AWS SaaS Competency
Service Offering Validation Checklist
Validity Period: February 2025-August 2025
This version of the checklist was released on February 14th, 2025. The next version of this checklist is expected to be released in August 2025. AWS Partners may continue to use this version of the checklist until November 2025. Please review the change log for a list of changes (if any) since the previous version.
Introduction
The goal of the AWS Specialization Programs is to recognize AWS Partner Network Partners (“AWS Partners”) who demonstrate and maintain technical proficiency and proven customer success in specialized AWS Partner solution areas. The AWS Competency Partner Validation Checklist (“Checklist”) is intended for AWS Partners who are interested in applying for an AWS Specialization. This Checklist provides the criteria necessary to achieve the specialization as a consulting partner. AWS Partners undergo a technical validation of their capabilities upon applying for a specific specialization. AWS leverages in-house expertise and a third-party firm to facilitate the technical validation. AWS reserves the right to make changes to this document at any time and without notice.
Expectation of Parties
It is expected that AWS Partners will review this document in detail before applying for the AWS Competency Program, even if all of the prerequisites are met. If items in this document are unclear and require further explanation, please contact your AWS Partner Development Representative (“PDR”) or AWS Partner Development Manager “(PDM”) as the first step. Your PDR/PDM will contact the program office if further assistance is required.
AWS Partners should complete the Self-Assessment Spreadsheet linked at the top of this page, prior to submitting a program application. Once completed, AWS Partners must submit an application in APN Partner Central. Visit the AWS Competency Program guide for step-by-step instructions on how to submit an application.
AWS will review and aim to respond back with any questions within five business days to initiate scheduling of your technical validation or to request additional information.
AWS Partners should prepare for the technical validation by reading the Checklist, completing a self-assessment using the Checklist, and gathering and organizing objective evidence to share with the reviewer on the day of the technical validation.
AWS recommends that AWS Partners have individuals who are able to speak in-depth to the requirements and the customer examples during the technical validation. The best practice is for the AWS Partner to make the following personnel available for the technical validation: one or more highly-technical AWS certified engineers/architects in the area of competency specialty, an operations manager who is responsible for the operations and support elements, and a business development executive to conduct the overview presentation.
AWS may revoke an AWS Partner’s Competency designation if, at any time, AWS determines in its sole discretion that such AWS Partner does not meet its AWS Competency Program requirements. If an AWS Partner’s AWS Competency designation is revoked, such AWS Partner will (i) no longer receive benefits associated with its designation, (ii) immediately cease use of all materials provided to it in connection with the applicable AWS Competency designation and (ii) immediately cease to identify itself as a member of the AWS Competency.
AWS Partners should ensure that they have the necessary consents to share with the auditor (whether AWS or a third-party) all information contained within the objective evidence or any demonstrations prior to scheduling the audit.
AWS SaaS Competency Definition
AWS SaaS Context
Software as a Service (SaaS) is a licensing and delivery model whereby a multi-tenant software is centrally managed and hosted by a provider and available to customers on a subscription or pay-per-use basis.
SaaS as both a business and application delivery model continues to evolve and grow across a wide array of businesses and technology providers. From an Amazon Web Services (AWS) perspective SaaS provides a unique value proposition that is aligned with partners and their end customers while providing direct revenue and service adoption for AWS. The AWS Partner Network has had an effort around SaaS for many years helping selected partners build SaaS solutions through our Solutions Architecture teams and most recently AWS SaaS Factory.
The AWS SaaS Factory provides AWS Partner Network (APN) Partners with resources that help accelerate and guide their adoption of a SaaS delivery model. AWS SaaS Factory includes reference architectures for building SaaS solutions on AWS, Quick Starts that automate deployments for key workloads on AWS, and exclusive training opportunities for building a SaaS business on AWS. APN Consulting Partners who develop SaaS solutions are encouraged to take advantage of the program.
AWS SaaS Competency
The AWS SaaS competency partners provide consulting expertise and have deep experience helping businesses’ design, and build software products successfully on AWS, through specific phases of the product development lifecycle. They focus on developing their customer’s internal skills and helping to build the foundations required to build complex technology as a service (XaaS) products on AWS. They are experts in reducing friction when migrating legacy applications to cloud-native solutions.
Occasionally, there is confusion around the definition of SaaS, and the distinction among SaaS, managed services, application modernization, and cloud migration. For your reference, high-level definitions and examples are provided below.
-
SaaS is a licensing and delivery model whereby a multi-tenant software is centrally managed and hosted by a provider and available to customers on a subscription or pay-per-use basis.
-
Managed Services is the practice of outsourcing the management and maintenance of a company’s IT infrastructure and services to a third-party provider. While managed services may be delivered on-premises or remotely, SaaS is always delivered over the internet and customers do not have direct access to the underlying infrastructure.
-
Application modernization is the practice of refactoring a traditional software to cloud-native approaches, including code languages, frameworks, and infrastructure design. This practice is also sometimes called legacy modernization or legacy application modernization.
-
Cloud Migration is focused on migrating an existing application to the cloud. The effort could be combined with modernization, where the workload is optimized for the cloud as part of the migration. However, this is not the same as a SaaS transformation.
