Securing Your Account
Establish safe and controlled account access with users and roles, MFA, AuthKey governance, and audit visibility
Pathsこのページはまだ日本語では利用できません。現在は English版を表示しています。ブラウザの翻訳機能をご利用ください。
ブラウザで翻訳する
Chrome / Edge: アドレスバーの翻訳アイコン、またはページを右クリックして「日本語に翻訳」を選択します。
Safari: アドレスバーの「aA」メニューから「翻訳」を選択します。
翻訳メニューが表示されない場合は、ブラウザ設定で翻訳機能が有効になっているか確認してください。
Establish safe and controlled access to your Soracom account. This path helps you implement governance basics: users and roles, MFA, credential handling, and audit visibility for ongoing control.
What you will harden
- Role-based access boundaries for teams
- MFA rollout and policy enforcement
- AuthKey lifecycle and storage discipline
- Audit trail review and incident traceability
Suggested sequence
- SAM Users & Roles - Set least-privilege access by responsibility.
- MFA & Security - Protect privileged and day-to-day access.
- API Authentication - Control AuthKey usage in automation.
- Credentials Store - Avoid hardcoded credentials in workflows.
- Audit Logs - Validate who changed what and when.
Hands-on checkpoint
Implement a baseline governance model where:
- Admin and operator responsibilities are separated
- MFA is enabled for all privileged users
- AuthKeys are rotated and documented
- A monthly audit review process is defined