Amazon RDS
Service Delivery Validation Checklist
Validity Period: August 2025-February 2026
This version of the checklist was released on August 29th, 2025. The next version of this checklist is expected to be released in February 2026. AWS Partners may continue to use this version of the checklist until May 2026. AWS Partners may submit applications using the previous release (February 2025) until November 27th, 2025. Please review the change log for a list of changes (if any) since the previous version.
Introduction
AWS Specialization Program recognizes AWS Partner Network (APN) Partners who demonstrate successful customer delivery and expertise in specific AWS services. This AWS Service Delivery Validation Checklist outlines the criteria necessary to achieve the Amazon RDS designation under the AWS Service Delivery Program.
Expectations of Parties
It is expected that AWS Partners will review this document in detail before submitting an AWS Service Delivery Program application, even if AWS Partners believe that all pre-requisites are met. If items in this document are unclear AWS Partners should contact their Partner Development Representative (PDR) or Partner Development Manager (PDM). AWS reserves the right to make changes to this document at any time.
When ready to submit a program application, AWS Partners must complete the self-assessment spreadsheet available for download at the top of this page. Upon completion of the self-assessment spreadsheet, AWS Partners must submit an application in AWS Partner Central. For more information on how to submit an application, view the Program Guide or contact your PDR or PDM.
Once an AWS Partner’s application has been submitted through the AWS Partner Central, AWS will review for completeness and for compliance with the requirements. AWS will review and aim to respond back with any questions within five business days. Incomplete applications will not be considered until all requirements are met. If complete, AWS will send the application to in-house experts to complete a Technical Validation.
The Technical Validation will be completed offline. AWS Partners should prepare for the Technical Validation by reading the Checklist, completing and submitting a self-assessment for each Case Study, and submitting all relevant objective evidence with the application, including architecture diagrams.
Upon completion of the Technical Validation, AWS Partners will receive a final status for the submitted application either confirming or denying acceptance into the AWS Service Delivery Program. AWS Partners may attain one or more AWS Service Delivery designations. Please note that attaining one AWS Service Delivery designation does not guarantee approval into additional AWS Service Delivery designations. If the AWS Partner is denied acceptance for the desired AWS Service Delivery designation, the AWS Partner may re-apply via AWS Partner Central after the AWS Partner has remediated all outstanding action items.
AWS may revoke an AWS Partner’s AWS Service Delivery designation if, at any time, AWS determines in its sole discretion that such AWS Partner does not meet its AWS Service Delivery Program requirements. If an AWS Partner’s AWS Service Delivery designation is revoked, such AWS Partner will (i) no longer receive benefits associated with its designation, (ii) immediately cease use of all materials provided to it in connection with the applicable AWS Service Delivery designation and (iii) immediately cease to identify or hold itself out as a Partner of such AWS Service Delivery.
AWS Service Delivery Program Prerequisites
The following items will be validated by the AWS Service Delivery Program Manager; missing or incomplete information must be addressed prior to scheduling of the Technical Validation.
-
1.0APN Program Requirements
-
1.1Program Guidelines
The AWS Partner must read the Program guidelines and Definitions before submitting the application. Click here for Program details.
-
1.2Services Path Membership
Partner must be at the Validated or Differentiated stage within the Services Path. Partners should talk to their PDR/PDM about how to join the Services Path.
-
1.3AWS Partner Program Requirements
To maintain this Specialization you must:
- AWS Services Tier must be "Select Tier" or higher.
- Maintain the AWS Partner Central Solution attached to your application in "Active" status. This indicates the Solution is currently supported and available.
Important: If you fail to maintain either of these requirements, your Specialization will be marked as non-compliant. You will then have 6 months to regain compliance with the above criteria. If compliance is not regained, you will lose your Specialization and all corresponding benefits.
-
-
2.0AWS Customer Case Studies
-
2.1Production AWS Customer Case Studies
AWS Partner must privately share with AWS details about two (2) unique examples of Amazon RDS projects executed for two (2) unique AWS customers. Each case study must demonstrate how the Partner used the unique capabilities of the AWS service to address the customer's problem.
