Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] SRA Org Backup #225

Open
lorodoes opened this issue Jun 25, 2024 · 0 comments
Open

[FEATURE] SRA Org Backup #225

lorodoes opened this issue Jun 25, 2024 · 0 comments
Labels

Comments

@lorodoes
Copy link

Problem:
Currently, backup responsibilities are delegated to customers, Solution Architects (SA), or operations teams, leading to potential errors or omissions. Integrating a standardized backup strategy into the (Security Reference Architecture) SRA design is essential.
Solution:
Implement AWS Backup Service Control Policies (SCP) at the root level, account level, or Organizational Unit (OU) level. This approach ensures that each account adheres to a consistent backup policy, leveraging appropriate tagging and AWS recommended backup solutions and schedules.
Key steps:
• Tagging Strategy:
• Define tags such as Key: Backup, Value: Daily, Key: Backup, Value: Weekly Key: Backup, Value: Monthly .
• Each tag corresponds to a specific backup plan that appropriately backs up the associated resources.
• The backups plans for Daily have a retention period of a week, weekly backups retention is a month, and monthly backups are year.
Centralized Backup Management:
• Implement a centralized backup vault account. Similar to logging or audit accounts, this account would serve a single purpose with tightly controlled access.
• Ensure backups from member accounts are copied to this central vault.
Metadata Preservation:
• Ensure snapshots and AMIs in both member and central vaults retain all resource metadata tags, facilitating complete resource restoration if needed.
Automated Vault Creation:
• Use terraform to create backup vaults in member accounts at the time of account creation.
• Apply the backup policy via SCP to utilize these vaults.
Role Management:
• Use the default IAM role service-role/AWSBackupDefaultServiceRole for backup operations. This role, created during account setup, aligns with AWS best practices and will automatically receive updates for any additional service needs in the future.
By adopting this strategy, we ensure consistent, automated, and reliable backups across all accounts, minimizing the risk of human error and enhancing overall data protection.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant