Developing Enterprise Architectures On Amazon Web Services White Paper
Developing Enterprise Architectures On Amazon Web Services White Paper
Developing Enterprise Architectures On Amazon Web Services White Paper
The SHI Enterprise Architecture Assessment Framework gives IT enterprises the capability to develop
and implement the following framework and key performance indicators (KPIs) across their IT
organization:
The SHI Enterprise Architecture Assessment Framework addresses the discovery, planning and
implementation of AWS Enterprise Architectures in three distinct phases.
Introduction
As an AWS Principal Consultant at SHI, I am involved in many conversations with IT leadership from a
variety of industries across the world. From what I’ve seen, IT leadership is fully aware that AWS
adoption is necessary to transforming their IT enterprise. They understand its role in enabling quicker
responses to business requirements, providing agility to development teams, ensuring resilient and
always available workloads, and offering a predictable cost associated with providing IT services to their
enterprise customers. AWS adoption allows IT enterprises to stay competitive by allowing them to
experiment with new technologies, adopt agile frameworks and reduce go-to-market timelines.
Traceability is the capability to demonstrate how a workload or service on AWS is communicating with
its data source, its interfaces, (other services it will use) and who or what is using the workload.
Traceability is simply an audit trail.
The goal of this whitepaper is to illustrate how SHI’s Enterprise Architecture Assessment Framework will
develop and deliver a solution to every IT leader, how this solution can be used to provide necessary
traceability, and to demonstrate the enterprise is safe and compliant. The starting point in delivering
this solution is to develop enterprise architectures and foundational enterprise services for an IT
enterprise.
Enterprise architecture tenets are a lasting standard that aligns to business goals. The framework should
be used as a template to develop application workloads that are secure, compliant and cost-effective,
and align to a business vision. Enterprise architecture tenets should always be used for enterprise
architecture decisions that drive your future enterprise on the AWS cloud. The framework should be
The architecture domains and their retaliation to each other are to be reviewed to develop the IT
organization’s strategy for future state architectures as well as providing the following answers to these
questions:
• Where are assets located, and how will that location influence compliance?
• Why is the service, workload or application being re-factored, and is there an existing AWS
service that can provide the solution?
To deliver a relevant enterprise architecture to your AWS enterprise, we must align all the information
we have discovered by reviewing our enterprise architecture tenets and aligning that information to the
enterprise architecture domains. Remember that the AWS enterprise tenets are the “rules,” and the
enterprise architecture domains are where you apply those rules. With this information in hand, we will
now apply this to our AWS enterprise by developing an operating model that aligns the AWS platform to
our business.
An AWS account is a perimeter around AWS resources that include the following attributes:
AWS Service Control and IAM Policies, how they integrate into AWS Organizations, and how they provide
security and compliance guardrails for your AWS accounts is covered in later sections in this whitepaper.
The first step in developing a multi-AWS account strategy is to identify how your AWS accounts will be
used, (the purpose and business vision for the account), and how the accounts will align to your IT
organization’s enterprise architecture. Using this multi-AWS account approach gives you the
capability for standardized consumption of AWS across accounts, and the ability to align your AWS
accounts to provide and consume shared services (shared infrastructure and transit), security, and role-
1. Identify Account Requirements - What is the purpose and commonalities for each AWS account?
2. AWS accounts should align to your enterprise architecture. For example, your accounts should
align to Business Units, Environments (DEV, TEST), Regional (USA, Europe), workloads or
individual accounts. These account classifications allow you to create a model for standardizing
the AWS account types and the guardrails (compliance rules) that are needed for each account
type.
3. AWS account lifecycles should be identified. For example, the type of AWS account that is being
used and how long will the account be used for (long term, workload or by project).
4. Compliance and security requirements for the workloads and the AWS services running in the
account.
5. How the accounts will be accessed by AWS Principals (Users and Services).
Once the account types and account lifecycles are identified, it is time to align your account types to
your enterprise architecture and organize them into organizational units within AWS Organizations.
