Module 09
Module 09
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Module overview
Topics Activities
• AWS Well-Architected Framework Design
• AWS Well-Architected Framework
Principles
• Reliability and high availability • Interpret AWS Trusted Advisor
Recommendations
• AWS Trusted Advisor
Knowledge check
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 2
Module objectives
After completing this module, you should be able to:
• Describe the AWS Well-Architected Framework, including the six pillars
• Identify the design principles of the AWS Well-Architected Framework
• Explain the importance of reliability and high availability
• Identify how AWS Trusted Advisor helps customers
• Interpret AWS Trusted Advisor recommendations
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 3
Section 1: AWS Well-Architected
Framework
Module 9: Cloud Architecture
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Architecture: designing and building
Architect
Customer
Structure design (Decision maker) Completed structure
Building crew
(Delivery team)
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 5
What is the AWS Well-Architected Framework?
• A guide for designing infrastructures that are:
✓Secure
✓High-performing
✓Resilient
✓Efficient
• A consistent approach to evaluating and implementing cloud architectures
• A way to provide best practices that were developed through lessons learned
by reviewing customer architectures
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 6
Pillars of the AWS Well-Architected Framework
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 7
Pillar organization
Best practice area Identity and Access Management
Question text SEC 1: How do you manage credentials and authentication?
Credential and authentication mechanisms include passwords, tokens, and keys that grant
Question context access directly or indirectly in your workload. Protect credentials with appropriate
mechanisms to help reduce the risk of accidental or malicious use.
Best practices:
Best practices • Define requirements for identity and access management
• Secure AWS account root user
• Enforce use of multi-factor authentication
• Automate enforcement of access controls
• Integrate with centralized federation provider
• Enforce password requirements
• Rotate credentials regularly
• Audit credentials periodically
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 8
Introduction to the
AWS Well-
Architected
Framework Design
Principles Activity
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 9
AnyCompany background
• AnyCompany Corporation: “Cityscapes you can stand over”
• Founded in 2008 by John Doe
• Sells 3D-printed cityscapes
• About to apply for investment
• Has asked you to perform a review of their platform as part of their due
diligence
• Cloud native
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 10
AnyCompany background (continued)
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 11
AnyCompany architecture: Fly and Snap
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 12
AnyCompany architecture: Show and Sell
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 13
AnyCompany architecture: Make and Ship
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 14
Activity overview
• Break into small groups.
• You will learn about each of the pillars. At the end of each pillar, there is a set of questions
from the AWS Well-Architected Framework for you to work through with your group. Use
these Framework questions to guide your review of the AnyCompany architecture.
• For each Well-Architected Framework question, answer the following questions about the
AnyCompany architecture:
• What is the CURRENT STATE (what is AnyCompany doing now)?
• What is the FUTURE STATE (what do you think AnyCompany should be doing?)
• Agree on the top improvement that AnyCompany should make to its architecture for each
set of Well-Architected Framework questions.
• Hint: There are no right or wrong answers.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 15
Operational Excellence pillar
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 16
Operational Excellence pillar – deliver business value
• Focus
Operational
Excellence • Run and monitor systems to deliver business value, and to
pillar continually improve supporting processes and procedures.
• Key topics
• Automating changes
• Responding to events
Deliver
business • Defining standards to manage daily operations
value
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 17
Operational excellence design principles
Deliver
business
value
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 18
Operational excellence questions
Organization Operate
• How do you determine what your priorities are? • How do you understand the health of your workload?
• How do you structure your organization to support • How do you understand the health of your
your business outcomes? operations?
• How does your organizational culture support your
business outcomes? • How do you manage workload and operations events?
Evolve
Prepare
• How do you evolve operations?
• How do you design your workload so that you can
understand its state?
• How do you reduce defects, ease remediation, and
improve flow into production?
• How do you mitigate deployment risks?
• How do you know that you are ready to support a
workload?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 19
Operational excellence activity breakout
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 20
Security pillar
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 21
Security pillar – protect and monitor systems
• Focus
Security
• Protect information, systems, and assets while delivering
pillar business value through risk assessments and mitigation
strategies.
• Key topics
• Protecting confidentiality and integrity of data
• Identifying and managing who can do what
Protect and
monitor • Protecting systems
systems
• Establishing controls to detect security events
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 22
Security design principles
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 23
Security questions
Security Infrastructure protection
• How do you securely operate your workload? • How do you protect your network resources?
• How do you protect your compute resources?
Identity and access management
• How do you manage identities for people and Data protection
machines?
• How do you classify your data?
• How do you manage permissions for people and
• How do you protect your data at rest?
machines?
• How do you protect your data in transit?
