Module 9 Cloud Architecture
Module 9 Cloud Architecture
Architect
Customer
Structure design (Decision maker) Completed structure
Building crew
(Delivery team)
What is the AWS Well-Architected Framework?
•A guide for designing infrastructures that are:
✓Secure
✓High-performing
✓Resilient
✓Efficient
7
Pillar organization
Best practice area Identity and Access Management
Question text SEC 1: How do you manage credentials and authentication?
Credential and authentication mechanisms include passwords, tokens, and keys that grant
Question context access directly or indirectly in your workload. Protect credentials with appropriate
mechanisms to help reduce the risk of accidental or malicious use.
Best practices:
Best practices •Define requirements for identity and access management
•Secure AWS account root user
•Enforce use of multi-factor authentication
•Automate enforcement of access controls
•Integrate with centralized federation provider
•Enforce password requirements
•Rotate credentials regularly
•Audit credentials periodically
AnyCompany background
•AnyCompany Corporation: “Cityscapes you can stand over”
•Founded in 2008 by John Doe
•Sells 3D-printed cityscapes
•About to apply for investment
•Has asked youto perform a review of their platform as part of their due
diligence
•Cloud native
AnyCompany background (continued)
AnyCompany architecture: Fly and Snap
AnyCompany architecture: Show and Sell
AnyCompany architecture: Make and Ship
Activity overview
•Break into small groups.
•You will learn about each of the pillars. At the end of each pillar, there is a set of questions
from the AWS Well-Architected Framework for you to work through with your group. Use
these Framework questions to guide your review of the AnyCompany architecture.
•For each Well-Architected Framework question, answer the following questions about the
AnyCompany architecture:
•What is the CURRENT STATE (what is AnyCompany doing now)?
•What is the FUTURE STATE (what do you think AnyCompany should be doing?)
•Agree on the top improvement that AnyCompany should make to its architecture for each
set of Well-Architected Framework questions.
•Hint: There are no right or wrong answers.
Operational Excellence pillar –deliver business value
• Focus
Operational
Excellence •Run and monitor systems to deliver business value, and to
pillar continually improve supporting processes and procedures.
•Key topics
•Automating changes
•Responding to events
Deliver
•Defining standards to manage daily operations
business
value
Operational excellence design principles
Deliver
business
value
Operational excellence questions
Organization
Operate
•How do you determine what your priorities are?
•How do you understand the health of your workload?
•How do you structure your organization to support •How do you understand the health of your
your business outcomes? operations?
•How does your organizational culture support your
•How do you manage workload and operations events?
business outcomes?
Evolve
Prepare
•How do you evolve operations?
•How do you design your workload so that you can
understand its state?
•How do you reduce defects, ease remediation, and
improve flow into production?
•How do you mitigate deployment risks?
•How do you know that you are ready to support a
workload?
Operational excellence activity breakout
Security pillar –protect and monitor systems
• Focus
Security
•Protect information, systems, and assets while delivering
pillar business value through risk assessments and mitigation
strategies.
•Key topics
•Protecting confidentiality and integrity of data
•Identifying and managing who can do what
Protect and
monitor •Protecting systems
systems •Establishing controls to detect security events
Security design principles
23
Security questions
Security
Infrastructure protection
•How do you securely operate your workload?
•How do you protect your network resources?
•How do you protect your compute resources?
Detection
Incident response
•How do you detect and investigate security events? •How do you anticipate, respond to, and recover
from incidents?
24
Security activity breakout
25
Reliability pillar –recover from failure and mitigate disruption
• Focus
Reliability
pillar •Ensure a workload performs its intended function correctly and
consistently when it’s expected to.
•Key topics
•Designing distributed systems
Recover from •Recovery planning
failure and
mitigate •Handling change
disruption.
Reliability design principles
• Focus
Performance •Use IT and computing resources efficiently to meet system requirements
Efficiency and to maintain that efficiency as demand changes and technologies
pillar evolve.
•Key topics
•Selecting the right resource types and sizes based on workload
requirements
Use •Monitoring performance
resources •Making informed decisions to maintain efficiency as business needs
sparingly. evolve
Performance efficiency design principles
Use
resources
sparingly.
33
Performance efficiency questions
Selection Review
•How do you select the best performing
•How do you evolve your workload to
architecture? take advantage of new releases?
•How do you select your compute
solution? Monitoring
•How do you select your storage •How do you monitor your resources to
solution? ensure they are performing?
•How do you select your database
solution? Tradeoffs
•How do you configure your networking •How do you use tradeoffs to improve
solution? performance?
34
Activity breakout
Cost Optimization pillar –eliminate unneeded expense
• Focus
Cost
Optimization •Avoid unnecessary costs.
pillar
•Key topics
•Understanding and controlling where money is being spent
•Selecting the most appropriate and right number of resource
types
Eliminate
unneeded •Analyzing spend over time
expense.
•Scaling to meeting business needs without overspending
Cost optimization design principles
Eliminate
unneeded
expense.
38
Cost optimization questions
Practice cloud financial management
Cost-effective resources
•How do you implement cloud financial management?
•How do you evaluate cost when you select services?
•How do you meet cost targets when you select
resource type, size, and number?
Expenditure and usage awareness •How do you use pricing models to reduce cost?
•How do you govern usage?
•How do you plan for data transfer changes?
•How do you monitor usage and cost?
•How do you decommission resources? Manage demand and supply resources
•How do you manage demand and supply resources?
39
Activity breakout
The AWS Well-Architected Tool
•Helps you review the state of your workloads and compares them to the
latest AWS architectural best practices
•Gives you access to knowledge and best practices used by AWS architects,
whenever you need it
•Delivers an action plan with step-by-step guidance on how to build better
workloads for the cloud
•Provides a consistent process for you to review and measure your cloud
architectures
Section 2: Reliability and availability
Reliability
System System
(component) Mean Time to Repair (component)
(MT TR)
repaired fails
Availability
•Normal operation time / total time
•A percentage of uptime (for example, 99.9 percent) over time (for example, 1
year)
•Number of 9s –Five 9s means 99.999 percent availability
47
High availability
48
Availability tiers
Factors that influence availability
Fault tolerance
Recoverability
•The built-in redundancy of an
•The process, policies, and
application's components and its procedures that are related to
ability to remain operational.
restoring service after a
catastrophic event.
Scalability
•The ability of an application to
accommodate increases in
capacity needs without changing
design.
50
Section 3: AWS Trusted Advisor
AWS Trusted Advisor
53
Activity: Interpret AWS Trusted Advisor recommendations
Activity: Recommendation #1
Recommended Action: Log in to your root account and activate an MFA device.
Activity: Recommendation #2
IAM Password Policy
Description: Checks the password policy for your account and warns when a password policy is not enabled, or if
password content requirements have not been enabled. Password content requirements increase the overall
security of your AWS environment by enforcing the creation of strong user passwords. When you create or change a
password policy, the change is enforced immediately for new users but does not require existing users to change
their passwords.
Alert Criteria: A password policy is enabled, but at least one content requirement is not enabled.
Recommended Action: If some content requirements are not enabled, consider enabling them. If no password policy
is enabled, create and configure one. See Setting an Account Password Policy for IAM Users.
Activity: Recommendation #3
59