The customer examples submitted for the application should have a clear focus on SaaS. AWS Partners must also identify the Segment Category that their solution fits into:
Builders Consulting Partners that have experience building products for customers via contract software development. These are Consulting Partners that have experience building products for customers via contract software development. They have the ability to design and write clean, logical, high-quality custom production application code using object-oriented, software development life cycle (SDLC) agile methodologies, microservices oriented architecture, event-driven design, and test-driven development.
Design Services Consulting Partners that have experience designing and implementing SaaS Solutions for customers. These organizations have AWS Solutions Architecture style resources (such as Systems, Network, and Database Architects) that engage with customers in a consulting model. They have the ability to design, and implement end-to-end solutions architecture for cloud-native applications on AWS infrastructure.
It is suggested that before submitting the application, please consult the AWS SaaS Comptency Program team for additional guidance. You may reach the team via the following alias: saas-competency@amazon.com.
Requirements Overview
The subsequent sections of this document define the requirements for AWS Partners to achieve the AWS SaaS Competency designation. These requirements are broken down into the following categories:
AWS SaaS Competency Program Prerequisites - These requirements will be validated by the AWS Competency program team before scheduling a technical validation.
Common AWS Partner Practice Requirements - These requirements validate the mechanisms and organizational practices in place to ensure the AWS Partner is able to consistently deliver high quality customer outcomes for AWS projects.
SaaS Practice Requirements - These requirements validate the AWS Partner's overall capabilities related to delivering SaaS solutions for customers on AWS.
Common Customer Example Requirements - These requirements validate that the architectural designs and implementation details of each of the provided customer examples follow best practices defined in the AWS documentation and other resources such as the AWS Well-Architected Framework. Use technical calibration guide for control-by-control best practices and example responses.
SaaS Customer Example Requirements - These requirements validate whether the provided customer examples demonstrate SaaS-specific best practices and align with the target customer use cases for this AWS Competency.
AWS SaaS Competency Program Prerequisites
The following items will be validated by the AWS Competency Program Manager; missing or incomplete information must be addressed prior to scheduling of the technical validation.
-
1.0APN Program Membership
-
1.1Program Guidelines
The AWS Partner must read the Program Guidelines and Definitions before applying to the SaaS Competency Program. Click here for Program details.
-
1.2Services Path Membership
Partner must be at the Validated or Differentiated stage within the Services Path. Partners should talk to their PDR/PDM about how to join the Services Path.
-
1.3AWS Partner Tier
Partner must be an AWS Advanced or Premier Tier Partner.
-
-
2.0Example AWS Customer Deployments
-
2.1Production AWS Customer Case Studies
AWS Partner must privately share with AWS details about four (4) unique examples of SaaS projects executed for four (4) unique AWS customers. Each case study must demonstrate how the partner offering was used by a customer to solve a specific SaaS customer challenge using AWS.
In addition to the required case study details provided in AWS Partner Central, the partner must also provide architecture diagrams of the specific customer deployment and information listed in the technical requirements sections of this validation checklist.
The information provided for these case studies will be used by AWS for validation purposes only. AWS Partner is not required to publish these details publicly.
AWS Partner can reuse the same case study across different AWS Specialization designations as long as the case study and implementation scope are relevant to those designations. The partner should make sure the existing case study clearly explains the relevance to each designation they are applying for.
In cases where a case study is used across multiple AWS Partner Specialization applications, the partner must attach a completed self-assessment spreadsheet for each Specialization with all service-specific details provided.
AWS will accept one case study per customer. Each customer must be a separate legal entity to qualify. The partner may use an example for an internal or affiliate company of the partner if the offering is available to outside customers.
All case studies must describe deployments that have been performed within the past 18 months and must be for projects that are in production with customers, rather than in a ‘pilot’ or proof of concept stage.
All case studies provided will be examined in the Documentation Review of the Technical Validation. The partner offering will be removed from consideration if the partner cannot provide the documentation necessary to assess all case studies against each relevant validation checklist item, or if any of the validation checklist items are not met.
-
2.2Publicly Available Case Studies
At least two (2) of the provided case studies must be publicly available examples describing how the AWS Partner used AWS to help solve a specific customer challenge related to SaaS. These publicly available examples may be in the form of formal customer case studies, white papers, videos, or blog posts. The partner will provide the publicly available URL (published by the partner) in the AWS Partner Central "Case Study URL' field, which must include the following details:
- AWS Customer name
- AWS Partner name
- AWS Customer challenge that aligns with the scope of the competency and selected category
- Using both high-level and technical details, describe how AWS was leveraged as part of the AWS Partner solution
- Outcome(s) and/or quantitative results
Anonymized Public Case Studies
In cases where the partner cannot publicly name customers due to the sensitive nature of the customer engagements, the partner may choose to anonymize the public case study. Anonymized public case study details will be published by AWS, but the customer name will remain private. The partner must provide the AWS Customer name in the ‘Company name’ field of the AWS Partner Central case study for validation purposes, but it will not be published by AWS. The case study fields that will be published to Partner Solutions Finder (PSF) by AWS include the ‘Title’, ‘Case Study Description’, and ‘Case Study URL’. The partner will provide the publicly available URL (published by the partner) in the AWS Partner Central‘Case Study URL’ field, which must include the following details:
- AWS Customer description (e.g. a top 5 US retailer, a Fortune 500 financial institution, etc.)