In addition to the required case study details provided in AWS Partner Central, the partner must also provide architecture diagrams of the specific customer deployment and information listed in the technical requirements sections of this validation checklist.
The information provided for these case studies will be used by AWS for validation purposes only. AWS Partner is not required to publish these details publicly.
AWS Partner can reuse the same case study across different AWS Specialization designations as long as the case study and implementation scope are relevant to those designations. The partner should make sure the existing case study clearly explains the relevance to each designation they are applying for.
In cases where a case study is used across multiple AWS Partner Specialization applications, the partner must attach a completed self-assessment spreadsheet for each Specialization with all service-specific details provided.
AWS will accept one case study per customer. Each customer must be a separate legal entity to qualify. The partner may use an example for an internal or affiliate company of the partner if the offering is available to outside customers.
All case studies must describe deployments that have been performed within the past 18 months and must be for projects that are in production with customers, rather than in a ‘pilot’ or proof of concept stage.
All case studies provided will be examined in the Documentation Review of the Technical Validation. The partner offering will be removed from consideration if the partner cannot provide the documentation necessary to assess all case studies against each relevant validation checklist item, or if any of the validation checklist items are not met.
Note: Public-facing case studies are encouraged over private case studies, as they may be used by AWS for marketing purposes and will be featured in Partner Solution Finder. Evidence of a publicly referenceable case study must be provided in the form of a case study, white paper, blog post, or equivalent. In cases where the partner cannot publicly name customers due to the sensitive nature of the customer engagements, the partner may choose to anonymize the public case study. Anonymized public case study details will be published by AWS, but the customer name will remain private. For best practices on how to write an accepted public case study see the Public Case Study Guide.
-
2.2Architecture Diagrams
Submitted case studies must include architecture diagrams.
- Architecture diagrams must detail how the solution interacts with the AWS Cloud; specifically, what AWS tools and services are used in the solution
- Diagrams must also include evidence of AWS best practices for architecture and security
Note: Click here for best practices on how to build an acceptable Architecture Diagram.
-
-
3.0AWS Partner Self-Assessment
-
3.1Program Validation Checklist Self-Assessment
AWS Partner must conduct a self-assessment of their compliance to the requirements of the Amazon RDS Service Delivery using the Self-Assessment Spreadsheet linked at the top of this page. All sections of the Self-Assessment Spreadsheet must be completed for each case study and spreadsheet must be attached to the associated application in AWS Partner Central.
It is recommended that AWS Partners have their Solutions Architect, PDR, or PDM review the completed self-assessment before submitting to AWS. The purpose of this is to ensure the AWS Partner’s AWS team is engaged and working to provide recommendations prior to the technical validation and to help ensure a positive technical validation experience.
-
-
4.0RDS Prerequisites
-
4.1Database Engine Specialty
Qualification for the Amazon RDS Service Delivery designation is by specific engine type including: Amazon Aurora MySQL, Amazon Aurora PostgreSQL, Amazon RDS for PostgreSQL, Amazon RDS for MySQL, Amazon RDS for MariaDB, Amazon RDS for Oracle, and Amazon RDS for Microsoft SQL Server. Partners will need to provide a minimum of two (2) case studies for initial participation and must provide 1 additional case study to be recognized for additional engine specialties.
- For the first database engine specialty, APN Partner must privately share with AWS details about 2 unique examples of customers using the same Amazon RDS database engine under review. AWS will accept one example per customer.
- For each additional engine specialty, APN Partner may submit case studies from the same customer. All case studies submitted should address unique workloads.
- (Aurora only) APN Partner may share 1 case study for Amazon Aurora MySQL and 1 case study for Amazon Aurora PostgreSQL for initial participation. As Amazon Aurora is compatible with MySQL and PostgreSQL, achieving Amazon Aurora MySQL qualifies for achieving Amazon RDS for MySQL. Likewise, achieving Amazon Aurora PostgreSQL qualifies for achieving Amazon RDS for PostgreSQL.
-
4.2Case Study Summary
It is highly recommended that the AWS Partner complete the Amazon RDS Service Delivery Case Study Summary Template and attach to each Case Study submitted in AWS Partner Central. The case study summary will be used to highlight AWS Partner case studies for internal AWS audiences.