Detection
Incident response
• How do you detect and investigate security events?
• How do you anticipate, respond to, and recover
from incidents?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 24
Security activity breakout
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 25
Reliability pillar
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 26
Reliability pillar – recover from failure and mitigate disruption
• Focus
Reliability
pillar • Ensure a workload performs its intended function correctly and
consistently when it’s expected to.
• Key topics
• Designing distributed systems
Recover from • Recovery planning
failure and
mitigate • Handling change
disruption.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 27
Reliability design principles
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 28
Reliability questions
Foundations Change management
• How do you manage service quotas and • How do you monitor workload resources?
constraints? • How do you design your workload to adapt to
• How do you plan your network topology? changes in demand?
• How do you implement change?
Workload architecture
Failure management
• How do you design your workload service
architecture? • How do you back up data?
• How do you design interactions in a distributed • How do you use fault isolation to protect your
workload?
system to prevent failure?
• How do you design your workload to withstand
• How do you design interactions in a distributed component failures?
system to mitigate or withstand failures?
• How do you test reliability?
• How do you plan for disaster recovery?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 29
Activity breakout
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 30
Performance Efficiency pillar
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 31
Performance Efficiency pillar – use resources sparingly
• Focus
Performance • Use IT and computing resources efficiently to meet system requirements
Efficiency and to maintain that efficiency as demand changes and technologies
pillar evolve.
• Key topics
• Selecting the right resource types and sizes based on workload
requirements
Use • Monitoring performance
resources • Making informed decisions to maintain efficiency as business needs
sparingly. evolve
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 32
Performance efficiency design principles
Use
resources
sparingly.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 33
Performance efficiency questions
Selection Review
• How do you select the best performing • How do you evolve your workload to
architecture? take advantage of new releases?
• How do you select your compute
solution? Monitoring
• How do you select your storage • How do you monitor your resources to
solution? ensure they are performing?
• How do you select your database
solution? Tradeoffs
• How do you configure your networking • How do you use tradeoffs to improve
solution? performance?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 34
Activity breakout
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 35
Cost Optimization pillar
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 36
Cost Optimization pillar – eliminate unneeded expense
• Focus
Cost
Optimization • Avoid unnecessary costs.
pillar
• Key topics
• Understanding and controlling where money is being spent
• Selecting the most appropriate and right number of resource
types
Eliminate
unneeded • Analyzing spend over time
expense.
• Scaling to meeting business needs without overspending
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 37
Cost optimization design principles
Eliminate
unneeded
expense.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 38
Cost optimization questions
Practice cloud financial management Cost-effective resources
• How do you implement cloud financial management? • How do you evaluate cost when you select services?
• How do you meet cost targets when you select
resource type, size, and number?
Expenditure and usage awareness • How do you use pricing models to reduce cost?
• How do you govern usage? • How do you plan for data transfer changes?
• How do you monitor usage and cost?
• How do you decommission resources? Manage demand and supply resources
• How do you manage demand and supply resources?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 39
Activity breakout
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 40
The AWS Well-Architected Tool
• Helps you review the state of your workloads and compares them to the
latest AWS architectural best practices
• Gives you access to knowledge and best practices used by AWS architects,
whenever you need it
• Delivers an action plan with step-by-step guidance on how to build better
workloads for the cloud
• Provides a consistent process for you to review and measure your cloud
architectures
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 41
Section 1 key • The AWS Well-Architected Framework provides a
consistent approach to evaluate cloud architectures and
takeaways guidance to help implement designs.
• The AWS Well-Architected Framework documents a set
of design principles and best practices that enable you
to understand if a specific architecture aligns well with
cloud best practices.
• The AWS Well-Architected Framework is organized into
six pillars.
• Each pillar includes its own set of design principles and
best practices.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 42
Section 2: Reliability and availability
Module 9: Cloud Architecture
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
“Everything fails, all the time.”
Werner Vogels, CTO, Amazon.com
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 44
Reliability
service/number of failures
System
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 45
Understanding reliability metrics
System System
(component) Mean Time to Repair
(component)
repaired (MTTR) fails
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 46
Availability
• Normal operation time / total time
• A percentage of uptime (for example, 99.9 percent) over time (for example, 1
year)
• Number of 9s – Five 9s means 99.999 percent availability
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 47
High availability
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 48
Availability tiers
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 49
Factors that influence availability
Fault tolerance Recoverability
• The built-in redundancy of an • The process, policies, and
application's components and its procedures that are related to
ability to remain operational. restoring service after a
catastrophic event.
Scalability
• The ability of an application to
accommodate increases in
capacity needs without changing
design.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 50
Section 2 key • Reliability is a measure of your system’s ability to
provide functionality when desired by the user, and it
takeaways can be measured in terms of MTBF.
