Pages

AWS Landscape 3: AWS Accounts

A well-architected SAP landscape in AWS requires a structured multi-account approach. Each account provides isolation, security, governance, and scalability, enabling independent lifecycle management for SAP workloads, shared services, and core infrastructure.
Key benefits of this multi-account approach:
  • Security: Limits blast radius by isolating production from non-production environments.
  • Governance: Allows centralized logging, compliance monitoring, and service control policies (SCPs).
  • Operational Management: Supports independent teams managing workloads, networking, and security.
  • Scalability: New accounts can be added with minimal disruption.
Objective:
  • Define all AWS accounts required for the SAP landscape to ensure:
  • Isolation for production, development, and sandbox workloads
  • Centralized management for security, logging, and shared services
  • Clear governance boundaries with tagging and SCPs
  • Scalable architecture for future environments or projects
Design Overview
AWS accounts are categorized into three main types:
Account TypeAccount NamePurpose
Master & GovernanceMaster Payer Account (MPA)Centralized billing, AWS Organizations management
Network & SecurityNetwork Service AccountCentralized VPC, Transit Gateway, and networking services
Shared Services AccountShared infrastructure (AD, DNS, monitoring)
Security AccountSecurity tooling, IAM policies, compliance monitoring
Logging AccountCentralized logging (CloudTrail, CloudWatch Logs, S3)
SAP Workload AccountsProduction AccountProduction SAP workloads
Development AccountSAP development workloads
Pre-Production AccountStaging/pre-release SAP workloads
Quality AccountQA and integration testing workloads
Sandbox AccountAd-hoc testing, PoC, learning environments
Principles:
  • Each account is isolated for security, operational management, and billing.
  • Shared and security accounts centralize governance.
  • Network connectivity is managed via Transit Gateway in the Network Service Account.
Technical Steps to Create & Configure AWS Accounts

Step 1: Create Accounts via AWS Organizations
Log in to the Master Payer Account (MPA).
Navigate to AWS Organizations → Accounts → Add account → Create account.
Enter the account details:
  • Account Name: e.g., Production, Development, Security
  • Email: Use internal aliases (e.g., prod-team@example.com)
  • Select OU: Choose appropriate OU (Production, Non-Production, Security)
Click Create account.
Repeat for all required accounts (Production, Development, QA, Pre-Prod, Sandbox, Security, Shared Services).
Tip: Keep a spreadsheet to track accounts, emails, and OU assignments for governance.

Step 2: Enable IAM & Security Baseline
Enable IAM Identity Center (SSO):
  • Centralizes user access across all AWS accounts.
  • Assign users/groups per environment and role.
Create IAM Roles per Account:
  • Admin: Cross-account administrative access.
  • Read-only: Monitoring and auditing.
  • SAP Ops: Workload-specific operational tasks.
Enforce Security Controls:
Enable MFA for all users and roles.
Apply Service Control Policies (SCPs) per OU:
  • Production OU: strict policies.
  • Non-Production OU: flexible policies.
  • Security OU: restricted to security-related services.
Step 3: Networking & Peering
Single VPC per account (as per VPC Design guidelines).
AWS Transit Gateway:
  • Deploy in Network Services Account.
  • Connect all environment accounts: Production, Development, QA, Pre-Production, Sandbox.
  • Connect Shared Services and Security accounts.
Route Tables & Subnets:
  • Use private and public subnets per account.
  • Maintain routing isolation: Production cannot directly access non-production networks.
  • Configure peering or Transit Gateway routes only where necessary.
Step 4: Tagging
Apply tags to all accounts for automation, cost tracking, and governance:
Tag KeyExample ValuePurpose
EnvironmentProduction / Dev / QA / SandboxIdentify environment
ProjectSAP MigrationTrack project costs
AccountTypeWorkload / Security / SharedCategorize account type
Tip: Use AWS Tag Policies to enforce tag standardization across accounts.

Step 5: Logging & Monitoring Integration
CloudTrail:
  • Enable in each account.
  • Aggregate logs into Logging Account for centralized visibility.
CloudWatch Logs:
  • Forward application and infrastructure logs to the Logging Account.
Security Account Monitoring:
  • Monitor IAM activity, compliance events, and guardrails.
  • Optionally, integrate with Security Hub or SIEM for consolidated alerting.
Diagram – AWS Account Connectivity

Master Payer Account (Root)
  • Centralized billing & governance
  • Service Control Policies (SCPs) enforcement
  • No workloads
Platform Services Accounts
  • Network Services: Hub VPC, Transit Gateway, DNS, firewalls
  • Shared Services: CI/CD, automation, identity management
  • Security: Threat detection, monitoring, vulnerability management
  • Logging: Centralized audit logs, immutable storage
Workload Environment Accounts
  • Production: Live workloads, strict security & availability
  • Development: Feature development & experimentation
  • Pre-Prod: Production-like staging environment
  • Quality (QA): Testing & validation
  • Sandbox: Safe experimentation & temporary workloads
Notes:
This multi-account structure follows AWS best practices for SAP workloads.
  • Future accounts can be added under the appropriate OU.
  • Security, logging, and shared services accounts provide centralized governance.
  • Transit Gateway ensures secure, scalable VPC-to-VPC connectivity.
  • Enforce naming conventions, tagging standards, and SCPs for consistent governance.

No comments:

Post a Comment