- AWS Partner name
- AWS Customer challenge that aligns with the scope of the competency and selected category
- Using both high-level and technical details, describe how AWS was leveraged as part of the AWS Partner solution
- Outcome(s) and/or quantitative results
For best practice on how to write an accepted Public case study, see the Public Case Study Guide.
-
-
3.0AWS Partner Self-Assessment
-
3.1AWS Partner Self-Assessment
AWS Partner must conduct a self-assessment of their compliance to the requirements of the AWS SaaS Consulting Partner Validation Checklist. A version of this checklist is available in spreadsheet format. Links to the appropriate Self-Assessment Spreadsheet can be found at the top of this page.
- AWS Partner must complete all sections of the Self-Assessment Spreadsheet. For competency with multiple categories, AWS Partners will fill in details for the chosen application Category and mark other Categories as N/A.
- Completed Self-Assessment Spreadsheet must be uploaded at the time of submitting an application in APN Partner Central.
- It is recommended that AWS Partner have their AWS Partner Solution Architect, Partner Development Representative (PDR), or Partner Development Manager (PDM) review the completed Self-Assessment Spreadsheet before submitting to AWS. The purpose of this is to ensure the AWS Partner’s AWS team is engaged and working to provide recommendations prior to the validation and to help ensure a positive validation experience.
-
-
4.0SaaS Prerequisites
-
4.1AWS SaaS Consulting Partner Characteristics
SaaS competency partners within the builders and design services categories are expected to operate professionally, and responsibly, within their SaaS practices. Characteristics of these partners include :
- Ability to provide clear and transparent pricing to customers.
- Ability to secure customer data, and intellectual property.
- Ability to design architecture that align to the customers cost objectives.
- Ability to provide detailed analytics for customer insights.
- Ability to correlate resource consumption to a specific cost per tenant (customer).
- Ability to track and analyze the impact of updates to an application.
- Ability to introduce best practices to automate the onboarding of customers.
- Ability to adequately support the customer lifecycle.
-
4.2Additional Customer Examples
Partners who apply for both categories (Builders and Design Services), need to submit at least four (4) customer examples that showcase their ability to support customers in each category. Partners can submit the same customer example to meet the requirements for both categories. As an example, if four customer examples were submitted in total, each one of them should meet the requirements for both categories.
-
Common AWS Partner Practice Requirements
The following requirements validate the mechanisms and organizational practices in place to ensure the AWS Partner is able to consistently deliver high quality customer outcomes for AWS projects. This section of the requirements are WAIVED if the associated offering has an approved Service Offering Foundational Technical Review OR if the AWS Partner has achieved another AWS Services Competency within the last 12 months.
SaaS Practice Overview
-
POV-001 - Customer Presentation
AWS Partner has a company overview presentation that sets the stage for customer conversations about their AWS SaaS capabilities and showcases AWS Partner’s demonstration capabilities.
Presentation contains information about the AWS Partner’s AWS SaaS capabilities, including AWS specific differentiators, e.g., what is unique about the AWS Partner’s practice that can only be accomplished leveraging AWS.
Overview presentations contain:
- Company history
- Office locations
- Number of employees
- Customer profile, including number, size, and industries of customers
- Overview of SaaS practice
- Notable AWS projects
Please provide the following as evidence:
- Delivery of presentation by a business development executive at the beginning of the validation session. This should be limited to 15 minutes.
-
POV-002 - Maintaining AWS Expertise
AWS Partner has internal mechanisms for maintaining their consultants' expertise on SaaS-related AWS services and tools.
Please provide the following as evidence:
- List of internal and/or external AWS-focused education events lead by AWS Partner staff (e.g. formal training, lunch and learns, meetups, user groups, etc.) in last 12 months.
- Resources provided by AWS Partner to staff for ongoing AWS skills development
-
POV-003 - AWS Partner Solution Selling
AWS Partner must describe how SaaS opportunities are identified, how their sellers are trained to identify and sell those opportunities, and specific demand generation/lead generation efforts associated to their AWS SaaS practice.
Please provide the following as evidence:
- A description on how the AWS Partner engages with customers, their internal sellers, and AWS sellers if applicable.
-
POV-004 - AWS Sales Engagement
AWS Partner must describe how and when they engage with AWS sellers and AWS Solutions Architects.
Please provide the following as evidence:
- A verbal description for how and when they engage AWS sellers or AWS Solutions Architects on an opportunity or in the form of a demonstration of the AWS Opportunity Management tool in AWS Partner Central with sales qualified opportunities submitted (sales qualified = budget, authority, need, timeline, and competition fields completed).
-
POV-005 - Training for Internal Personnel
AWS Partner must have a process to ensure that there are sufficient SaaS trained personnel to effectively support customers.
Please provide the following as evidence:
- An established training plan including on-boarding processes that identify job roles (sellers, solutions architects, project managers) and required training paths
- A verbal description of methods used to allocate required resources to SaaS projects
AWS Partner Delivery Model
-
PRJ-001 - Expected Outcomes
AWS Partner has processes for working with customers to determine and define expected outcomes associated with the projects.
