Skip to main content

Securing Your Account

Establish safe and controlled account access with users and roles, MFA, AuthKey governance, and audit visibility

Paths

Establish safe and controlled access to your Soracom account. This path helps you implement governance basics: users and roles, MFA, credential handling, and audit visibility for ongoing control.

What you will harden

  • Role-based access boundaries for teams
  • MFA rollout and policy enforcement
  • AuthKey lifecycle and storage discipline
  • Audit trail review and incident traceability

Suggested sequence

  1. SAM Users & Roles - Set least-privilege access by responsibility.
  2. MFA & Security - Protect privileged and day-to-day access.
  3. API Authentication - Control AuthKey usage in automation.
  4. Credentials Store - Avoid hardcoded credentials in workflows.
  5. Audit Logs - Validate who changed what and when.

Hands-on checkpoint

Implement a baseline governance model where:

  • Admin and operator responsibilities are separated
  • MFA is enabled for all privileged users
  • AuthKeys are rotated and documented
  • A monthly audit review process is defined

Next paths

Search Esc to close / Enter to view results