DEV Community

Cover image for Best Practices When Designing AWS Architecture: Security and Operational Excellence
Mark Laszlo for AWS Community Builders

Posted on

Best Practices When Designing AWS Architecture: Security and Operational Excellence

The AWS Well-Architected Framework helps you understand the benefits and risks of decisions you make while building workloads on AWS. By using the Framework you will learn operational and architectural best practices for designing and operating reliable, secure, efficient, cost-effective, and sustainable workloads in the cloud. It provides a way to consistently measure your operations and architectures against best practices and identify areas for improvement.

The framework is based on six pillars:

  • Operational Excellence
  • Security
  • Reliability
  • Performance Efficiency
  • Cost Optimization
  • Sustainability

This post focuses on the Operational Excellence and on the Security pillars.

Operational Excellence is the first pillar of AWS Well-Architected Framework. It includes the ability to support the development and run workloads effectively while gaining insight into operations and continuously improving processes and procedures to deliver business value.

By adopting the practices in this pillar you can build architectures that provide insight to their status, are enabled for effective and efficient operation and event response, and can continue to improve and support your business goals.

This pillar provides an overview of design principles, best practices, and questions.

The Security pillar encompasses the ability to protect data, systems, and assets to take advantage of cloud technologies to improve your security. The pillar allows making use of cloud technologies to predict, prevent and respond to any threats as well as enforce privacy, data integrity, guard assets, and enhance detection of security events within a software environment.

By adopting the practices in this pillar you can build architectures that protect your data and systems, control access, and respond automatically to security events.

This pillar provides an overview of design principles, best practices, and questions.

If you have any questions, feel free to reach out.

Top comments (0)