Please provide the following as evidence:
- Project deliverable templates or other resources used for project scoping and definition
-
PRJ-002 - Scope
AWS Partner has processes to determine scope of work with specific criteria defining customer project with expected deliverables.
Please provide the following as evidence:
- Project templates or other resources(e.g. RACI Matrix) used for project scoping and definition
-
PRJ-003 - Statement of Work
AWS Partner has standard Statement of Work (SOW) templates for SaaS projects that can be customized to customer needs.
Please provide the following as evidence:
- Default SOW template
-
PRJ-004 - Project Manager
AWS Partner assigns Project Manager to each project to ensure project remains on time and within budget.
Please provide the following as evidence:
- Documentation to show that Project Managers were assigned to each of the 4 customer example projects.
-
PRJ-005 - Change Management
AWS Partner has processes to document, manage, and respond to requests for changes to the project scope.
Please provide the following as evidence:
- Documentation of change management practices
Customer Satisfaction
-
CSN-001 - Customer Acceptance for Projects
AWS Partner has a customer acceptance process.
Please provide the following as evidence:
- Example customer training documents
- SOW language describing handoff responsibilities and acceptance criteria
-
CSN-002 - Customer Satisfaction Aligned to Project Milestones
AWS Partner implements customer satisfaction checkpoints as part of the project plan.
Please provide the following as evidence:
- Project plan and customer satisfaction results for milestone-defined checkpoints
SaaS Practice Requirements
The following requirements apply to AWS Partners' SaaS Practice.
SaaS Expertise
SaaS Expertise
-
SAASPR-001 - SaaS Business Practice Plan Spreadsheet
AWS Partners must complete the SaaS Business Practice Plan Spreadsheet.
AWS Partners must have a SaaS Business Practice Plan to showcase their business capabilities and plans, including sales motions, Go-to-Market, and marketing activities. The objective of this requirement is to ensure alignment on priorities, motions, and investments between the AWS Partners and AWS. The goals in the spreadsheet will be used to plan joint activities, once the Partner is approved for AWS SaaS Competency. The goals are owned by the AWS Partner and supported by the AWS team.
-
SAASPR-002 - SaaS Expertise
AWS customers seeking builder or design services view AWS SaaS competency partners as the go-to experts in the field. Potential customers often ask for examples of solutions built for other customers when choosing a Partner and want confidence that consultants are up to date on AWS services. The following are a list of requirements for each corresponding SaaS competency category.
Category 1 – Builders
Partners must share at least 3 technical artifacts per customer example with AWS for software development projects implemented on Public Cloud within the last 18 months. Examples Include:
- Project Requirements Document
- Project Roadmap
- Backlog creation
- Project Status Updates
- Testing Documentation
- Technical Solution Documentation (API documentation)
- Product Documentation
- Project Plans
- Design Documents
- Architecture Diagrams (UML, Infrastructure)
- Retrospective, and Subsequent Planning Updates
Category 2 – Design Services Partners must share at least 3 technical artifacts per customer example with AWS for software development projects implemented on Public Cloud within the last 18 months. Examples Include:
- Project Requirements Document
- Project Roadmap
- Backlog creation
- Project Status Updates
- Testing Documentation
- Technical Solution Documentation (API documentation)
- Product Documentation
- Project Plans
- Design Documents
- Architecture Diagrams (UML, Infrastructure)
- Infrastructure Templates (CloudFormation, Terraform, Puppet, Chef)
- Retrospective, and Subsequent Planning Updates
Common Customer Example Requirements
If you have completed an AWS Well-Architected Framework Review (WAFR) for the customer example which shows zero outstanding high-risk issues (HRIs) in the Security, Operational Excellence, and Reliability pillars, you are not required to provide evidence for the following requirements. Please upload an exported WAFR report for each of the customer example instead.
All of the following requirements must be met by at least one of the four submitted customer examples. See specific evidence for each control. Refer to calibration guide for example responses.
Documentation
Requirements in this category relate to the documentation provided for each customer example.
-
DOC-001 - Provide Architecture diagram designed with scalability and high availability
AWS Partner must submit architecture diagrams depicting the overall design and deployment of its AWS Partner solution on AWS as well as any other relevant details of the solution for the specific customer in question.
The submitted diagrams are intended to provide context to the AWS Solutions Architect conducting the Technical Validation. It is critical to provide clear diagrams with an appropriate level of detail that enable the AWS Solutions Architect to validate the other requirements listed below.
Each architecture diagram must show:
- All of the AWS services used
- How the AWS services are deployed, including virtual private clouds (VPCs), availability zones, subnets, and connections to systems outside of AWS.
- Elements deployed outside of AWS, e.g. on-premises components, or hardware devices.
- how design scales automatically - Solution adapts to changes in demand. The architecture uses services that automatically scale such as Amazon S3, Amazon CloudFront, AWS Auto Scaling, and AWS Lambda.
- how design has high availability with multi-AZ or multi-region deployment. When intentional tradeoffs have been made (e.g. to optimize cost in favor of high availability), please explain the customer's requirements.
