Securing Your Account
Establish safe and controlled account access with users and roles, MFA, AuthKey governance, and audit visibility
PathsEstablish safe and controlled access to your Soracom account. This path helps you implement governance basics: users and roles, MFA, credential handling, and audit visibility for ongoing control.
What you will harden
- Role-based access boundaries for teams
- MFA rollout and policy enforcement
- AuthKey lifecycle and storage discipline
- Audit trail review and incident traceability
Suggested sequence
- SAM Users & Roles - Set least-privilege access by responsibility.
- MFA & Security - Protect privileged and day-to-day access.
- API Authentication - Control AuthKey usage in automation.
- Credentials Store - Avoid hardcoded credentials in workflows.
- Audit Logs - Validate who changed what and when.
Hands-on checkpoint
Implement a baseline governance model where:
- Admin and operator responsibilities are separated
- MFA is enabled for all privileged users
- AuthKeys are rotated and documented
- A monthly audit review process is defined