SlideShare a Scribd company logo
1 of 63
©2017 Logicworks. All Rights Reserved. 1
Today’s Agenda
9:30-10am: How to Architect for High Availability
10:45-11:30am: Workshop: Working with Elastic Load Balancing:
https://www.qwiklabs.com/focuses/3441?locale=en
11:30-12pm: How to Architect for Security and Cost
12-12:30pm: Lunch & Q&A
How to Architect for Mission-
Critical Applications
Phil Christensen
Senior Solutions Architect
Logicworks
www.logicworks.net
©2017 Logicworks. All Rights Reserved.
About Logicworks
©2017 Logicworks. All Rights Reserved. 3
Cloud Strategy
& Migration
Managed
Cloud
Cloud
Security
DevOps
Automation
We design, build, automate, and manage enterprise clouds.
How to Architect for Mission-Critical Applications
High Availability
Phil Christensen
Senior Solutions Architect
Logicworks
www.logicworks.net
©2017 Logicworks. All Rights Reserved.
©2017 Logicworks. All Rights Reserved. 5
How to Improve Availability
Throw people and
money at availability
problems:
• Buy better
hardware
• Buy DR
• 24/7 NOC team
Develop smarter
software to control
your cloud:
• Design for failure
• Automate!
OLD WORLD AWS
CLOUD
① Design for failure
② Design for constant change
③ Disposable infrastructure
④ Destructive testing
©2017 Logicworks. All Rights Reserved. 6
Principles of Cloud HA
Design for Failure
©2017 Logicworks. All Rights Reserved.
AWS already gives you the tools for high availability…
 Availability Zones and Regions
 99.99% EC2 Reliability
 Built-in Reliability with Services like RDS
 AWS Auto Scaling
 Lower Cost Disaster Recovery
©2017 Logicworks. All Rights Reserved. 8
Design for Failure: Foundation
Assume everything fails and work
backwards
Applications should continue to
function even if the underlying
physical hardware fails or is
removed/replaced
When, not if, an individual
component fails, the application
does not fail
©2017 Logicworks. All Rights Reserved. 9
Design for Failure: Core Concepts
“Everything fails, all
the time.”
Werner Vogels, CTO
Amazon.com
Design for Failure: Foundation
Let’s start from Day 1, User 1:
• Amazon Route 53 for DNS
• A single Elastic IP
• A single Amazon EC2 instance
 With full stack on this host:
 Web app
 Database
 Management
 And so on… Amazon EC2
instance
Elastic IP
User
Amazon
Route 53
10
Design for Failure: Foundation
• We could potentially get to a
few hundred to a few thousand
depending on application
complexity and traffic, but…
• No failover
• No redundancy
• Too many eggs in one basket
11
Amazon EC2
instance
Elastic IP
User
Amazon
Route 53
Design for Failure: Foundation
First, let’s separate out our single host
into more than one:
• Web
• Improve scaling capabilities
• Database
• Make your life easier: use RDS
Web
instance
Elastic IP
RDS DB
instance
User Amazon
Route 53
12
Design for Failure: Foundation
Next, let’s address our lack of
failover and redundancy issues:
Add another web instance
 Use a different Availability Zone
RDS Multi-AZ deployment
Elastic Load Balancing (ELB)
Web
Instance
RDS DB Instance
Active (Multi-AZ)
Availability Zone Availability Zone
Web
Instance
RDS DB Instance
Standby (Multi-AZ)
ELB
Balancer
13
Design for Failure: Foundation
Best Practices
Use multiple Availability Zones
Use Elastic Load Balancing
Configure CloudWatch alerts for
real-time monitoring
Consider cross-region replication of
crucial data using read replicas
Web
Instance
RDS DB Instance
Active (Multi-AZ)
Availability Zone Availability Zone
Web
Instance
RDS DB Instance
Standby (Multi-AZ)
ELB
Balancer
14
Design for
Constant Change
©2017 Logicworks. All Rights Reserved. 15
Changes we must prepare for:
A. Updates to infrastructure or instance configurations
B. Instance or component failure
C. Changing capacity requirements
D. Ongoing development of custom software
©2017 Logicworks. All Rights Reserved. 16
Design for Constant Change
The key to changing your infrastructure
frequently and securely is automation.
©2017 Logicworks. All Rights Reserved. 17
Design for Constant Change: Automation
Infrastructure
Buildout
Configuration
Management
Iterative
Deployment
Process
Monitoring
A. Engineers want to change infrastructure
©2017 Logicworks. All Rights Reserved. 18
Design for Constant Change: Automation
• Human error
• High risk of
change
• Slow
• Hours or days of
engineering time
• Can’t rollback
• Change code, not
servers
• Can be rolled back
• Affects all
instances
• Every server
maintains ideal
configuration
MANUAL AUTOMATED
B. Instance or component failure
©2017 Logicworks. All Rights Reserved. 19
Design for Constant Change: Automation
• Alert notifies
human
• Human must take
action to rebuild
from AMI or
scratch
• High potential of
downtime
• Failover to other
instance in ASG
• Automated rebuild
of failed instance
• Automated deploy
of most recent code
push to instance
MANUAL AUTOMATED
©2017 Logicworks. All Rights Reserved. 20
Design for Constant Change: Auto Scaling
When to use ASGs?