Please provide the following as evidence (required for all provided customer examples):
- An architecture diagram depicting the overall design and deployment of your solution on AWS.
- Explanation of how the major solutions elements will keep running in case of failure.
- Description of how the major solutions elements scale up automatically.
Secure Customer AWS Account Governance and Access
Any AWS accounts created by the AWS Partner on behalf of the customer or AWS accounts that the AWS Partner administers as part of the engagement must meet the following requirements.
-
ACCT-001 - Define Secure AWS Account Governance Best Practice
AWS expects all Services Partners to be prepared to create AWS accounts and implement basic security best practices. Even if most of your customer engagements do not require this, you should be prepared in the event you work with a customer who needs you to create new accounts for them.
Establish internal processes regarding how to create AWS accounts on behalf of customers when needed, including:
- When to use root account for workload activities
- Enable MFA on root
- Set the contact information to corporate email address or phone number
- Enable CloudTrail logs in all region and protect CloudTrail logs from accidental deletion with a dedicated S3 bucket
Please provide the following as evidence:
- Documents describing Security engagement SOPs which met all the 4 criteria defined above. Acceptable evidence types are security training documents, internal wikis, or standard operating procedures documents.
- Description of how Secure AWS Account Governance is implemented in one (1) of the submitted customer examples.
-
ACCT-002 - Define identity security best practice on how to access customer environment by leveraging IAM
Define standard approach to access customer-owned AWS accounts, including:
- Both AWS Management Console access and programmatic access using the AWS Command Line Interface or other custom tools.
- When and how to use temporary credentials such as IAM roles
- Leverage customer's existing enterprise user identities and their credentials to access AWS services through Identity Federation or migrating to AWS Managed Active Directory
Establish best practices around AWS Identity and Access Management (IAM) and other identity and access management systems, including:
- IAM principals are only granted the minimum privileges necessary. Wildcards in Action and Resource elements should be avoided as much as possible.
- Every AWS Partner individual who accesses an AWS account must do so using dedicated credentials
Please provide the following as evidence:
- Security engagement Standard Operation Procedure (SOP) which met all the 2 criteria defined above. Acceptable evidence types are: security training documents, internal wikis, standard operating procedures documents. Written descriptions in the self-assessment excel is not acceptable.
- Description of how IAM best practices are implemented in one (1) of the submitted customer examples.
Operational Excellence
Requirements in this category relate to the ability of the AWS Partner and the customer to run and monitor systems to deliver business value and to continually improve supporting processes and procedures.
-
OPE-001 - Define, monitor and analyze customer workload health KPIs
AWS Partner has defined metrics for determining the health of each component of the workload and provided the customer with guidance on how to detect operational events based on these metrics.
Establish the capability to run, monitor and improve operational procedure by:
- Defining, collecting and analyzing workload health metrics w/AWS services or 3rd Party tool
- Exporting standard application logs that capture errors and aid in troubleshooting and response to operational events.
- Defining threshold of operational metrics to generate alert for any issues
Please provide the following as evidence:
- Standardized documents or guidance on how to develop customer workload health KPIs with the three components above
- Description of how workload health KPIs are implemented in (1) of the submitted customer examples.
-
OPE-002 - Define a customer runbook/playbook to guide operational tasks
Create a runbook to document routine activities and guide issue resolution process with a list of operational tasks and troubleshooting scenarios covered that specifically addresses the KPI metrics defined in OPE-001.
Please provide the following as evidence:
- Standardized documents or runbook met the criteria defined above.
-
OPE-003 - Use consistent processes (e.g. checklist) to assess deployment readiness
Deployments are tested or otherwise validated before being applied to the production environment. For example, DevOps pipelines used for the project for provisioning resources or releasing software and applications.
Use a consistent approach to deploy to customers including:
- A well-defined testing process before launching in production environment
- Automated testing components
Please provide the following as evidence:
- A deployment checklist example or written descriptions met all the criteria defined above.
Security - Networking
Requirements in this category focus on security best practices for Virtual Private Cloud (Amazon VPC) and other network security considerations.
-
NETSEC-001 - Define security best practices for Virtual Private Cloud (Amazon VPC) and other network security considerations.
Establish internal processes regarding how to secure traffic within VPC, including:
- Security Groups to restrict traffic between Internet and Amazon VPC
- Security Groups to restrict traffic within the Amazon VPC
- Network ACL to restrict inbound and outbound traffic
- Other AWS security services to protect network security
Please provide the following as evidence:
- Written descriptions/documents on network security best practices met the criteria defined above.
- Description of how network security is implementation in one (1) of the submitted customer examples.
-
NETSEC-002 - Define data encryption policy for data at rest and in transit
Establish internal processes regarding a data encryption policy used across all customer projects
- Summary of any endpoints exposed to the Internet and how traffic is encrypted
- Summary of processes that make requests to external endpoints over the Internet and how traffic is encrypted
- Enforcing encryption at rest. By default you should enable the native encryption features in an AWS service that stores data unless there is a reason not to.
All cryptographic keys are stored and managed using a dedicated key management solution
Please provide the following as evidence:
- Data encryption and key management policy met the criteria defined above.
