Wählen Sie Ihre Cookie-Einstellungen aus

Wir verwenden essentielle Cookies und ähnliche Tools, die für die Bereitstellung unserer Website und Services erforderlich sind. Wir verwenden Performance-Cookies, um anonyme Statistiken zu sammeln, damit wir verstehen können, wie Kunden unsere Website nutzen, und Verbesserungen vornehmen können. Essentielle Cookies können nicht deaktiviert werden, aber Sie können auf „Anpassen“ oder „Ablehnen“ klicken, um Performance-Cookies abzulehnen.

Wenn Sie damit einverstanden sind, verwenden AWS und zugelassene Drittanbieter auch Cookies, um nützliche Features der Website bereitzustellen, Ihre Präferenzen zu speichern und relevante Inhalte, einschließlich relevanter Werbung, anzuzeigen. Um alle nicht notwendigen Cookies zu akzeptieren oder abzulehnen, klicken Sie auf „Akzeptieren“ oder „Ablehnen“. Um detailliertere Entscheidungen zu treffen, klicken Sie auf „Anpassen“.

AMS modes and applications or workloads

Fokusmodus
AMS modes and applications or workloads - AMS Advanced User Guide
Diese Seite wurde nicht in Ihre Sprache übersetzt. Übersetzung anfragen

Consider operational and governance requirements for your applications when selecting the right mode, either by requesting a new application account or hosting the application in an existing application account. The selection of the appropriate AMS mode for each application or workload depends on the following factors:

  • The type of SDLC lifecycle function that the environment will provide (e.g., sandbox with unmoderated changes, UAT with some frequent changes, production with minimal changes and highly regulated)

  • The governance policies needed (enforced through SCPs at the OU level)

  • Operational Model (if you want to own the operational responsibility or want to outsource that to AMS)

  • The desired business outcomes, like time to operate in the cloud, and cost of operations.

Note

For a descriptions of the mode types per AMS service, see Types of modes and accounts in AMS.

For real-world use cases of the different modes, see Real world use cases for AMS modes

The following table outlines key considerations for application owners to help decide on the most suitable AMS mode. Application owners should include an assessment phase ahead of application migration to fully understand which mode applies to their specific application. Example: For applications based on cloud-native services or serverless architecture, the best option could be to start building and iterating in Developer mode and deploy the final Infrastructure as Code using AMS Managed – SSP mode. In this case light re-factoring may be required to ensure that any CloudFormation templates created for automated deployment meet the ingest guidelines laid out by AMS. Additionally, any IAM permissions need to be approved by AMS Security to ensure they follow the least privilege model.

The AMS mode selected to host the application, can help enable you to build towards you desired cloud operating model.

Note

More than one cloud operating model can existing in a single AMS Managed Landing Zone based on the different AMS modes selected to host the applications.

Decision issues Standard CM mode / OOD* AWS Service Catalog Direct Change mode Self-service provisioning Developer mode Customer Managed
Operational readiness
Logging, Monitoring and Event Management AMS responsible for all managed infrastructure Customer responsible for Self-Service Provisioned Services (SSP) Customer responsible for resources provisioned using developer IAM role outside AMS CM system Customer responsible
Continuity Management AMS responsibility to execute backup plan selected by customer Customer responsible for Self-Service Provisioned Services (SSP) Customer responsible for resources provisioned using developer IAM role outside AMS CM system
Instance Level Access Management AMS-managed through one-way AD trust with on-prem domain. Requires managed infrastructure to join AMS domain Not applicable Customer responsible for resources provisioned using developer IAM role outside AMS CM system
Security Management and Account Level Access Management AMS responsibility for all managed accounts AMS responsible for all managed accounts Customer responsible for resources provisioned using developer IAM role outside AMS CM system
Patch Management AMS responsibility for all managed accounts Customer responsible for Self-Service Provisioned Services (SSP) Customer responsible for resources provisioned using developer IAM role outside AMS CM system
Change Management AMS responsibility for all managed accounts Customer responsible for Self-Service Provisioned Services (SSP) Customer responsible for resources provisioned using developer IAM role outside AMS CM system
Provisioning Management Prescriptive and standardized for the provisioning options offered in AMS Flexibility to directly use AWS service API for AWS Service Catalog following AMS prescriptive standards Flexibility to directly use AWS service API following AMS prescriptive standards Flexibility to directly use AWS service APIs for SSP services Flexibility to directly use AWS service API for provisioning
Incident Management and Audit AMS responsibile for all managed accounts Customer responsible for resources provisioned using developer IAM role outside AMS Change Management System
GuardRails and Shared infrastructure (Network) and Security Framework Prescriptive and standardized leveraging AMS Core Accounts Flexible and bespoke leveraging AMS Core Accounts
Application readiness
Application refactoring Light refactoring is needed Light refactoring is needed (if provisioned using AMS Standard CM) No need for refactoring
Support for AWS services Limited to what is supported by AMS Not limited
Business considerations
Time to operational readiness Three to six months 6 months + dependent on customer application operations competencies 6-18 months dependent on customer infrastructure and application operations competencies
Costs $$$$ $$$ $$ $
Application examples Webserver with 3 tier stack, apps with compliance and regulatory requirements Webserver using API Gateway, containerized application leveraging ECS/EKS Iterating/optimizing on Data Lake application that uses Lambda, Glue, Athena, etc De-centralized accounts/applications like sandbox, third party managed applications

*Operations On Demand (OOD) has an offering for customers using the Standard CM mode to manage their changes through dedicated resourcing. For more details, see the Operations on Demand catalog of offerings and talk to your cloud service delivery manager (CSDM).

Note

The price comparison between SSP mode and Developer mode assumes that the same AWS services are provisioned.

Comparing AMS Modes against business and IT objectives

Comparison of AMS modes showing governance and flexibility against time to operationalize.

As shown, if you are looking for a highly controlled and standardized governance model for you applications, then AMS-managed Standard Change, AWS Service Catalog, or Direct Change modes are the best fit. If you require a bespoke governance model with a focus on application innovation without the need for operational readiness, select Customer Managed mode. With Customer Managed mode, it could take you a longer time to operationalize you applications as you bear the responsibility to establish people, processes, and tools to support operational capabilities such as Incident Management, Configuration Management, Provisioning Management, Security Management, Patch Management, etc.

DatenschutzNutzungsbedingungen für die WebsiteCookie-Einstellungen
© 2025, Amazon Web Services, Inc. oder Tochtergesellschaften. Alle Rechte vorbehalten.