-
Amazon RDS Customer Reference Requirements
The following requirements relate to how Amazon RDS was used in each provided customer reference.
Amazon RDS Expertise
-
RDS-001 - Solution Characteristics
It is critical to delve into customer's requirements on factors like database use case, traffic and anticipated growth to ensure RDS meets organiztional needs of the customer.
Thus, please provide details on the below in your ressponse:
- Initial size of the database.
- Expected yearly growth of the database.
- Number of tables/objects in the database (required for heterogeneous migrations).
- Anticipated number of concurrent requests during peak database usage.
- Database engine used in application (i.e. Amazon Relational Database Service (Amazon RDS) MySQL, Amazon RDS MariaDB etc.)
-
RDS-002 - Optimization Performance and Costs for Customers
Understanding the performance and usage of RDS instance based on instance class and storage helps lower total cost of ownership. Additionally using RDS features like read replica can help reduce load on primary instance thus optimizing performance.
Thereby, provide details on how the partner helped customers to take advantage of Amazon RDS Engine features including monitoring performance to optimize costs. You can include the usage of below features:
- Description of application/process changes to utilize different read and write endpoints for Amazon RDS instance.
- Show measurements on the performance of the Amazon RDS instance(s) as well as how to continuously optimize the performance of the instance(s).
- Show how to continually improve their total cost of ownership of the Amazon RDS instance(s).
If the partner is managing the database then they should provide information on how they are accomplishing theabove listed requirement.
If the customer is managing the database then the partner should provide documentation and training material about how to accomplish the above listed requirement.
-
RDS-003 - Security Best Practices
Password rotation policies, implementing encryption and network access rules makes sure that database is not at risk from malicious users. Additionally, capturing and analyzing database logs can help you prevent and monitor potential security threats to take necessary action.
Provide details on how case studies are demonstrating the usage of Amazon RDS specific security best practices such as listed below:
- How to implement password policies for their database (password strength, rotation policies etc.).
- How to implement secure password storage, retrieval and rotation for human and application access to the database.
- How to capture and analyze available log files for potential security events related to their database.
- Encryption options for data at rest or at column level.
- KMS key policies across various database instances, database instance life cycles (Prod/Non-prod)
- Network configurations such as subnets, security groups and access control lists.
- Notifying customer of Amazon RDS security best practices as described here (if applicable)
If the partner is managing the database then they should provide information on how they are accomplishing the listed requirement.
If the customer is managing the database then the partner should provide documentation and training material about how to accomplish the listed requirement.
-
RDS-004 - Sizing based on customer requirements and/or pre-RDS architecture
Ensuring that you select the right RDS/Aurora instance w.r.t the application requirements avoid any un-necessary hiccups and establishes that RDS would be able to justify the fulfillment of customer's requirement in terms of operations, cost and performance. Thus, provide information on how an appropriate sized Amazon RDS architecture was selected based on the customer's non-AWS architecture or requirements for a new application being developed.
For Existing Architecture provide details on:
- Final Amazon RDS architecture, how it lines up against previous architecture and how it meets or exceeds the current customer implementation in regards to cost, operations, and performance.
For a New Application provide details on:
- Requirements for the new application and what the database needs were. Details should include: availability needs, regional or multi-regional access needs, transactions per second, database initial size, and expected growth rate of the size of the database.
- Final Amazon RDS architecture and details on how the final architecture lines up with the application requirements.
-
RDS-005 - Solution Deployment Characteristics
In case of disaster/AZ failure it is critical to have cross region/regional read replica or Multi-AZ architecture in place to avoid un-necessary downtime to the business. That said, details on approach, implementation and customer acceptance testing make sure that the architecture can withstand any sudden failures.
Thus, provide description of the approach, implementation, and customer acceptance testing on at least ONE of the below use cases for each case study:
- Cross-regional replication or another cross-regional DR setup.
- Use of a primary instance and one or more read replicas with the primary fail-over read replica located in a different availability zone from the primary instance.