Availability AND Scalability
Misconceptions about ASGs?
More on this in our Workshop
©2017 Logicworks. All Rights Reserved. 21
Design for Constant Change: Build Process
C. Capacity is Reached
©2017 Logicworks. All Rights Reserved. 22
Design for Constant Change: Automation
• Alert notifies
human
• Human must take
action to rebuild
from AMI or
scratch
• High potential of
downtime
• Failover to other
instance in ASG
• Automated rebuild
of failed instance
• Automated deploy
of most recent code
push to instance
MANUAL AUTOMATED
SAME PROCESS
D. Developers deploy new code
©2017 Logicworks. All Rights Reserved. 23
Design for Constant Change: Automation
• Manual deploy,
high risk of error
• Infrastructure
doesn’t change
• Potential conflict
between
packages,
updates, etc.
• Push-button
deploys
• Containers
• Infrastructure is
tested, too
MANUAL AUTOMATED
Configuration management is your
best friend in the cloud.
©2017 Logicworks. All Rights Reserved. 24
Design for Constant Change: CM
The goal of configuration
management is to create
and maintain system
configurations.
Individual deployments are merely
instances of the template
Proactive correction of misconfigured
resources
Special scanners to monitor for
unusual changes
©2017 Logicworks. All Rights Reserved. 25
Design for Constant Change: Monitoring
Do real-time monitoring with
CloudWatch
Use Simple Notification Service
(SNS) for real-time alarms based on
CloudWatch metrics
AWS CloudTrail
AWS Config
AWS Inspector
Disposable
Infrastructure
©2017 Logicworks. All Rights Reserved.
It is expensive, time-consuming, and often boring
to fix a server.
©2017 Logicworks. All Rights Reserved. 27
Disposable Infrastructure: Core Concepts
So why fix a server when you can throw
it away and build a new one?
©2017 Logicworks. All Rights Reserved. 28
Disposable Infrastructure: Benefits
Infrastructure never strays from initial “known-good” state
You are forced to test the “failure” process, higher certainty of
appropriate failure response
Failure is a routine and continuous way of doing business
However, requires
FULL automation of
instance boot process
©2017 Logicworks. All Rights Reserved. 29
Applications host critical data for 86%
of Fortune 500 enterprises
High potential threat exposure
New application, wanted to test
viability of immutable infrastructure
Custom AWS environment built from
AWS CloudFormation template library
Multiple templates for different projects
and application components
Environment is blown away and rebuilt
many times a day
The entire build-out and bootstrapping
process happens in minutes
True immutable infrastructure
Security-as-code as a service
BACKGROUND:
SOLUTION:
Enterprise Backup
Software Company
Disposable Infrastructure: Case Study
RESULTS:
©2017 Logicworks. All Rights Reserved. 30
0.001% instance failure rate
100% uptime for production application
Single-click deployment to production, without any instance
configuration tasks
No residual impacts from previous failed or passed tests
60% higher deployment efficiency over similar projects within
company
Disposable Infrastructure: Case Study
©2017 Logicworks. All Rights Reserved. 31
Lean IT team
20+ team websites
Transition to microservices and
Docker containers
Custom configuration to host
containers
Automated self-healing and auto
scaling across containers, tasks
• 100% Uptime
• Horizontal and vertical scalability
Deployment automation
• Maintained existing deployment
pipeline with modifications for AWS
BACKGROUND:
SOLUTION:
National Sports
Media Company
Disposable Infrastructure: Case Study
Test Resiliency
©2017 Logicworks. All Rights Reserved.
Empirically prove resiliency
(don’t just assume)
Netflix Chaos Monkey
Exposes unexpected failure
scenarios
©2017 Logicworks. All Rights Reserved. 33
Test Resiliency: Destructive Testing
Security Impact of
Automation
©2017 Logicworks. All Rights Reserved.
©2017 Logicworks. All Rights Reserved. 35
Our Automation Framework
Infrastructure
Buildout
Configuration
Management
Iterative
Deployment
Process
Monitoring
©2017 Logicworks. All Rights Reserved. 36
Security Impact of Automation
① Reduced human error
② Central control
③ Central security configuration standard
④ Improved transparency
⑤ Reduced cost of security upgrades
⑥ Simplified patching
⑦ Happy auditors
Summary
©2017 Logicworks. All Rights Reserved.
If you want to increase resiliency, automate
The ideal is Disposable Infrastructure, but if you do nothing
else, start with configuration management
The same work you do to increase resiliency also increases
scalability, cost efficiency, security (more on this next)
©2017 Logicworks. All Rights Reserved. 38
Summary
©2017 Logicworks. All Rights Reserved. 39
Workshop!
AWS CLOUD SECURITY
Jason Giddens, Manager, Channel
Sales Engineering, Alert Logic
AWS Cloud Security
Agenda:
• Shared Security Model
• What's different in AWS?
