Managing Route53 at scale

0

We have about 30 AWS accounts at this point (application, development, devops, shared services, sandboxes) and we are using AWS Control Towers tied into AWS SSO. We have recently created a designated networking account where we host the STNO solution and have decided this will be our centralized network traffic solution for all of our business needs.

We are trying to figure out what the best practices are for managing DNS, private DNS zones in particular at scale. With using a central networking account, we can see the appeal of having all private zones in a single account so that we can get a complete picture of and monitor/manage the entire organization, but is this the current best practice?

Will centralizing our private zones create problems for individual teams? For example, we want to give our Devs the ability to manage their private zone (dev.company.com) without allowing them to edit other zones. Is this possible with cross-account, centralized, private zones?

Should we even allow our dev teams to manage their own private zone? If not, what is the current best practice for managing private zones within an org?

Just hoping to get an idea of how other companies are managing this, what worked for previous clients, what didn't.

1개 답변
0

Hello,

Refer the below two blogs for best practices of AWS SSO & Control tower along with Route 53 and you can use the specific section from which you would want the particular setups. AWS Organizations is also something that you would want to look into.

Link- https://aws.amazon.com/blogs/mt/managing-the-multi-account-environment-using-aws-organizations-and-aws-control-tower/. -- [1]

Link- https://aws.amazon.com/blogs/security/how-to-centralize-dns-management-in-a-multi-account-environment/ -- [2]

profile pictureAWS
지원 엔지니어
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인