Cloud accounts, tenants, and administrative boundaries are one of the earliest IAM choices a customer makes, and they shape everything that follows.
Cloud accounts, tenants, and administrative boundaries are one of the earliest IAM choices a customer makes, and they shape everything that follows. Providers offer accounts, subscriptions, projects, organizations, and tenant scopes as boundary primitives. Customers decide how to use those primitives to separate production from non-production, isolate workloads, contain blast radius, and limit who can administer what.
This is why account and tenant design belongs firmly on the customer side of the shared responsibility model. The provider gives you the boundary mechanisms. The customer decides whether those mechanisms are used in a way that creates meaningful separation or accidental sprawl.
The boundary hierarchy often looks like this:
flowchart TD
A["Organization or tenant"] --> B["Accounts or subscriptions"]
B --> C["Projects, resource groups, or environments"]
C --> D["Administrative scopes and delegated roles"]
D --> E["Workloads and identities"]
What to notice:
Poor account and tenant structure can turn every later control into cleanup work. If production and non-production share the same administrative boundary, strong role design becomes harder. If many unrelated workloads share one tenant or account without clear separation, incident isolation and access review become weaker. If central and local administrators are not scoped carefully, break-glass access and exception handling become difficult to control.
1organization: acme-cloud
2
3tenants:
4 - corp-identity
5
6accounts:
7 - prod-shared-services
8 - prod-customer-platform
9 - nonprod-engineering
10 - security-audit
11
12admin_boundaries:
13 prod-admins:
14 scope:
15 - prod-shared-services
16 - prod-customer-platform
17 security-readonly:
18 scope:
19 - prod-shared-services
20 - prod-customer-platform
21 - nonprod-engineering
What this demonstrates:
Strong administrative boundaries usually aim to achieve:
The exact model differs across providers, but the principle remains stable: the customer chooses the structure that determines how trust and privilege flow.
A team uses separate accounts for production and development but grants the same high-privilege group full administration in both. The team says the environments are therefore properly separated. Is that a strong conclusion?
Only partially. The stronger answer is that the structural split exists, but the shared privileged group weakens the administrative boundary. Separation is strongest when scope, privilege, and review model align.