- Description of how data encryption is implementation in one (1) of the submitted customer examples.
Reliability
Requirements in this section focus on the ability of the AWS Partner solution to prevent, and quickly recover from failures to meet business and customer demand.
-
REL-001 - Automate Deployment and leverage infrastructure-as-code tools.
Changes to infrastructure are automated for customer implementation
- Tools like AWS CloudFormation, the AWS CLI, or other scripting tools were used for automation.
- Changes to the production environment were not done using the AWS Management Console.
Please provide the following as evidence:
- Written description of deployment automation and an example template (e.g., CloudFormation templates, architecture diagram for CI/CD pipeline) met the criteria defined above.
-
REL-002 - Plan for disaster recovery and recommend Recoverty Time Objective (RTO) and Recoverty Point Objective (RPO).
Incorporate resilience discussion and advise a RTO&PRO target when engaging with customer. Customer acceptance and adoption on RTO/RPO is not required.
- Establish a process to establish workload resilience including:
- RTO & RPO target
- Explanation of the recovery process for the core components of the architecture
- Customer awareness and communication on this topic
Please provide the following as evidence:
- Descriptions or documents on workload resilience guidance met the three criteria defined above
- Description of how resilience is implementation in one (1) of the submitted customer examples including reasons for exception when RTO&RPO is not defined
Cost Optimization
Requirements in this category relate to the AWS Partner's ability to help customers run systems that deliver business value at the lowest price point.
-
COST-001 - Develop total cost of ownership analysis or cost modelling
Determine solution costs using right sizing and right pricing for both technical and business justification.
Conducted TCO analysis or other form of cost modelling to provide the customer with an understanding of the ongoing costs including all the following 3 areas:
- Description of the inputs used to estimate the cost of the solution
- Summary of the estimates or cost model provided to the customer before implementation
- Business value analysis or value stream mapping of AWS solution
Please provide the following as evidence:
- Description of how to develop cost analysis or modeling with the critical components defined above
- Cost analysis example in one (1) of the submitted customer examples. Acceptable evidence types are: price calculator link, reports or presentations on business values analysis
SaaS Customer Example Requirements
The following requirements apply to each provided customer example.
Consistent Methodology and Process
Customer examples must demonstrate a consistent methodology and process applied through multiple software development phases as exemplified below. Though specific details may vary from project to project, a solid agile development framework with major phases and work areas must be clearly identified and exercised consistently across all the projects.
-
SAASCSM-001 - Technical Practice Assessment
In order to demonstrate SaaS Competency partner proficiency within the corresponding category, Consulting Partners are required to provide the following technical artifacts.
All Categories
- Partners must share ≥ 2 materials on approach to practice management (such as proof of training, certification, institution accreditation, training materials, business process management documentation) related to the corresponding SaaS competency category to be shared under NDA with the AWS SaaS Competency review team.
Note: It is recommended that partners provide evidence of AWS Well Architected Reviews, conducted with their customers, for each of the submitted case studies. Once partner is approved for SaaS Competency, it is recommended that partner will complete (or facilitate) a Well Architected Review along with SaaS Lens for the AWS Well-Architected Framework for all customers engaged through the AWS SaaS competency to verify that AWS best practices have been sufficiently followed, or outlined for improvement.
-
SAASCSM-002 - Project Types
Customer example provided must include the required context for which type of project (build or design) was delivered. customer example materials must indicate the type of work completed to allow an appropriate classification and competency evaluation for one of the corresponding categories.
Customer Example Evidence
SaaS competency partners must provide the below details in the Self-assessment spreadsheet along with the supportive documentation (listed in validation Case Study Requirements below) to assess the partners eligibility within the corresponding SaaS competency category.
-
SAASCSR-001 - Use Case
Provide the project type and the use case each project addressed. Providing these project types will also allow the AWS field organization to sufficiently evangelize a SaaS partner's expertise specifically.
Project types and use cases:
Build
- Re-factor - Improve the readability, reusability, functionality, integration, or structure of an existing solution by consulting, re-writing, or modifying the application code.
- Integrate - Introduce a new critical application framework, dependency, or AWS Service within an existing solution by consulting, (re-)writing, and integrating the new solution within the application code.
- Re-design - A significant change to the majority of the components or services within an architecture which fundamentally changes the way the solution code is developed and deployed on AWS.
- Greenfield - The development of a net new cloud-native solution on AWS that will be sold as a product to customers.
Design
- Optimize - Improve the efficiency, performance, or cost of an existing solution by consulting, re-writing, or modifying the solutions architecture.
- Enhance - Enhance an existing architecture by integrating one or more major Infrastructure components within the production solution-design.
- Re-platform - A significant change to an existing solution by (consulting to a customer on) migrating and integrating two or more AWS services within the architecture or application code.
- Migrate - A migration of an existing product to a SaaS delivery model, or a migration of an existing SaaS solution to AWS.
-
SAASCSR-002 - Project Resource Supporting Documents
Category 1 - Builders
- Partners must provide a detailed description indicating a minimum of 3 technical resources supporting each customer example.
