How is administrative access to the infrastructure protected?
Access to the production infrastructure is strictly controlled:
Bastion host: Each environment has its own bastion host in a private subnet. Access is exclusively via AWS Systems Manager (SSM) — no SSH keys, no public IP address.
Role-based profiles: Read-only profiles for planning operations, administrator profiles for changes. Each profile is tied to a specific AWS account.
Database access: Requires an administrator profile → SSM session to the bastion host → IAM-authenticated database token (valid for 15 minutes). Manual production changes require approval from technical management following a four-eyes principle.
IMDSv2: Enforced on all instances — prevents SSRF-based credential theft attacks via instance metadata.
MFA: Required on all AWS accounts, verified during quarterly access reviews.
Logging: All access is logged via CloudTrail. Alerts are triggered on root account access and security group changes.
Location of employees: All amaise employees with access to production environments are based in Switzerland. Access to the CH environment is exclusively from Switzerland. The same strict access controls apply to the EU and US environments — access is limited to authorized personnel and fully logged.