AWS Re:Invent Talks — Update 6— AWS Well Architected Framework
3 min readJan 14, 2024
- New to the AWS Well-Architected Framework? This talk is an essential primer for understanding the framework and its benefits. It’s a must-watch if you’re just starting out. Already familiar? This session will reinforce the basics.
- Ensuring Best Practices in Your Tech Portfolio: Businesses rely heavily on a range of technology solutions for daily operations and success. But how can you be sure you’re adhering to best practices? Are you aware of potential risks in your architectures? This session will guide you through the AWS Well-Architected Framework, offering detailed architectural advice. Plus, learn how the AWS Well-Architected Tool can help you assess and enhance your technology portfolio, ensuring you’re on the right track.
- This talk is about building secure applications on AWS using a well-architected approach, focusing on cloud security and application security integration.
- It introduces the AWS Well-Architected Framework, emphasising its six pillars that helps in balancing security with other factors like cost and quality.
- As application portfolios expand, they stressed the importance of scaling security efforts. Security teams should focus on high-value activities and leverage AWS services for routine tasks.
- Talk emphasised the importance of TAME (Transfer, Accept, Mitigate, Eliminate) in early application design for effective security risk management.
- The AWS Threat Composer [https://awslabs.github.io/threat-composer/workspaces/EXAMPLE_ThreatComposer/dashboard?mode=Full], an open-source tool, was mentioned for identifying potential threats and providing remediation guidelines.
- This talk emphasised robust application security on AWS, highlighting tools like CodeGuru, Signer, and CodeWhisperer for secure code writing, ensuring third-party code security via AWS AppFabric, advocating for best pipeline security practices and IAM credentials management.
- Finally company Zillow presented their case study on Security Champions Program and its significance in their organisation.
🌟 Optimizing with AWS Trusted Advisor and AWS Well-Architected Framework
- This talk sets the context with examples about what cloud optimisation is and why you should care about the same.
- It emphasises on achieving cloud optimisation by focusing not only on cost and performance, but also on security and operations.
- A key example provided was the use of Route 53’s Zonal Shift for reliable application performance (using application recovery controller zonal shift which is recently GA)
- The AWS Well-Architected Framework was presented as a comprehensive guide comprising best practices for optimal AWS workload management.
- The holistic approach to workload optimisation, which involves considering technology, people, and processes, was also highlighted, with the AWS Well-Architected Tool recommended for guidance.
- The role of AWS Trusted Advisor in offering insights and recommendations for system optimisation was discussed, including its capabilities in automated best practice implementation and integration with many other AWS services example EventBridge, AWS Config, AWS SecurityHub, AWS Resource Hub etc..
- This talk also ties back use of Trusted advisor along with AWS Well Architected Framework sample report and its usage.
- Lastly, the optimisation cycle’s focus on return on investment (ROI) was emphasised as critical for prioritising optimisation efforts, topped up with Georgia-Pacific case study.