Best practices for using backup policies - Amazon Organizations
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Best practices for using backup policies

Amazon recommends the following best practices for using backup policies.

Decide on a backup policy strategy

You can create backup policies in incomplete pieces that are inherited and merged to make a complete policy for each member account. If you do this, you risk ending up with an effective policy that is not complete if you make a change at one level without carefully considering the change's impact on all accounts below that level. To prevent this, we recommend that you instead ensure that the backup policies you implement at all levels are complete by themselves. Treat the parent policies as default policies that can be overridden by settings specified in child policies. That way, even if a child policy doesn't exist, the inherited policy is complete and uses the default values. You can control which settings can be added to, changed, or removed by child policies by using the child control inheritance operators.

Validate changes to your backup policies checking using GetEffectivePolicy

After you make a change to a backup policy, check the effective policies for representative accounts below the level where you made the change. You can view the effective policy by using the Amazon Web Services Management Console, or by using the GetEffectivePolicy API operation or one of its Amazon CLI or Amazon SDK variants. Ensure that the change you made had the intended impact on the effective policy.

Start simply and make small changes

To simplify debugging, start with simple policies and make changes one item at a time. Validate the behavior and impact of each change before making the next change. This approach reduces the number of variables you have to account for when an error or unexpected result does happen.

Store copies of your backups in other Amazon Web Services Regions and accounts in your organization

To improve your disaster recovery position, you can store copies of your backups.

  • A different region – If you store copies of the backup in additional Amazon Web Services Regions, you help protect the backup against accidental corruption or deletion in the original Region. Use the copy_actions section of the policy to specify a vault in one or more Regions of the same account in which the backup plan runs. To do this, identify the account by using the $account variable when you specify the ARN of the backup vault in which to store the copy of the backup. The $account variable is automatically replaced at run time with the account ID in which the backup policy is running.

  • A different account – If you store copies of the backup in additional Amazon Web Services accounts, you add a security barrier that helps protect against a malicious actor who compromises one of your accounts. Use the copy_actions section of the policy to specify a vault in one or more accounts in your organization, separate from the account in which the backup plan runs . To do this, identify the account by using its actual account ID number when you specify the ARN of the backup vault in which to store the copy of the backup.

Limit the number of plans per policy

Policies that contain multiple plans are more complicated to troubleshoot because of the larger number of outputs that must all be validated. Instead, have each policy contain one and only one backup plan to simplify debugging and troubleshooting. You can then add additional policies with other plans to meet other requirements. This approach helps keep any issues with a plan isolated to one policy, and it prevents those issues from complicating the troubleshooting of issues with other policies and their plans.

Use stack sets to create the required backup vaults and IAM roles

Use Amazon CloudFormation stack sets integration with Organizations to automatically create the required backup vaults and Amazon Identity and Access Management (IAM) roles in each of the member accounts in your organization. You can create a stack set that includes the resources you want automatically available in every Amazon Web Services account in your organization. This approach enables you to run your backup plans with assurance that the dependencies are already met. For more information, see Create a Stack Set with Self-Managed Permissions in the Amazon CloudFormation User Guide.

Check your results by reviewing the first backup created in each account

When you make a change to a policy, check the next backup created after that change to ensure the change had the desired impact. This step goes beyond looking at the effective policy and ensures that Amazon Backup interprets your policies and implements the backup plans the way you intended.