| Staging Environment | AWS Staging Environment | - Cloud Console access is restricted only to authorized persons
- SSH access is protected by keys and MFA
- Database access is possible only from the internal network
- Kubernetes access is possible only from the internal network
- Only minimal permissions are granted
- No unauthorized access
| AWS Stage Separated AWS Account for the Stage resources. Permissions - StageAdmins : Can list, create, delete, modify AWS resources.
- StageContainerImageAdmins : Can list, create, delete, modify (in snapshot repositories) Docker images.
- StageContainerImageReaders : Can list Docker images.
- StageDeployers : an list, create, delete, modify Kubernetes resources and list Docker images.
- InfraBackup : Can list, create, delete, modify items in the Backup S3 Bucket.
- StageEticmaTechUsers : Can list, create, delete, modify ETICMA app related resources w/o MFA.
- StageEticmaUsers : Can list, create, delete, modify ETICMA app related resources.
- StageAdmins
1 DevOps Engineer 2 Infrastructure Engineer ( 2 Contractor ) 1 Software Developer - StageContainerImageAdmins
1 Technical Account - StageContainerImageReaders
1 Technical Account - StageDeployers
3 Software Developer - InfraBackup
1 Technical Account - StageEticmaTechUsers
1 Technical Account - StageEticmaUsers
3 Software Developer 1 Test Engineer AWS Stage Bastion EC2 instance to access the Stage internal network and databases. Permissions - Root : Can administer Linux OS.
- User : Can log in and access the internal network of the Staging environment.
- Root
1 DevOps Engineer 2 Infrastructure Engineer ( 2 Contractor ) - User
4 Software Developer 1 Technical Account |
| Production Environment | AWS Production Environment | - Cloud Console access is restricted only to authorized persons
- SSH access is protected by keys and MFA
- Database access is possible only from the internal network
- Kubernetes access is possible only from the internal network
- Only minimal permissions are granted
- No unauthorized access
| AWS Prod Separated AWS Account for the Prod resources. Permissions - Admins : Can list, create, delete, modify AWS resources.
- BillingAdmins : Can view billing details, costs, invoices.
- ContainerImageAdmins : Can list, create, delete, modify Docker images.
- Deployers : an list, create, delete, modify Kubernetes resources and list Docker images.
- Admins
1 DevOps Engineer 2 Infrastructure Engineer ( 2 Contractor ) 1 Software Developer - BillingAdmins
1 DevOps Engineer - ContainerImageAdmins
1 Technical Account - Deployers
3 Software Developer AWS Prod Bastion EC2 instance to access the Prod internal network and databases. Permissions - Root : Can administer Linux OS.
- User : Can log in and access the internal network of the Production environment.
- Root
1 DevOps Engineer 2 Infrastructure Engineer ( 2 Contractor ) 1 Software Developer - User
3 Software Developer 1 Technical Account |
| Log Analysis and Monitoring | Datadog Loggin and Monitoring System | - Login access is restricted only to authorized persons
- Only minimal permissions are granted
- No unauthorized access
| Datadog Log management and monitoring tool for our staging and production applications. Permissions - Admin : Can administer all resources. Can not delete logs.
- Write : Can read, create, delete, modify monitors, dashboards. Can read logs.
- Read : Can read monitors, dashboards, logs.
- Admin
1 DevOps Engineer 1 Infrastructure Engineer ( 1 Contractor ) 1 Software Developer 1 Product Owner 1 Technical Account - Write
1 Software Developer 1 Atlassian Consultant - Read
1 Infrastructure Engineer ( 1 Contractor ) 6 Software Developer 2 Test Engineer 3 Support Agent 1 Product Owner 1 CEO |