• Availability is the percentage of time that a system is
operating normally or correctly performing the
operations expected of it (or normal operation time
over total time).
• Three factors that influence the availability of your
applications are fault tolerance, scalability, and
recoverability.
• You can design your workloads and applications to be
highly available, but there is a cost tradeoff to consider.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 51
Section 3: AWS Trusted Advisor
Module 9: Cloud Architecture
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Trusted Advisor
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 53
Activity: Interpret AWS Trusted Advisor recommendations
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 54
Activity: Recommendation #1
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 55
Activity: Recommendation #2
IAM Password Policy
Description: Checks the password policy for your account and warns when a password policy is not enabled, or if
password content requirements have not been enabled. Password content requirements increase the overall
security of your AWS environment by enforcing the creation of strong user passwords. When you create or change a
password policy, the change is enforced immediately for new users but does not require existing users to change
their passwords.
Alert Criteria: A password policy is enabled, but at least one content requirement is not enabled.
Recommended Action: If some content requirements are not enabled, consider enabling them. If no password policy
is enabled, create and configure one. See Setting an Account Password Policy for IAM Users.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 56
Activity: Recommendation #3
Description: Checks security groups for rules that allow unrestricted access to a resource. Unrestricted access
increases opportunities for malicious activity (hacking, denial-of-service attacks, loss of data).
Alert Criteria: A security group rule has a source IP address with a /0 suffix for ports other than 25, 80, or 443.)
Recommended Action: Restrict access to only those IP addresses that require it. To restrict access to a specific IP
address, set the suffix to /32 (for example, 192.0.2.10/32). Be sure to delete overly permissive rules after creating
rules that are more restrictive.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 57
Activity: Recommendation #4
Amazon EBS Snapshots
Description: Checks the age of the snapshots for your Amazon Elastic Block Store (Amazon EBS) volumes
(available or in-use). Even though Amazon EBS volumes are replicated, failures can occur. Snapshots are
persisted to Amazon Simple Storage Service (Amazon S3) for durable storage and point-in-time recovery.
Alert Criteria:
Yellow: The most recent volume snapshot is between 7 and 30 days old.
Red: The most recent volume snapshot is more than 30 days old.
Red: The volume does not have a snapshot.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 58
Activity: Recommendation #5
Amazon S3 Bucket Logging
Description: Checks the logging configuration of Amazon Simple Storage Service (Amazon S3) buckets. When server
access logging is enabled, detailed access logs are delivered hourly to a bucket that you choose. An access log record
contains details about each request, such as the request type, the resources specified in the request, and the time
and date the request was processed. By default, bucket logging is not enabled; you should enable logging if you want
to perform security audits or learn more about users and usage patterns.
Alert Criteria:
Yellow: The bucket does not have server access logging enabled.
Yellow: The target bucket permissions do not include the owner account. Trusted Advisor cannot check it.
Recommended Action:
Enable bucket logging for most buckets.
If the target bucket permissions do not include the owner account and you want Trusted Advisor to check the
logging status, add the owner account as a grantee.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 59
Section 3 key • AWS Trusted Advisor is an online tool that provides real-
time guidance to help you provision your resources by
takeaways following AWS best practices.
• AWS Trusted Advisor looks at your entire AWS
environment and gives you real-time recommendations
in five categories.
• You can use AWS Trusted Advisor to help you optimize
your AWS environment as soon as you start
implementing your architecture designs.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 60
Module wrap-up
Module 9: Cloud Architecture
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Module summary
In summary, in this module you learned how to:
• Describe the AWS Well-Architected Framework, including the six pillars
• Identify the design principles of the AWS Well-Architected Framework
• Explain the importance of reliability and high availability
• Identify how AWS Trusted Advisor helps customers
• Interpret AWS Trusted Advisor recommendations
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 62
Complete the knowledge check
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 63
Sample exam question
A SysOps engineer working at a company wants to protect their data in transit and at rest. What services could
they use to protect their data?
Choice Response
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 64
Sample exam question answer
A SysOps engineer working at a company wants to protect their data in transit and at rest. What services could
they use to protect their data?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 65
Additional resources
• AWS Well-Architected website: https://aws.amazon.com/architecture/well-
architected/?wa-lens-whitepapers.sort-
by=item.additionalFields.sortDate&wa-lens-whitepapers.sort-order=desc
• AWS Well-Architected Labs: https://wellarchitectedlabs.com/
• AWS Trusted Advisor Best Practice Checks:
https://docs.aws.amazon.com/awssupport/latest/user/trusted-advisor-
check-reference.html
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 66
Thank you
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 67