Search for Well Architected Advice
< All Topics
Print

Implement managed services

Implementing managed services such as Amazon RDS, AWS Lambda, and Amazon ECS allows you to offload security and maintenance tasks related to infrastructure management. These services operate within the shared responsibility model, where AWS manages key security aspects such as hardware provisioning, patching, and backups, while you focus on securing your applications and workloads at the code and configuration levels. By leveraging managed services, you can reduce the complexity of securing and maintaining your compute resources, freeing up time to focus on higher-level security tasks.

  1. Use Amazon RDS for database management: Amazon RDS automates the setup, operation, and scaling of relational databases, taking over tasks such as hardware provisioning, database setup, patching, and backups. By using Amazon RDS, you minimize the need to manually manage these tasks, allowing you to focus on securing database access, encryption, and data integrity. RDS also includes features such as automated backups and database snapshots, helping ensure data availability and security.
  2. Run serverless workloads with AWS Lambda: AWS Lambda lets you run code without provisioning or managing servers, simplifying the security responsibilities for your workloads. With Lambda, you don’t need to manage the underlying infrastructure, operating systems, or patching. Instead, you focus on securing the code, configuring permissions through AWS Identity and Access Management (IAM), and ensuring secure communication and invocation of the Lambda functions.
  3. Use Amazon ECS for container management: Amazon ECS allows you to run containerized applications in a managed environment, reducing the operational overhead of managing the underlying infrastructure. ECS automates the scheduling, scaling, and patching of your container instances, so you can focus on securing containerized applications by managing the container images, access controls, and network configurations.
  4. Automate operational tasks: Managed services like AWS Lambda, Amazon RDS, and Amazon ECS automate many operational tasks, such as patch management, instance scaling, and monitoring. This reduces the risk of human error and ensures that your infrastructure remains up to date and secure without manual intervention.
  5. Focus on higher-level security: By implementing managed services, you can shift your security focus to the application layer, including encryption, access control, and monitoring for your workloads. You can use AWS tools like AWS CloudTrail, AWS Config, and Amazon GuardDuty to monitor and enforce security policies at the application and network levels.
  6. Leverage built-in security features: Managed services such as Amazon RDS and AWS Lambda come with built-in security features like encryption at rest and in transit, automatic patching, and compliance with industry security standards. These features help reduce your security burden by ensuring that essential security measures are consistently applied across your resources.

Supporting Questions:

  • How do you leverage managed services to reduce security maintenance tasks in your environment?
  • What processes do you have in place to monitor and secure managed services like RDS, Lambda, and ECS at the application level?
  • How do you use the shared responsibility model to focus on securing your workloads while AWS manages the infrastructure?

Roles and Responsibilities:

Cloud Architect:

  • Responsibilities:
    • Design workloads using managed services such as Amazon RDS, AWS Lambda, and Amazon ECS to offload infrastructure management tasks and reduce the operational security burden.
    • Focus on configuring security controls and permissions for managed services, including IAM policies, network configurations, and encryption settings.

Cloud Administrator:

  • Responsibilities:
    • Monitor managed services for security and operational performance using AWS CloudWatch, AWS Config, and AWS CloudTrail.
    • Ensure that security policies and access controls are applied consistently across managed services and workloads.

Artefacts:

  • Managed Services Configuration Documentation: Documentation of how managed services like RDS, Lambda, and ECS are configured, including security settings such as encryption, access controls, and backups.
  • Patch and Backup Logs: Logs from AWS services such as RDS showing automated patching and backup activities, ensuring compliance with security and availability requirements.
  • IAM and Access Control Policies: Records of IAM policies and security group configurations applied to managed services to control access and permissions.

Relevant AWS Services:

AWS Managed Services:

  • Amazon RDS (Relational Database Service): A managed database service that handles database provisioning, patching, backups, and scaling, allowing you to focus on securing database access, encryption, and data integrity.
  • AWS Lambda: A serverless compute service that abstracts infrastructure management, so you can focus on code-level security, including securing permissions, inputs, and outputs.
  • Amazon ECS (Elastic Container Service): A managed service for running containerized applications that automates container orchestration, patching, and scaling, helping you focus on securing containers and application logic.

AWS Security and Monitoring Tools:

  • AWS Identity and Access Management (IAM): Manage access controls for managed services, ensuring that only authorized users and services can interact with your resources.
  • AWS CloudTrail: Monitors API activity across managed services, helping you detect unauthorized access or actions within your managed infrastructure.
  • AWS Config: Tracks changes in the configurations of managed services, ensuring compliance with security policies and detecting misconfigurations or unauthorized changes.
  • Amazon GuardDuty: Monitors managed services for threats and anomalies, helping you detect potential security issues in real-time.
Table of Contents