguised organizational debt?
Photo by Helene Hemmerter

I. Introduction  

Creating multiple AWS accounts is now widely presented as a near-universal best practice.
It is often introduced through simple, console-oriented tutorials that give the impression that the problem boils down to a few clicks.

This view is misleading.

Multi-account is not an implementation detail, but a fundamental architectural choice.
It directly impacts:

  • how teams work,
  • how security is enforced,
  • cost visibility,
  • the ability to automate,
  • and organizational resilience to human error.

When misunderstood, it creates organizational debt just as costly as traditional technical debt.


II. AWS quotas are generally a signal of an architectural problem, not its cause  

Per-account quotas are often the trigger:
Lambda concurrency, DynamoDB limits, API Gateway quotas, and so on.

Technically, these quotas are:

  • specific to each account and each region,
  • sometimes adjustable via Service Quotas,
  • sometimes hard limits that cannot be negotiated.

Creating a new account does make it possible to:

  • start again with a fresh quota,
  • mechanically increase overall capacity.

But this approach hides a crucial point:

The quota is not the right entry point for solving the problem in most cases.

Hitting limits most often reveals a design problem:

  • uncontrolled fan-out (unbounded multiplication of downstream processing triggered by a single event),
  • lack of backpressure (the system cannot slow down or reject load when it reaches its limits),
  • naive event-driven design,
  • incorrect concurrency management.

Multi-account does not fix a fragile architecture.
It makes it more expensive to diagnose.


III. An AWS account is not a technical unit  

An AWS account is first and foremost a strong boundary.

It defines:

  • maximum IAM permissions,
  • quotas,
  • billing,
  • exposure to destructive errors.

This is what is known as a blast radius.

Deleting a bucket, disabling CloudTrail, or breaking an IAM policy in one account should never impact others.
That is exactly what multi-account guarantees — provided it is designed with this goal in mind.

Using an account as a simple container for resources means wasting its primary benefit.


IV. The classic mistake: creating accounts without a model  

Creating accounts “as you go” almost always leads to an unstable system.

Without a clear model, you end up with:

  • accounts per project,
  • then per environment,
  • then per team,
  • then per emergency.

The result:

  • no global coherence,
  • exceptions everywhere,
  • rules that are impossible to explain to newcomers.

A good account segmentation model must answer simple questions:

  • Who is responsible for this account?
  • What happens if it is compromised?
  • Can it be deleted without global impact?
  • What is its lifecycle?

If these answers are not obvious, the segmentation is probably wrong.


V. Security: the true core of multi-account  

One of the major benefits of Organizations is top-down enforced security.

Service Control Policies (SCPs) make it possible to:

  • forbid irreversible actions,
  • even for a local administrator,
  • even by mistake.

Concrete examples:

  • preventing the deletion of CloudTrail,
  • blocking the use of unauthorized regions,
  • preventing the creation of root access keys,
  • enforcing the use of centralized security services.

Without SCPs, every account remains potentially uncontrollable.
With SCPs, multi-account becomes a systemic barrier, not just logical isolation.


VI. IAM: complexity multiplied, not removed  

A common trap is believing that: “Each account has its own IAM, so it’s simpler.”

This is FALSE.

Multi-account introduces:

  • cross-account access,
  • role assumption,
  • trust chains,
  • global and local policies.

Without strict rules:

  • roles become overly permissive,
  • permissions drift,
  • audits become impossible.

A sound multi-account IAM design requires:

  • centralized identity,
  • minimalist roles,
  • strict separation between humans and workloads,
  • non-negotiable naming conventions.

Otherwise, IAM becomes the primary breaking point of the system.


VII. Automation: a non-negotiable condition  

Creating an account manually is acceptable:

  • once,
  • for a test,
  • in a personal lab.

In production, it is an anti-pattern.

An AWS account must be:

  • created via Infrastructure as Code,
  • automatically configured,
  • secured from birth,
  • observable immediately.

Without this:

  • every account is different,
  • every exception is permanent,
  • every fix becomes manual.

Multi-account without automation will create problems very quickly.


VIII. Billing: isolation ≠ control  

Separating accounts makes it possible to:

  • isolate costs,
  • assign responsibility.

But without:

  • per-account budgets,
  • automated alerts,
  • clear usage rules,

this creates no real financial discipline.

A drifting “isolated” account remains a problem — just a localized one.

Multi-account is a tool for visibility, not automatic control.


IX. The false comfort of “+1” email addresses  

The name+X@… email trick is often presented as harmless.

In practice, it causes issues with:

  • legal traceability,
  • access delegation,
  • AWS support,
  • incident management.

It works as long as:

  • one person manages everything,
  • there are no audits,
  • there is no team rotation.

In other words: until the system becomes serious.


X. What multi-account really does  

Multi-account:

  • does not erase errors,
  • does not eliminate complexity,
  • does not replace architecture.

It acts as an amplifier:

  • of good decisions,
  • but also of bad ones.

It forces teams to make their choices:

  • explicit,
  • traceable,
  • and sustainable over time.

Conclusion  

Creating multiple AWS accounts is easy.
Designing a healthy multi-account organization is hard.

Multi-account is not a magic solution.
It is a long-term architectural commitment.

Before adding a new account, you should be able to answer one simple question:

If this account disappeared tomorrow,
would the system still be understandable, secure, and governable?


🔗 Useful resources  

  • AWS Service Quotas – understanding and managing limits
    Official documentation explaining quotas per service, per account, and per region, as well as adjustable and non-adjustable limits.

  • AWS Organizations & Service Control Policies (SCP)
    Comprehensive reference on multi-account governance, the role of SCPs, and their importance in enforcing organization-wide security guardrails.

 The Real Cost of a Bad CI Workflow: Cognitive Load
Upgrading Your Computer Components: Method, Compatibility, Benchmarks… and Mistakes to Avoid 
  • I. Introduction  
  • II. AWS quotas are generally a signal of an architectural problem, not its cause  
  • III. An AWS account is not a technical unit  
  • IV. The classic mistake: creating accounts without a model  
  • V. Security: the true core of multi-account  
  • VI. IAM: complexity multiplied, not removed  
  • VII. Automation: a non-negotiable condition  
  • VIII. Billing: isolation ≠ control  
  • IX. The false comfort of “+1” email addresses  
  • X. What multi-account really does  
  • Conclusion  
  • 🔗 Useful resources  
Follow us

We work with you!

   
Copyright © 2026 Simple Enough Blog All rights reserved. | Powered by Hinode.
Simple Enough Blog
Code copied to clipboard