Wählen Sie Ihre Cookie-Einstellungen aus

Wir verwenden essentielle Cookies und ähnliche Tools, die für die Bereitstellung unserer Website und Services erforderlich sind. Wir verwenden Performance-Cookies, um anonyme Statistiken zu sammeln, damit wir verstehen können, wie Kunden unsere Website nutzen, und Verbesserungen vornehmen können. Essentielle Cookies können nicht deaktiviert werden, aber Sie können auf „Anpassen“ oder „Ablehnen“ klicken, um Performance-Cookies abzulehnen.

Wenn Sie damit einverstanden sind, verwenden AWS und zugelassene Drittanbieter auch Cookies, um nützliche Features der Website bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte, einschließlich relevanter Werbung, anzuzeigen. Um alle nicht notwendigen Cookies zu akzeptieren oder abzulehnen, klicken Sie auf „Akzeptieren“ oder „Ablehnen“. Um detailliertere Entscheidungen zu treffen, klicken Sie auf „Anpassen“.

Setting up cross account backups (intra-Region)

Fokusmodus
Setting up cross account backups (intra-Region) - AMS Advanced Application Developer's Guide
Diese Seite wurde nicht in Ihre Sprache übersetzt. Übersetzung anfragen

AWS Backup supports the ability to copy snapshots from one account to another within the same AWS Region as long as the two accounts are within the same AWS Organization. As an example, in AMS Advanced multi-account landing zone (MALZ), you can set up cross account snapshot copy within the same AWS Region using this quick-start.

For more information, see AWS Backup and AWS Organizations bring cross-account backup feature

You copy snapshots cross account for disaster recovery (DR). You might have requirements to keep snapshots within the same AWS Region, but across from the account boundaries, for data protection.

AWS Backup Cross Account Snapshot Copy Process

Overview:

At a high level, these are the steps for cross-account backups within AMS:

  • Create destination account to host backups in the AWS Region where your AMS landing zone is hosted (step 1)

  • Create a KMS key for encrypting backups in the destination account (step 3)

  • Create a backup vault in the destination account of the same region as your AMS Advanced landing zone (step 4)

  • Enable the cross account setting in your Management account (step 5)

  • Create or modify the source account backup plan and rule(s) (step 6)

Note

Ensure that both the source and destination accounts are in the same Region. If you want to copy your backups cross region, contact your CA or CSDM.

To enable and set up cross-account backups:

  1. Create a destination account to host backups; if you already have such an account, you can skip this step. To create the account, submit an RFC from your Management Payer account using the Deployment | Managed landing zone | Management account | Create application account (with VPC) change type (ct-1zdasmc2ewzrs).

  2. [Optional] If resources or snapshots are encrypted in the source account (for example, Prod), share the KMS key used for encryption with the destination account. To do this, submit an RFC using the Management | Advanced stack components | KMS key | Update change type (ct-3ovo7px2vsa6n).

  3. In the destination account, create a KMS Key to be used for Backup Vault encryption. To do this, submit an RFC using the Deployment | Advanced stack components | KMS key | Create (auto) change type (ct-1d84keiri1jhg).

  4. In the destination account, create a Backup Vault using the key created earlier. AWS Backup Vaults can be created by using the CFN ingest automated change type, Deployment | Ingestion | Stack from CloudFormation Template | Create (ct-36cn2avfrrj9v). In the same request, the vault access policy needs to be modified to allow the source account(s) access to the vault. Here is an example policy:

    { "Version": "2012-10-17", "Statement": [ { "Sid": "AllowSrcAccountPermissionsToCopy", "Effect": "Allow", "Action": "backup:CopyIntoBackupVault", "Resource": "*", "Principal": { "AWS": "arn:aws:iam::<source/prodAccount>:root" } } ] }

    Example CloudFormation template for a Backup Vault:

    { "Description": "Test infrastructure", "Resources": { "BackupVaultForTesting": { "Type": "AWS::Backup::BackupVault", "Properties": { "BackupVaultName": "backup-vault-for-test", "EncryptionKeyArn" : "arn:aws:kms:us-east-2:123456789012:key/227d8xxx-aefx-44ex-a09x-b90c487b4xxx", "AccessPolicy" : { "Version": "2012-10-17", "Statement": [ { "Sid": "AllowSrcAccountPermissionsToCopy", "Effect": "Allow", "Action": "backup:CopyIntoBackupVault", "Resource": "*", "Principal": { "AWS": ["arn:aws:iam::987654321098:root"] } } ] } } } } }
  5. From your Management Payer account, enable Cross-Account backup. To do this, submit an RFC using the Management | AWS Backup | Backup plan | Enable cross account copy (Management account) change type (ct-2yja7ihh30ply).

  6. Lastly, from the source account where backups are sourced, create the rule or rules of the backup plan that govern the backups to copy snapshots cross account. To do this, submit an RFC using the Deployment | AWS Backup | Backup plan | Create change type(ct-2hyozbpa0sx0m). If you need to update an existing backup plan, submit an RFC using the Management | Other | Other | Update change type (ct-0xdawir96cy7k) with this information:

    1. The backup plan name as well as the rule name to be updated.

    2. The destination/ICE account backup vault ARN.

    3. The retention days/months you would like to keep the snapshots in the target ICE vault for.

DatenschutzNutzungsbedingungen für die WebsiteCookie-Einstellungen
© 2025, Amazon Web Services, Inc. oder Tochtergesellschaften. Alle Rechte vorbehalten.