← Articles

April 4, 2026 · Tim Fraser, Cloud Operations Lead

I Inherited an AWS Account — Where Do I Start?

Someone left. Or someone got promoted. Or the company grew and suddenly "the AWS stuff" needs an owner. And now it's you.

You're a capable developer. You can write code, deploy applications, maybe even set up a CI/CD pipeline. But managing an AWS account — understanding what's running, what it costs, whether it's secure — that's a different skill set. And nobody gave you a handover document.

Most small companies end up here at some point. Here's a practical, prioritised guide to getting your bearings.

Week 1: Understand what exists

Before you change anything, you need to know what you're working with.

Get the bill

Go to AWS Console → Billing → Bills. Look at the current month and the previous 3 months. This tells you:

Write down the top 5 services by cost. These are where you'll spend most of your time.

Map the running resources

For each of the major services, go to the console and take inventory:

Don't try to understand everything on day one. The goal is a rough inventory — "we have 8 EC2 instances, 2 RDS databases, 15 S3 buckets, and an ALB."

Check the regions

AWS resources can exist in any region. The console defaults to one region, so you might be looking at an empty account when there are 20 instances running in us-east-1. Check at least: ap-southeast-2, us-east-1, us-west-2, eu-west-1 — these are the most commonly used.

The AWS Resource Explorer service (if enabled) can help here — it shows resources across all regions in one view.

Check who has access

Go to IAM → Users. Who has console access? Who has programmatic access? Are there any users with AdministratorAccess that you don't recognise?

Also check IAM → Roles. Are there cross-account roles? Third-party integrations?

This isn't about fixing anything yet — it's about knowing who can do what.

Week 2: Assess security

Now that you know what exists, check whether it's secure.

Enable CloudTrail (if it isn't already)

Go to CloudTrail → Trails. If there's no trail configured, create one. CloudTrail records every API call in the account — it's your audit log and your investigation tool. Without it, you're flying blind.

Check for public resources

Enable MFA on the root account

Go to IAM → Dashboard. If the root account doesn't have MFA enabled, this is your highest priority. The root account has unrestricted access to everything and cannot be limited by IAM policies.

Check for access keys on the root account

Root access keys are a critical security risk. Go to Security Credentials (while logged in as root) and delete any active access keys.

Week 3: Set up monitoring

Create a billing alarm

Go to CloudWatch → Alarms → Billing. Set an alarm that triggers when your monthly bill exceeds your normal spend by 20%. This is your early warning system.

Enable AWS Config (if budget allows)

AWS Config tracks configuration changes to your resources. It's how you find out that someone modified a security group last Tuesday. It has a cost, so check pricing first — but for production accounts, it's worth it.

Set up basic CloudWatch alarms

For your most important resources, set up alarms for:

Week 4: Start improving

Now that you have visibility, start making changes:

The shortcut

Everything above takes about a month of part-time work. If you want to shortcut weeks 1-3 into an afternoon, that's exactly what plainfra is built for.

Connect your AWS account (read-only — one CloudShell command, takes 3 minutes) and start asking questions:

> "What's running in this account and what does it cost?"

"Are there any security issues I should know about?"
"Which resources are unused?"

plainfra makes live read-only API calls to your account and gives you the answers directly. No scripts to write, no console tabs to juggle, no need to know which AWS service does what.

The biggest difference for someone new to AWS operations is the weekly health report.

Every week, plainfra runs a comprehensive scan across all your connected AWS accounts and emails you a PDF report. It flags security exposures, cost anomalies, configuration drift, and operational risks — prioritised by impact. If you manage multiple AWS accounts, the report covers all of them.

It's like having a senior DevOps engineer review your infrastructure every Monday and hand you a to-do list. You don't need to know what to check — plainfra checks everything and tells you what matters.

And it stays connected. When something changes — a new public security group, a cost spike, an expiring certificate — it shows up in next week's report. You're not doing a one-time audit and hoping nothing breaks. You get ongoing monitoring without the ongoing work.

That's worth a lot when you've got an AWS account you didn't ask for and a day job that isn't "manage AWS."

Try plainfra free → 50K tokens, 7 days, no charge. Or see the interactive demo →.