- Use of AutoScaling for Read Replicas or other automated re-sizing architectures.
- A migration to Amazon RDS from a different database.
-
RDS-006 - Sensitive Data Management
Storing sensitive data in the RDS database comes with additional controls in place to ensure that the data is not compromised because of attacks like DDOS, SQL Injection etc.
Please describe the following:
- A documented process to identify and classify sensitive data stored inside the database and how it is protected
- KMS key policies across various database instances, database instance life cycles (Prod/Non-prod)
-
RDS-007 - Non-production environment management
Inorder to perform testing incase of upgrades etc there might be a need to create dev/test environment for RDS. It is recommended that these environments aree segregated based on network, IAM, data and database access.
Describe how the partner helps the customers on managing non-production environment in form of:
- Process documentation and/or automation scripts on how the non-production environments are created and managed.
- Process documentation on segregating access to production and non-production environments at various levels – Network, IAM access and Database access
- (If applicable) procedures to de-sanitize the sensitive data when creating non-production environments
-
RDS-008 - Migration project details
Before migration to AWS RDS, we suggest you to finalize a particular engine based on customer’s business and technical needs, not on what’s new or popular. Further, having a fallback plan in case the migration does not go as planned avoids any un-necessary downtime to the business.
If a customer reference is a migration project please provide following details
- Source database type (e.g. Oracle, MS SQL etc.)
- Target database type (e.g. RDS MYSQL, RDS Postgres, etc.)
Along with above information, describe the following:
- Decision matrix around target database environment selection (Homogeneous RDS engine; Heterogeneous engine (RDS / Aurora) )
- Assessment report on current environment in terms of compatibility (SCT analysis/ similar compatibility analysis)
- Documented cutover plan and fall back plan for production environment
-
RDS-009 - High availability, Scalability and Disaster Recovery
It is critical to have clearly defined the RTO, RPO, backup retention and availability/uptime SLA to recover incase of a disaster.Describe
Describe how customer has analyzed customer’s Availability, Scalability and Disaster Recovery requirements and achieved/implemented the same on target RDS based architecture. Include the following in your response:
- Documented evidence of current systems requirements – RTO, RPO, Backup retention policy and High availability requirements
- Target architecture meeting the above guidelines and documentation shared with customer detailing the same
- Implementation of best practices around DNS management, End point management, automation at application layer etc.. to align with availability guidelines
- Detailed backup policy and communication around cost estimates for backups
- Standard operating procedure / guidelines to follow during Disaster recovery scenario including specific monitoring in place to detect a failure and alarm
- (Optionally) automation to identify and mitigate common types of failure scenarios
Common Customer Reference Requirements
If you have completed an AWS Well-Architected Framework Review (WAFR) for the customer example which shows zero outstanding high-risk issues (HRIs) in the Security, Operational Excellence, and Reliability pillars, you are not required to provide evidence for the following requirements. Please upload an exported WAFR report for each of the customer example instead.
All of the following requirements must be met by at least one of the two submitted customer examples. See specific evidence for each control. Refer to calibration guide for example responses. All of the following requirements must be met by at least one of the submitted customer references. See specific evidence for each control.
Documentation
Requirements in this category relate to the documentation provided for each customer example.
-
DOC-001 - Provide Architecture diagram designed with scalability and high availability
AWS Partner must submit architecture diagrams depicting the overall design and deployment of its AWS Partner solution on AWS as well as any other relevant details of the solution for the specific customer in question.
The submitted diagrams are intended to provide context to the AWS Solutions Architect conducting the Technical Validation. It is critical to provide clear diagrams with an appropriate level of detail that enable the AWS Solutions Architect to validate the other requirements listed below.
Each architecture diagram must show:
- All of the AWS services used
- How the AWS services are deployed, including virtual private clouds (VPCs), availability zones, subnets, and connections to systems outside of AWS.
- Elements deployed outside of AWS, e.g. on-premises components, or hardware devices.
- how design scales automatically - Solution adapts to changes in demand. The architecture uses services that automatically scale such as Amazon S3, Amazon CloudFront, AWS Auto Scaling, and AWS Lambda.
