AWS Resource Access Manager (RAM): Cross-Account Resource Sharing
Last updated
Was this helpful?
Last updated
Was this helpful?
AWS Resource Access Manager (RAM) is a centralized service that enables secure resource sharing across multiple AWS accounts.
Resources can be shared across individual accounts or organizational units
Shared resources appear as native resources in recipient accounts
Original sharing account maintains resource ownership
Organization must explicitly enable resource sharing functionality
Defined entities that can access shared resources
Can include specific AWS accounts or roles
Must be within the same AWS organization
Can be individual accounts or entire organizational units
Identify specific resources for sharing
Common shareable resources include:
VPC subnets
Network firewall settings
Certificate authorities
Aurora/RDS clusters
App Mesh configurations
Apply managed policies to resource shares
Define allowable actions for principals
Set appropriate access levels
Configure resource-specific permissions
Specify target accounts and roles
Define access scope
Establish sharing boundaries
Configure organizational unit access if applicable
Send share invitations to principal accounts
Recipients must accept invitations through RAM
Verify access post-acceptance
Monitor sharing status
Share VPC subnets across accounts
Eliminate need for complex VPC peering
Maintain centralized network control
Enable consistent network security
Centralize private certificate authorities
Share certificates across multiple accounts
Reduce certificate management complexity
Lower overall certificate costs
Share Aurora/RDS clusters cross-account
Enable cross-account database cloning
Maintain centralized database control
Simplify database access management
Share App Mesh configurations
Enable cross-account application networking
Simplify service discovery
Maintain consistent mesh policies
Shared resources must exist in the same region
Cross-region sharing not supported
Plan regional resource deployment carefully
Consider regional boundaries in architecture design
Recipient accounts have limited permissions
Cannot destroy shared resources
Maintain careful access control
Regular permission audits recommended
Enable resource sharing at organization level before implementation
Document all shared resources and their principals
Regularly review and audit sharing permissions
Implement consistent naming conventions for shared resources
Monitor resource utilization across accounts
Maintain clear documentation of sharing relationships
Regularly validate sharing configurations
For effective implementation testing:
Set up multiple test accounts
Verify sharing functionality in controlled environment
Test permission boundaries
Validate resource access
Confirm regional limitations
Document sharing procedures
Clean up test resources after validation.