AWS Organizations lets you arrange your AWS accounts into groups called organizational units (OUs)
that reflect your enterprise architecture model. Within and across OUs, you can define centrally
managed policies and apply them in a uniform manner. AWS Organizations can also define how
accounts are created and removed from within the IT organization. AWS Organizations provides the
following features and capabilities:
In AWS Organizations, the root contains the AWS Master Account, which is the parent container for all
the AWS accounts for your organization and the AWS account that is used to create your AWS
organization. The master account is used to create “member” accounts in your organization, to invite
AWS Organizations uses OUs that are nested under the root to provide the capability to group AWS
accounts together to align them to your IT organization’s enterprise architecture. The reference
architecture below illustrates another example of a typical AWS Organization aligned to a sample
enterprise architecture. This sample AWS Organization has four OUs under the AWS root to provide the
following business vision for your IT organization:
• Individual Account OU – Groups individual user AWS accounts that are being used for learning
AWS. By placing these accounts in an OU, it allows the IT organization to place specific controls
on these accounts, limit access to specific AWS resources, and provide monitoring and alerting
for account spending limits.
• Application OU – This is a parent OU that will contain all of the IT organization’s application
accounts. Each line-of-business application will have a unique, individual OU under this parent
OU to provide specific account guardrails and compliance baselines.
• Application OUs – Each line-of-business application will have an AWS account assigned to the
application for each application environment (DEV, Pre-PROD, PROD). These accounts will
contain specific security and compliance baselines that are required for each line-of-business
application in each environment.
In this example reference architecture, we have three levels in an OU hierarchy: Enterprise OU,
Environment OU and Application Team OU. At each OU level, we have attached an SCP that is unique to
that OU. Our reference architecture illustrates how the SCP policies flow down the OU hierarchy,
providing specific compliance guardrails at each level. This AWS Organizations feature allows IT
organizations to create specific purposed accounts for each business vision or use case and provide
compliance guardrails by only allowing specific access to AWS services to the AWS principals (users,
groups or roles) to accounts that reside in that OU.
The resulting permissions are the logical intersection of what is allowed by AWS Organizations at the
account level, and what permissions are explicitly granted by IAM at the user or role level within that
account. In other words, the user can access only what is allowed by both the AWS Organizations SCPs
and IAM policies. If either blocks an operation, the user can't access that operation. The value of AWS
Organizations allows our IT organization to centrally set and manage RBAC permissions across all the
AWS accounts. In the reference architecture below, we have the Application Team OU, and there are
three accounts that reside in their team OU. The IAM “actors” are the members of the Application Team
and have access to the three accounts in the OU, (DEV, Pre-PROD and PROD). We want the IAM actors
to have access to all three accounts, but we want to restrict the AWS cross-account access between the
accounts. We can deliver this solution using AWS Organizations and restrict access between the
accounts with IAM policies.
Providing enterprise services to all AWS resources will provide the capability to produce auditable logs,
and fully redundant AWS services and workloads to the enterprise. The SHI Enterprise Architecture
Assessment Framework ensures all AWS resources will have the necessary AWS enterprise service
alignment in its IT organization’s associated enterprise architecture. AWS enterprise services will use the
following AWS services and leverage their native integration in the AWS platform to deliver an end-to-
end solution that provides compliance and traceability across your enterprise IT landscape.
The SHI Enterprise Architecture Assessment will identify all enterprise architecture tenets necessary to
deliver the required security to our AWS workload or service. We then align the AWS security services
necessary to deliver that vision to our enterprise architecture. SHI has identified 11 AWS enterprise
services that should be included in each enterprise architecture, and an example of an AWS service that
can be used to deliver the solution.
4 - Auditable Compliance
Delivering Compliance Starts with Delivering the Key Goals of Enterprise Architectures
In section two, we identified the key goals of Enterprise Architectures, and we discussed how to align
those goals to the IT organization’s business vision and strategy by using the AWS enterprise
architecture tenets and AWS enterprise architecture domains. We used that information to make data-
driven decisions and to develop an enterprise architecture that aligns to AWS Organizations.
In section three, “Operationalizing the AWS Platform by Developing Key AWS Enterprise Services,” we
identified the 11 AWS enterprise services we want all our AWS resources to leverage and always have
access to. These AWS enterprise services will be integrated into our AWS enterprise architectures to
provide the foundational services that will deliver traceability across the IT landscape.
