| Staging Environment | AWS Staging Environment | - Cloud Console access is restricted only to authorized persons
- SSH access is protected by keys and MFA
- Database access is possible only from the internal network
- Kubernetes access is possible only from the internal network
- Only minimal permissions are granted
- No unauthorized access
| AWS StageSeparated AWS Account for the Stage resources. Permissions - StageAdmins : Can list, create, delete, modify AWS resources.
- StageContainerImageAdmins : Can list, create, delete, modify (in snapshot repositories) Docker images.
- StageContainerImageReaders : Can list Docker images.
- StageSupport : an list, create, delete, modify Kubernetes resources and list Docker images.
- InfraBackup : Can list, create, delete, modify items in the Backup S3 Bucket.
- StageEticmaTechUsers : Can list, create, delete, modify ETICMA app related resources w/o MFA.
- StageAdmins
1 DevOps Engineer 3 Infrastructure Engineer( 3 Contractor ) 1 Software Developer - StageContainerImageAdmins
1 Technical Account - StageContainerImageReaders
1 Technical Account - StageSupport
3 Software Developer - InfraBackup
1 Technical Account - StageEticmaTechUsers
1 Technical Account
AWS Stage BastionEC2 instance to access the Stage internal network and databases. Permissions - Root : Can administer Linux OS.
- User : Can log in and access the internal network of the Staging environment.
- Root
1 DevOps Engineer 3 Infrastructure Engineer( 3 Contractor ) 1 Software Developer - User
3 Software Developer
|
| Production Environment | AWS Production Environment | - Cloud Console access is restricted only to authorized persons
- SSH access is protected by keys and MFA
- Database access is possible only from the internal network
- Kubernetes access is possible only from the internal network
- Only minimal permissions are granted
- No unauthorized access
| AWS ProdSeparated AWS Account for the Prod resources. Permissions - Admins : Can list, create, delete, modify AWS resources.
- BillingAdmins : Can view billing details, costs, invoices.
- ContainerImageAdmins : Can list, create, delete, modify Docker images.
- Support : an list, create, delete, modify Kubernetes resources and list Docker images.
- Admins
1 DevOps Engineer 3 Infrastructure Engineer( 3 Contractor ) 1 Software Developer - BillingAdmins
1 DevOps Engineer - ContainerImageAdmins
1 Technical Account - Support
3 Software Developer
AWS Prod BastionEC2 instance to access the Prod internal network and databases. Permissions - Root : Can administer Linux OS.
- User : Can log in and access the internal network of the Production environment.
- Root
1 DevOps Engineer 3 Infrastructure Engineer( 3 Contractor ) 1 Software Developer - User
3 Software Developer
|
| Log Analysis and Monitoring | Datadog Loggin and Monitoring System | - Login access is restricted only to authorized persons
- Only minimal permissions are granted
- No unauthorized access
| Datadog EULog management and monitoring tool for our staging and production applications. Permissions - Admin : Can administer all resources. Can not delete logs.
- Write : Can read, create, delete, modify monitors, dashboards. Can read logs.
- Read : Can read monitors, dashboards, logs.
- Billing : Can view billing details, and download invoices
- Read
1 DevOps Engineer 2 Infrastructure Engineer( 2 Contractor ) 7 Software Developer 3 Test Engineer 8 Support Agent 1 Product Owner 1 CEO - Billing
1 Finance
Datadog USLog management and monitoring tool for our staging and production applications. Permissions - Admin : Can administer all resources. Can not delete logs.
- Write : Can read, create, delete, modify monitors, dashboards. Can read logs.
- Read : Can read monitors, dashboards, logs.
- Billing : Can view billing details, and download invoices
- Read
1 DevOps Engineer 2 Infrastructure Engineer( 2 Contractor ) 7 Software Developer 3 Test Engineer 8 Support Agent 1 Product Owner 1 CEO - Billing
1 Finance
|