You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sequential copies to backup acct: backup region 1st, resource region 2nd (#2)
* Sequential copies to backup acct: to backup region 1st, to resource region 2nd
* ReadMe: troubleshooting advice
* ReadMe: new, sequential diagram; fix region cardinality
|[BackupPlan](https://docs.aws.amazon.com/aws-backup/latest/devguide/API_BackupPlan.html).Rules[0]|[TargetBackupVault](https://docs.aws.amazon.com/aws-backup/latest/devguide/API_BackupRule.html#Backup-Type-BackupRule-TargetBackupVaultName)||`Default` (resource region and resource account are implicit)|
Change "Read-only" to `true` to see more events. Select the gear icon at
262
+
the right to add the "Error code" column.
263
+
264
+
<details>
265
+
<summary>Troubleshooting advice...</summary>
266
+
267
+
<br/>
268
+
269
+
If a copy job did not start, or if it started but failed, intervene before
270
+
the deletion day (if any) that you specified when you started the on-demand
271
+
backup. The original backup might be available for you to re-copy.
272
+
273
+
Keep in mind that successful completion of certain on-demand copy jobs will
274
+
trigger Backup Events actions. Completion of the first copy will trigger
275
+
the second, and completion of the second copy will trigger reduction of the
276
+
original backup's retention period. To disable the triggers, temporarily
277
+
set the `EnableCopy` and/or `EnableUpdateLifecycle` CloudFormation
278
+
parameters to `false` .
279
+
280
+
When you start an on-demand backup, keep the start window and the
281
+
completion window as short as possible so that you will not have to wait
282
+
many hours or days for error feedback from AWS Backup.
283
+
284
+
Sometimes, a resource is not in the expected state when AWS Backup
285
+
actually starts a requested backup. For example, an RDS database instance
286
+
must be in the `available` state.
287
+
288
+
Timeouts and cross-region network problems are rare but permissions
289
+
problems are a likely cause of errors. When you start an on-demand backup
290
+
or copy, make sure you have permission to pass your chosen backup role or
291
+
backup copy role to AWS Backup. Start a new on-demand backup or copy
292
+
job after checking and correcting:
293
+
294
+
- policies and the permissions boundary for a custom backup role
295
+
- policies and the permissions boundary for a custom backup copy role
296
+
- availability of the AWSBackupDefaultServiceRole in the backup account
297
+
(even if you use a custom backup copy role, AWS Backup uses the
298
+
default role to complete a cross-account copy)
299
+
- backup vault policies in all relevant AWS accounts and regions (if you
300
+
write custom policies, compare the policies for the sample vaults)
301
+
- central service control policies and resource control policies (SCPs and
302
+
RCPs)
303
+
- key policies for customer-managed KMS encryption keys applied to backup
304
+
vaults (and to resources, if the resource types do not support
305
+
[full management and independent encryption in AWS Backup](https://docs.aws.amazon.com/aws-backup/latest/devguide/encryption.html#independent-encryption))
306
+
307
+
</details>
253
308
254
309
14. Delete the EFS file system and all of its AWS Backup backups (or let
255
310
the backups expire, at a small cost).
@@ -360,7 +415,7 @@ resources potentially deployed to the backup account.
does not support an IAM condition key for vault name or ARN.
482
+
does not support an IAM condition key for vault ARN.
428
483
- Readable IAM policies, broken down into discrete statements by service,
429
-
resource or principal. Policies are formatted as CloudFormation YAML rather
430
-
than JSON.
431
-
- Tolerance for slow operations and clock drift in a distributed system
432
-
- The function that reduces retention of original backups after they have
433
-
been copied applies a full-day margin.
434
-
- Options to encrypt the log and the error queue at rest, using the AWS Key
435
-
Management System (KMS)
484
+
resource or principal. Policies, except those open to customization, are
485
+
formatted as CloudFormation YAML rather than native JSON.
436
486
- Least-privilege SQS queue policy with support for customization
437
-
- Option to use custom vaults (with custom KMS keys) and a custom role for
438
-
AWS Backup
487
+
- Options to encrypt the log and the error queue at rest, using the AWS Key
488
+
Management System
489
+
- Options to use a custom, multi-region KMS key for the sample backup vaults or
490
+
to use custom backup vaults, with KMS keys and vault access policies of your
491
+
choice
492
+
- Option to use a custom role for AWS Backup copy jobs
493
+
- Tolerance for slow operations and clock drift in a distributed system. The
494
+
function that reduces retention of original backups after they have been
495
+
copied applies a full-day margin.
439
496
440
497
### Security Steps You Can Take
441
498
@@ -450,6 +507,23 @@ software at your own risk. You are encouraged to evaluate the source code._
450
507
- Instead of relying on sample vaults, on default `aws/` KMS keys, and on the
451
508
AWSBackupDefaultServiceRole , define custom equivalents with least-privilege
452
509
resource- and/or identity-based policies tailored to your needs.
510
+
- To prevent use of backups if an AWS account containing a backup vault is
511
+
removed from the organization, encrypt backups (and original resources, for
512
+
resource types that do _not_ support
513
+
[full management and independent encryption in AWS Backup](https://docs.aws.amazon.com/aws-backup/latest/devguide/encryption.html#independent-encryption))
514
+
with a custom KMS key housed in an account separate from the original
515
+
resources and the backup vault. In the key policy, deny usage by principals
516
+
outside the organization. Control over key usage is a major benefit of
517
+
creating a customer-managed KMS key. Having the key policy serve as a
518
+
security barrier is a major benefit of housing the key in an account separate
519
+
from the account where it is used. Limit access to this separate account to
520
+
people authorized to change key policies.
521
+
522
+
I am not publishing my custom KMS encryption key policies or AWS Backup
523
+
backup and copy role policies. If you need help with least-privilege,
524
+
cross-account, multi-region KMS key policies, or with least-privilege IAM
525
+
policies for AWS Backup roles, please contact me. This is part of what I
526
+
do for a living.
453
527
454
528
</details>
455
529
@@ -467,7 +541,7 @@ software at your own risk. You are encouraged to evaluate the source code._
467
541
from the second day, and so on, within reason) is a better investment of
0 commit comments