Category 2 - Design Services
- Partners must provide a detailed description indicating a minimum of 3 technical resources supporting each customer example.
-
SAASCSR-003 - Technical Approach Supporting Documents
SaaS competency partners within the builders and design services categories are seen as the go-to experts within the field to design and build technology as a service (XaaS) solutions for customers. SaaS competency partners have a wealth of expertise in enabling vendors by assisting them to develop the appropriate technology as a service (XaaS) option within the customers vertical or horizontal segment.
All Categories
- SaaS competency partners for both categories must submit the self-service supportive documentation indicating the SaaS Technical Architecture patterns leveraged for the corresponding customer example provided.
Note: Supportive documentation is in the form of 1 or more sentence response to each question listed within the customer example SaaS Technical Approach found in section below.
Technical Approach
For all customer example requirements starting, all requirements must be met a minimum of 1 time across all customer examples. In addition, at least 7 of these items must be supported per customer example. Evidence can be provided in the form of a verbal or written description, supporting the requirement. These descriptions should be in-line with industry, AWS, and SaaS best practices described in (https://partnercentral.awspartner.com/ContentFolderPartner?id=a1o0h00000EyZGzAAN).
For design services category, provide evidence that partner provided architectural and design guidance to meet the requirement. If any requirement was met by application code which you didn’t have any influence on, then mark the requirement as “Not Met” inside Self-Assessment Spreadsheet.
Note: For any customer example requirements listed below, which are not applicable, please respond with N/A, and provide a minimum 1 sentence description of why that requirement is not applicable.
-
SAASTA-001 - Security at Every Layer of the Stack
The solution has security at every layer of the architecture to ensure an adequate tenant isolation boundary.
Security should be considered at all levels of an application's architecture. Understanding how each layer of the XaaS offering is secured will help to ensure that tenant isolation policies are followed as intended.
-
SAASTA-002 - Access Management to Product Features and Functionality
The solution offers the capability to scope access to features or product functionality.
SaaS Leveraging role-based access control (RBAC) enables XaaS developers to manage and limit access to various products, features, andfunctions within and across applications. Support for this model is often achieved via a centralized mechanism that manages and enforces these access policies. More advanced and more flexible offerings will support a richer set of options associating one or more roles with a user. Third-party solutions are also commonly used to simply and depth to a XaaS solutions RBAC capabilities.
-
SAASTA-003 - Cross-Tenant Prevention
The solution has measures in place to prevent cross-tenant access to system resources (infrastructure, data, etc.).
SaaS solutions can implement tenant isolation models in various ways. A silo model can be implemented by separating tenant resources inside their own AWS accounts or VPCs. A pooled model can be implemented by having multiple tenants share resources. Different models have various places where tenant data is processed, persisted, and transmitted (Compute, Storage, Database, Streams/Queues, Gateways/Proxies, Networks) within a XaaS application. The confidentiality, integrity, and availability (CIA) of a customer's data is of paramount importance.
AWS SaaS Competency requires that both pooled and silo-based tenant isolation models are represented as part of the four case studies. Each case study should identify the isolation models and clearly demonstrate the solution to enforce isolation.
-
SAASTA-004 - Cross-Tenant Event Tracking
The solution has measures in place to track, audit, and alert on cross-tenant events.
In order for XaaS solutions to meet the regulatory and compliance of the trusted authorities (such as SOC2), an organization must have the ability to log, audit, monitor, and alert on potential cross-tenant events that take place to indicate compliance with the regulatory standards.
-
SAASTA-005 - API Protection
The solution APIs have adequate security (authentication, authorization), and mitigation strategies for distributed denial of service (DDoS) attacks. XaaS applications typically provide Public and Private APIs for customers to perform operations for specific use cases. Understanding how a XaaS provider is exposing, and protecting its APIs to a tenant is important to assess the security posture of the XaaS solution.
-
SAASTA-006 - Compliance Standards
The solution is meeting the required compliance standards for its customers.
Businesses must conform to the industry standards and policies of compliance organizations, and perform regular audits to retain compliance. Customers (tenants) of the XaaS solution must have guarantees in place to protect these businesses from the regulatory hurdles that they may encounter (subject to the customer agreements)
-
SAASTA-007 - Securing Access to AWS Resources
The solution is securing Tenant access to AWS Resources/Services, through either custom application logic, IAM cross account roles, Per-resource policies (S3 Bucket Policies), or STS credentials.
SaaS providers can provide access to resources, and services in AWS (such as DynamoDB, S3, and EC2) by leveraging fine grained permissions to AWS resources using various techniques.
-
SAASTA-008 - Customer Specific Configuration
The solution stores, manages, and version’s Tenant (customer) configuration, such that the SaaS provider (or the Tenant) can rollback changes when required.
Tenants may require infrastructure tuning or customization that is unique to their environment. This is common in situations where tenants are deployed with a siloed infrastructure. Supporting this model and maintaining agility requires a commitment to automating the management and deployment of these configuration options.
-
SAASTA-009 - Automated Scaling
The solution has the ability to effectively and automatically respond to, and manage spikes in tenant activity.