- how design has high availability with multi-AZ or multi-region deployment. When intentional tradeoffs have been made (e.g. to optimize cost in favor of high availability), please explain the customer's requirements.
Please provide the following as evidence (required for all provided customer examples):
- An architecture diagram depicting the overall design and deployment of your solution on AWS.
- Explanation of how the major solutions elements will keep running in case of failure.
- Description of how the major solutions elements scale up automatically.
Secure Customer AWS Account Governance and Access
Any AWS accounts created by the AWS Partner on behalf of the customer or AWS accounts that the AWS Partner administers as part of the engagement must meet the following requirements.
-
ACCT-001 - Define Secure AWS Account Governance Best Practice
AWS expects all Services Partners to be prepared to create AWS accounts and implement basic security best practices. Even if most of your customer engagements do not require this, you should be prepared in the event you work with a customer who needs you to create new accounts for them.
Establish internal processes regarding how to create AWS accounts on behalf of customers when needed, including:
- When to use root account for workload activities
- Enable MFA on root
- Set the contact information to corporate email address or phone number
- Enable CloudTrail logs in all regions and protect CloudTrail logs from accidental deletion with a dedicated S3 bucket
Please provide the following as evidence:
- Documents describing Security engagement SOPs which met all the 4 criteria defined above. Acceptable evidence types are security training documents, internal wikis, or standard operating procedures documents.
- Description of how Secure AWS Account Governance is implemented in one (1) of the submitted customer examples.
-
ACCT-002 - Define identity security best practice on how to access customer environment by leveraging IAM
Define standard approach to access customer-owned AWS accounts, including:
- Both AWS Management Console access and programmatic access using the AWS Command Line Interface or other custom tools.
- When and how to use temporary credentials such as IAM roles
- Leverage customer's existing enterprise user identities and their credentials to access AWS services through Identity Federation or migrating to AWS Managed Active Directory
Establish best practices around AWS Identity and Access Management (IAM) and other identity and access management systems, including:
- IAM principals are only granted the minimum privileges necessary. Wildcards in Action and Resource elements should be avoided as much as possible.
- Every AWS Partner individual who accesses an AWS account must do so using dedicated credentials
Please provide the following as evidence:
- Security engagement Standard Operation Procedure (SOP) which met all the 2 criteria defined above. Acceptable evidence types are security training documents, internal wikis, standard operating procedures documents. Written descriptions in the self-assessment excel is not acceptable.
- Description of how IAM best practices are implemented in one (1) of the submitted customer examples.
Operational Excellence
Requirements in this category relate to the ability of the AWS Partner and the customer to run and monitor systems to deliver business value and to continually improve supporting processes and procedures.
-
OPE-001 - Define, monitor and analyze customer workload health KPIs
AWS Partner has defined metrics for determining the health of each component of the workload and provided the customer with guidance on how to detect operational events based on these metrics.
Establish the capability to run, monitor and improve operational procedure by:
- Defining, collecting and analyzing workload health metrics w/AWS services or 3rd Party tool
- Exporting standard application logs that capture errors and aid in troubleshooting and response to operational events.
- Defining threshold of operational metrics to generate alert for any issues
Please provide the following as evidence:
- Standardized documents or guidance on how to develop customer workload health KPIs with the three components above
- Description of how workload health KPIs are implemented in (1) of the submitted customer examples.
-
OPE-002 - Define a customer runbook/playbook to guide operational tasks
Create a runbook to document routine activities and guide issue resolution process with a list of operational tasks and troubleshooting scenarios covered that specifically addresses the KPI metrics defined in OPE-001.
Please provide the following as evidence:
- Standardized documents or runbook met the criteria defined above.
-
OPE-003 - Use consistent processes (e.g. checklist) to assess deployment readiness
Deployments are tested or otherwise validated before being applied to the production environment. For example, DevOps pipelines used for the project for provisioning resources or releasing software and applications.
Use a consistent approach to deploy to customers including:
- A well-defined testing process before launching in production environment
- Automated testing components
Please provide the following as evidence:
- A deployment checklist example or written descriptions met all the criteria defined above.