Up until this point, we have used the SHI Enterprise Architecture Assessment Framework to deliver the
following key goals of AWS enterprise architectures:
In this section, we will discuss and illustrate on how to deliver this remaining key goal of an AWS
enterprise architecture:
Enabling traceability across the IT landscape means having the ability to provide the following to your IT
organization:
• The ability to track and audit every change made in every environment in our AWS Enterprise.
• The capability to provide a multi-AWS account solution that has specific business vision and
compliance controls tailored to that account business vision.
• Centralized account billing management capability for charge-back.
• Self-Service for approved AWS Enterprise applications and AWS Accounts.
The following sections will illustrate how to use the AWS Organizations and AWS Landing Zones services
to ensure that specific standards for governance are available in every AWS account and environment
that is in our enterprise (all the architectural practices). The AWS Landing Zones service implements
enterprise AWS architectures for shared services, monitoring, logging, billing, application portfolio
management and security to all AWS accounts in our IT organization. AWS Landing Zones provides the IT
enterprise with the ability to standardize specific AWS accounts that, when implemented, have the
necessary compliance guardrails around the AWS resources available to that account.
The implementation of AWS Landing Zones creates a Master Account and three core accounts, Shared
Services, Log Archive and Security. This AWS account architecture will provide the tools and frameworks
to support governance and traceability across the organization. We will review the four AWS accounts
and how this AWS enterprise architecture will benefit your IT organization, allowing you to deliver
compliance across all accounts and environment architectures. The reference architecture below
illustrates an Enterprise AWS Organization deployed using the AWS Landing Zone service.
Security
The security account creates auditor (read-only) and administrator (full-access) cross-account roles from
a security account to all AWS Landing Zone managed accounts. These roles are to be used by security
and compliance teams to audit, host custom AWS Config Rule Lambda functions, and perform
automated security operations, and break-glass remediation actions. The security account is also used to
manage the AWS GuardDuty service findings and to receive Simple Notification Service (SNS) security
notifications for the AWS member accounts in your organization. This account should be restricted to
authorized security and compliance personnel, and related security or audit tools.
Logging
The log archive account creates a central Amazon Simple Storage Service (S3) bucket for storing a copy
of all AWS CloudTrail and AWS Config log files to this centralized log account. This logging enterprise
architecture ensures compliance by sending a copy of all logs to a central location that is a single source
of truth, and that is only accessible by security and compliance teams. AWS CloudTrail and Amazon
CloudWatch logs for the workload are also created locally in the account so developers and operation
teams can have access to the workload logs.
AWS Config
When AWS Config is enabled, account configuration log files are stored in a centrally managed Amazon
S3 bucket in the log archive account, and each new account will have the AWS Config enabled to provide
account compliance baselines that align to the business vision, compliance and environment rules for
that account. The AWS Config service can send notification alerts when configuration changes to AWS
Config Rules are detected in your AWS account.
• Centralized auditing and governance for all the accounts in your AWS organization.
• AWS Config enables you to record software configuration changes within your Amazon EC2
instances and servers running on-premises, allowing your IT organization to gain visibility into
operating system (OS) configurations, system-level updates, installed applications, network
configuration and AWS account access.
AWS Landing Zone notifications will also notify you to changes within an account to:
• Security Groups
• Network ACLs
• Amazon VPC gateways and peering connections
• Transit Gateway
• Amazon Elastic Compute Cloud (Amazon EC2) instance state
• AWS CloudTrail
• IAM policies
• AWS Config rule compliance status
This will allow your IT organization operation teams to be notified to potential compliance issues. This
service also allows your IT organization the ability to take automated remediation actions from these
alerts.
Conclusion
This whitepaper has illustrated the SHI Enterprise Architecture Assessment Framework and how it will
provide your IT organization with the necessary data-driven decisions to align your IT organization’s
enterprise schema to the AWS platform. The SHI Cloud & Innovative Solutions team has developed this
framework and a comprehensive project plan from our extensive experience in IT transformation. The
data gathered from an enterprise architecture assessment project will provide your IT organization with
the following success criteria: