GitXplorerGitXplorer
a

aws-backup-automation

public
34 stars
28 forks
3 issues

Commits

List of commits on branch main.
Unverified
703450876f5e7d9ffdae9312deb97a307c977d45

updated org policy tag_key

committed 3 years ago
Unverified
1202d547ad170bf8866a8e8ca5bf0f4f6e26455a

updated cloudformation stack for improved ux

committed 3 years ago
Unverified
dcc436f3423a84725221ef21e6ae85d75abc4a84

updated cloudformation stack for improved ux

committed 3 years ago
Unverified
42c3774c6b6dfbf9df365f22179b760af8d3d503

updated cloudformation stack for improved ux

committed 3 years ago
Verified
7fc5629cfe99a42794a0255d9b2e384ec49e6128

Update S3 bucket name

oowlvat committed 3 years ago
Unverified
37f9c690c33bac1bef0061bd125984cc3d170763

Updated AWS Organizations home region

committed 3 years ago

README

The README file for this repository.

This solution demonstrates how you can save time using AWS CloudFormation automation to centrally automate and scale the process of implementing AWS Backup policies, backup vaults, and cross-Region, cross-account replication across your multi-account AWS environment. Using this solution, you can easily manage AWS Backup with automation and implement a data protection strategy that mitigates the risk of data loss.. In this repository, you will find all the AWS CloudFormation templates and Python code that will build this solution in your AWS environment.

Solution architecture and design

The workflow and architecture of the solution works as follows:

In the management account (the environment hosting your AWS Organizations):

  1. Opt in to use the AWS Backup service and cross-account management features. See the blog post on how to Automate centralized backup at scale across AWS services using AWS Backup for further details.
  2. aws-backup-member-account-iam-role.yaml: This stackset implements the IAM roles assumed by the AWS Backup service for backup and restore jobs across the member accounts.
  3. aws-backup-member-account.yaml: This stackset implements the local backup vaults and vault AWS KMS encryption keys in the member accounts. We assume that the supported AWS Backup resources in the member accounts are tagged as indicated in the prerequisites section of the blog.
  4. aws-backup-central-backup-account.yaml: This stackset implements the central backup vault, IAM role, vault AWS KMS encryption key, and vault access policy in the central backup account.
  5. aws-backup-org-policy.yaml: This stack implements a Lambda function, Lambda IAM role, and centralized backup policies. The backup policies consist of tag-based and cross-account, cross-Region copy policies that are automatically attached to the root OU and inherited by all AWS Organizations accounts.

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.