Security - Networking
Requirements in this category focus on security best practices for Virtual Private Cloud (Amazon VPC) and other network security considerations.
-
NETSEC-001 - Define security best practices for Virtual Private Cloud (Amazon VPC) and other network security considerations.
Establish internal processes regarding how to secure traffic within VPC, including:
- Security Groups to restrict traffic between Internet and Amazon VPC
- Security Groups to restrict traffic within the Amazon VPC
- Network ACL to restrict inbound and outbound traffic
- Other AWS security services to protect network security
Please provide the following as evidence:
- Written descriptions/documents on network security best practices met the criteria defined above.
- Description of how network security is implementation in one (1) of the submitted customer examples.
-
NETSEC-002 - Define data encryption policy for data at rest and in transit
Establish internal processes regarding a data encryption policy used across all customer projects
- Summary of any endpoints exposed to the Internet and how traffic is encrypted
- Summary of processes that make requests to external endpoints over the Internet and how traffic is encrypted
- Enforcing encryption at rest. By default, you should enable the native encryption features in an AWS service that stores data unless there is a reason not to.
All cryptographic keys are stored and managed using a dedicated key management solution
Please provide the following as evidence:
- Data encryption and key management policy met the criteria defined above.
- Description of how data encryption is implementation in one (1) of the submitted customer examples.
Reliability
Requirements in this section focus on the ability of the AWS Partner solution to prevent, and quickly recover from failures to meet business and customer demand.
-
REL-001 - Automate Deployment and leverage infrastructure-as-code tools.
Changes to infrastructure are automated for customer implementation
- Tools like AWS CloudFormation, the AWS CLI, or other scripting tools were used for automation.
- Changes to the production environment were not done using the AWS Management Console.
Please provide the following as evidence:
- Written description of deployment automation and an example template (e.g., CloudFormation templates, architecture diagram for CI/CD pipeline) met the criteria defined above.
-
REL-002 - Plan for disaster recovery and recommend Recovery Time Objective (RTO) and Recoverty Point Objective (RPO).
Incorporate resilience discussion and advise an RTO & PRO target when engaging with customer. Customer acceptance and adoption on RTO/RPO is not required.
- Establish a process to establish workload resilience including:
- RTO & RPO target
- Explanation of the recovery process for the core components of the architecture
- Customer awareness and communication on this topic
Please provide the following as evidence:
- Descriptions or documents on workload resilience guidance met the three criteria defined above
- Description of how resilience is implementation in one (1) of the submitted customer examples including reasons for exception when RTO&RPO is not defined
Cost Optimization
Requirements in this category relate to the AWS Partner's ability to help customers run systems that deliver business value at the lowest price point.
-
COST-001 - Develop total cost of ownership analysis or cost modelling
Determine solution costs using right sizing and right pricing for both technical and business justification.
Conducted TCO analysis or other form of cost modelling to provide the customer with an understanding of the ongoing costs including all the following 3 areas:
- Description of the inputs used to estimate the cost of the solution
- Summary of the estimates or cost model provided to the customer before implementation
- Business value analysis or value stream mapping of AWS solution
Please provide the following as evidence:
- Description of how to develop cost analysis or modeling with the critical components defined above
- Cost analysis example in one (1) of the submitted customer examples. Acceptable evidence types are price calculator link, reports or presentations on business values analysis
Resources
- AWS Specialization Program Guide
- Provides step-by-step instructions when applying for an AWS Specialization.
- AWS Specialization Program Benefits Guide
- Provides a deeper description of the AWS Service Delivery benefits.
- How to build a microsite
- Provides guidance on how to build a microsite to highlight your AWS Specialization.
- How to build a public case study
- Provides guidance on how to build a public customer case study that will showcase your success with AWS Customers.
- AWS Competency & Service Delivery Program Common Customer Example Requirement Calibration Guide
- Provides control-by-control best practices, resources to implement, good example responses.
- How to build an architecture diagram
- Provides guidance on how to build an architecture diagrams that will meet program requirements.
- Well Architected Website
- Learn about the Well Architected Framework and its approach.
- Changes between previous and current versions
- Change Log