Ninja Docs Help

LLD001-001 - Organization and Account Hierarchy

Introduction

Purpose

The purpose of this document is to outline the low-level design architecture for AWS Organization & Account Hierarchy, to set up and manage a secure, scalable, and compliant AWS environment.

Changelog

Revision

Date

Description

1.0

28.06.2024

Initial document

HLD001 - AWS Landing Zone

Background

Multi-account strategy provides a way to manage and organize multiple AWS accounts under single consolidated billing structure. It also helps to enhance security, resource isolation, and cost management.

Architecture diagram

LLD001-001-OAH-01.png

Implementation Details

Organizational units

  • Security: Highly restricted environment for security tools and auditing.

  • Infrastructure: Fundamental environment for all accounts which server cloud infrastructure tools. The infrastructure OU can grow on customers' demand, but requires high security restrictions and detailed monitoring.

  • Workloads: Environment for all customer workloads. Accounts are constantly monitored by security tools to prevent security incidents.

  • Nested Workloads: Dedicated Organization Unit within Workloads OU for logical environment separation.

  • Sandbox: Separate environment for development, testing, and PoCs. The sandbox OU allows for innovation and experimentation without affecting the production environment and reduces the risk of unintended impact on other workloads.

Accounts

  1. Shared Services PRD Account:

    • Purpose: For hosting shared resources like CLoudStore, build and deployment tools, etc.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  2. Shared Services TST Account:

    • Purpose: For development and testing shared resources like CloudStore, build and deployment tools, etc.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  3. Central Network Account:

    • Purpose: For hosting the central Ingress VPC, with NGFW and other central appliances.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  4. Shared Network Accounts (1 per workload environment):

    • Purpose: For hosting shared VPCs used by workload & application accounts.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  5. Monitoring Account:

    • Purpose: For hosting monitoring tools like OpenSearch, Prometheus, Grafana.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  6. Backup Account:

    • Purpose: For storing backup copies from entire environment.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU:Infrastructure

  7. Root CA Account:

    • Purpose: For storing and managing Root certificate Authority.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  8. Remote Access Account:

    • Purpose: For hosting PAM solution.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  9. IAM Account:

    • Purpose: For storing and managing dedicated IAM users.

    • Users: DevOps and Infrastructure teams.

    • Access: Grant necessary permissions based on resource requirements.

    • OU: Infrastructure

  10. Security Account:

    • Purpose: For centralizing security logs, monitoring, and incident response.

    • Users: Security teams.

    • Access: Limit access to security teams and grant permissions to required AWS services.

    • OU: Security

  11. Log-Archive Account:

    • Purpose: For storing and managing logs from all other accounts.

    • Users: Security and audit teams.

    • Access: Limit access to required personnel and grant permissions to necessary AWS services.

    • OU: Security

  12. Development (Workload) Account:

    • Purpose: For development and testing of applications.

    • Users: Developers and QA teams.

    • Access: Grant necessary permissions to required AWS services.

    • OU: Dev Workloads

  13. Test (Workload) Account:

    • Purpose: For testing of applications.

    • Users: Developers and QA teams.

    • Access: Grant necessary permissions to required AWS services.

    • OU: TST Workloads

  14. SIT (Workload) Account:

    • Purpose: For integration environments.

    • Users: QA and DevOps teams.

    • Access: Grant necessary permissions to required AWS services.

    • OU: SIT Workloads

  15. NIT (Workload) Account:

    • Purpose: For integration environments.

    • Users: QA and DevOps teams.

    • Access: Grant necessary permissions to required AWS services.

    • OU: NIT Workloads

  16. Pre-Production (Workload) Account:

    • Purpose: For Pre-Production environments.

    • Users: QA and DevOps teams.

    • Access: Grant necessary permissions to required AWS services.

    • OU: PREP Workloads

  17. Production (Workload) Account:

    • Purpose: For running production workloads.

    • Users: DevOps teams and application support teams.

    • Access: Limit access to only necessary services and follow the principle of least privilege.

    • OU: PRD Workloads

  18. Sandbox Account:

    • Purpose: For experimentation and learning.

    • Users: Developers and architects.

    • Access: Provide limited access to users to avoid resource misuse.

    • OU: Sandbox

Expected Outcomes

  1. Secure setup of AWS environment.

  2. Consistent governance and enforcement of security and compliance policies.

  3. Improved visibility and control over user access.

  4. Regular monitoring and reporting on the state of the environment.

Last modified: 17 February 2025