Advisory for Customers Deploying eMAM System on AWS

Advisory for Customers Deploying eMAM System on AWS

To ensure the smooth functioning of the eMAM system, please refrain from making any changes to your AWS infrastructure.

Advisory:
  1. Maintain Proper Security Protocols:
    • Ensure that IAM roles and policies are correctly configured to grant necessary access without over-permission.
    • Avoid making changes to IAM roles or policies that could revoke required permissions for the MAM system.
  2. Monitor Network Configurations:
    • Ensure VPC and security groups are configured to allow the required ports and protocols for communication between MAM components.
    • Avoid modifications to firewall rules or network access that could block essential data flow.
  3. Stable IP Address Allocation:
    • Assign static IP addresses to critical services and servers running MAM components to prevent IP changes that may disrupt connections.
  4. Avoid Unplanned Instance Modifications:
    • Do not alter instance types or configurations without prior consultation, as changes to CPU, RAM, or storage may impact system performance.
  5. Data Backup and Recovery:
    • Regularly back up data and system configurations using AWS backup services.
    • Ensure that any changes made to backup schedules or recovery strategies align with best practices for the MAM system.
  6. Storage Configurations:
    • Do not alter the storage type or access permissions of the designated storage (e.g., S3 buckets, EBS volumes) without confirming the impact on MAM operations.
    • Maintain consistent storage paths and ensure bucket policies allow necessary read/write access.
  7. OS and Software Updates:
    • Consult the EMAM team before updating the operating system or core libraries on instances hosting the eMAM system to avoid compatibility issues.
  8. Resource Scaling:
    • Ensure scaling activities, such as increasing or decreasing instance counts or sizes, do not interrupt active eMAM processes.
    • Coordinate planned scaling with the eMAM support team if auto-scaling is enabled.
  9. Avoid Unauthorized Access:
    • Restrict access to eMAM-related instances and data to authorized users only.
    • Monitor for suspicious activities or changes in access logs that may indicate security threats.
  10. Maintain Configurations:
    • Avoid manual changes to config files related to the eMAM system unless advised by the support team.
    • Use version control for configuration changes and keep a rollback plan for unexpected results.
  11. Regular Monitoring:
    • Utilize AWS CloudWatch or other monitoring tools to track the performance and health of eMAM components.
    • Report any anomalies or performance issues to the EMAM support team promptly.
  12. Integration Restrictions:
    • Avoid integrating third-party services or applications with the eMAM system without prior approval to prevent potential conflicts.
 If you need to modify any AWS configurations, kindly notify the EMAM Support team in advance at support@emamsolutions.com.