A shared platform XaaS can easily be impacted by a single customer (tenant) event. This reality means that we must have robust set of mitigation policies in place to anticipate and react to these spikes in tenant activity. This scaling strategies can vary based on the architecture employed by your system. More robust solutions may support some notion of per-tenant throttling.
-
SAASTA-010 - Performance Monitoring
The solution has adequate monitoring in place, such that the SaaS provider may evaluate, and optimize individual tenant performance.
It is often useful to be able to monitor, and introduce optimizations that enhance the experience of a tenant without requiring this optimization to be applied to all tenants. These optimizations can be used as part of a tiering strategy, or as a general mechanism for selectively tuning the performance of the system and addressing tenant load profiles.
-
SAASTA-011 - Database Performance
The solution has sufficient strategies and techniques in place to scale the database and mitigate database performance issues.
There are a variety of strategies used to scale databases used in a XaaS System. Leveraging a scalable approach for database architecture, will allow the SaaS provider to on-board and maintain considerable number of tenants without the risk of considerable performance degradation. (Examples include read replication, multi-master, multi-source, sharding, multiple clusters, Database caching, CQRS, Serverless DB).
-
SAASTA-012 - Platform-wide Quality of Service (QoS)
The solution has sufficient measures in place to ensure adequate performance for all tenants of the system.
In a multi-tenant system, there are shared components which introduce the potential of performance degradation through the heavy consumers of the application. Having measures in place to react to heavy consumers (noisy neighbors) is important to ensure every customer has the service level they are promised.
-
SAASTA-013 - Usage Limit
The solution has techniques to define, and monitor tenant-specific limits. Understanding what service limits to define for tenants in a multi-tenant system is crucial to being able to scale the infrastructure, provide tier-based consumption, and volume-based discounts. These limits also correlate directly to the requirements defined in one's architecture to ensure an adequate customer experience.
-
SAASTA-014 - Customer Onboarding and Lifecycle Management
The solution has sufficient techniques in place to manage the lifecycle of active and inactive tenants.
"as a Service" solutions should implement policies to manage onboarding and off-boarding of a tenant. The solution should have a predictable process to introduce new tenants into the system. The environments should also have specific strategies for managing tenants that are inactive. This usually includes some defined window of time where tenant data (application, configuration, users, etc.) and resources are maintained. These policies should also consider what happens to data for tenants that have been inactive for a prolonged period of time.
-
SAASTA-015 - Customer Support
The solution has a well-defined process for assessing, triaging, and escalating tenant specific issues.
XaaS support requires policies and mechanisms that allow organizations to capture and escalate issues with a specific tenant context. With a shared environment, every attempt should be made to automate and streamline these processes. It's also valuable to have integration with AWS support, which may have added information and insight into customer issues.
-
SAASTA-016 - Zero Planned Downtime
The solution has sufficient strategies to mitigate scheduled downtime for deployment of new application features/versions.
Successful XaaS organizations are expected to provide customers with strictly upheld service level agreements (SLA) with zero planned downtime for the services provided. XaaS organizations should have no noticeable impact to planned changes to the application or infrastructure.
-
SAASTA-017 - High Availability
The solution is resilient to failure, and has the ability to recover without a noticeable customer impact.
Successful XaaS organizations are expected to have high availability architectures in place to ensure resiliency of applications to ensure an adequate service level agreement (SLA) for customers.
-
SAASTA-018 - Continuous Integration and Deployment
The solution has Continuous Integration and Deployment integrated within its Development or Infrastructure Deployment Pipeline.
Successful XaaS organizations rely heavily on their ability to continually release new features. Having an architecture and automation in place that supports this deployment automation enables organizations to react quickly to market dynamics and competitive pressure.
-
SAASTA-019 - Business-to-Business (B2B) SaaS delivery model
The solution is being delivered in a Business-to-Business (B2B) SaaS delivery model.
Organizations can deliver their SaaS solutions either in a Business-to-Business (B2B) or Business-to-Customer (B2C) SaaS model. AWS SaaS Competency requires that at least two case studies should be delivered as B2B SaaS. For B2B SaaS, describe the target customer or tenant profile to whom the solution is being primarily targeted towards, with approximate number of tenants utilizing the system.
Resources
- AWS Specialization Program Guide
- Provides step-by-step instructions when applying for an AWS Specialization.
- AWS Specialization Program Benefits Guide
- Provides a deeper description of the program benefits.
- AWS Competency Application Process
- Provides high-level visibility into the AWS Competency application process and timelines for associated process steps.
- AWS Competency & SDP Common Customer Example Requirement Calibration Guide
- Provides control-by-control best practices, resources to implement, good example responses.
- How to build a microsite
- Provides guidance on how to build a microsite to highlight your AWS Specialization.
- How to build a public case study
- Provides guidance on how to build a public customer case study that will showcase your success with AWS Customers.
- How to build an architecture diagram
- Provides guidance on how to build an architecture diagrams that will meet the prerequisites of the Program.
- Well Architected Website
- Learn about the Well Architected Framework and its approach.
- SaaS Best Practices
- Provides best practices on SaaS
- Changes between previous and current versions
- Change Log
- Deployment Pipeline Reference Architecture
- Learn about the stages and actions for different types of pipelines that exist in modern systems.