• AWS Best Practices
Shared Security Model
Service
Providers
Responsibility
The Good:
 Customers benefit from an environment built for the most security
sensitive organizations
 AWS manages and validates testing against more than 3000
security controls so you don’t have to
 You get to define the right security controls for your workload
sensitivity
 You always have full ownership and control of your data
The Bad: Attackers Are Focused on Your Network, Hosts, and Apps
• Secure coding and best practices
• Software and virtual patching
• Configuration management
• Access management
• Application level attack monitoring
• Access management
• Patch management
• Configuration hardening
• Security monitoring
• Log analysis
• Network threat detection
• Security monitoring
• Logical network segmentation
• Perimeter security services
• External DDoS, spoofing, and scanning prevented
• Hardened hypervisor
• System image library
• Root access for customer
• Configuration
best practices
Service
Providers
Responsibility
Challenges of Security for Hybrid Cloud
- Legacy security tools don’t deploy or work well in the cloud
- Hard to find good security people that ‘get’ cloud
- Different threat surface
Cloud Environment Breaches On Premise
Source: Alert Logic CSR 2016
42%
25%
19%
8%
4% 2%
Application-Attack
Brute-Force
Suspicious Activity
Recon
Trojan-Activity
DOS
18%
51%
22%
3% 5% 1%
Application-Attack
Brute-Force
Suspicious Acitivity
Recon
Trojan-Activity
DOS
5
47
74
89
184
289
277
222
207
571
Denial of Service
Crimeware
Physical Theft / Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Security risk is shifting to unprotected web applications
Web app attacks are now the
#1 source of data breaches
But less than 5% of data center security
budgets are spent on app security
Source: Verizon DBIR 2017
n= 1,935
UP 300% SINCE 2014
$23 to $1
Percentage of Breaches
10% 20% 30%
Source: Gartner
Web App
Attacks
Design for security from Day One
Design for security:
• Role Based IAM
• No root access
• MFA Everywhere (!)
• Encrypt Everywhere (!)
• Keys are like Fruit – they go bad quickly
Visibility
Visibility:
• CloudTrail
• Log Review
• 3rd Party Review
Trust No One / Automate
Trust No One
• Least Privilege Model
• Only what you need, nothing more.
• Strict EC2 Roles
Automate:
• Cattle not Pets
• Be Immutable
Use the Tools
Amazon provides high quality security controls:
• VPC
• Code Deploy
• Cloud Formation Templates
• CloudFront
• Route 53
• AWS KMS
• Amazon Inspector
• AWS Config
• …. More
Leaders
28
8
6
4
10
25
3
5
5
11
8
10
15
24
Other
Amazon
Check Point
Chronicle Data
Cisco
Fortinet
Intel Security
Okta
Symantec
Barricade
JumpCloud
Evident.io
Palerra
Microsoft
CloudPassage
CloudCheckr
FortyCloud
ThreatStack
Alert Logic
A recognized security leader
“Alert Logic has a
head start in the cloud,
and it shows.”
PETER STEPHENSON
SC Magazine review
“…the depth and breadth
of the offering’s analytics
and threat management
process goes beyond
anything we’ve seen…”Who is your primary
in-use vendor for Cloud
Infrastructure Security?
Who are the top vendors
in consideration for Cloud
Infrastructure Security?
Alert Logic
Best Practices and Policies for Improving TCO
of Your AWS Environment
Presenter:
• Bob Kilbride, Director of Channel Sales, CloudHealth Technologies
June 2017
53 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
TCO: The Total Picture
54 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Optimization
Standardization
Consolidation
Novice
55 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Novice
• Unpredictable AWS expenses.
• Nagging sense of waste.
• No standards for security.
• Lack of automation.
• Limited or no monitoring.
• Little or no usage of cost optimization.
• Little or no usage of elasticity.
56 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
Prescription for Success
Novice
 Gain visibility
 Leverage basic cost
optimizations
57 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Consolidation
• Unclear ROI.
• Unsure of best instance types for you.
• Unable to determine cost per business group.
• No change control.
• Little or no understanding of the different workloads
you operate in the cloud.
58 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
Prescription for Success
Consolidation
 Align cost and usage to business
 Remove obsolete infrastructure
 Tighten security policies
 Leverage elasticity
 Standardize on system of record
 Raise stakeholder cloud IQ
59 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Standardization
• Unsure of best configuration for workloads.
• Lack of plan for availability/reliability process.
• Lack of continuous optimization.
• Lack of data driven operating requirements.
• Lack of supporting people/roles.
60 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
Prescription for Success
Standardization
 Continuously monitor workloads.
 Continuously standardize workloads.
 Adopt continuous monitoring.
 Adopt continuous optimization
process.
 Automate optimization.
 Assign people/roles.
61 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Optimization
• Full transparency
• Reference architectures.
• Documented policies.
• Continuous optimization process.
• Continuous monitoring.
• Automated optimization.
• Clear roles and responsibilities.
• Forecasting / ”What if” analysis.
• High availability / Reliability.
62 © 2017 CLOUDHEALTH
®
TECHNOLOGIES I NC.
How do you know where you are?
Optimization
You’ve achieved
cloud success!
Lunch!
©2017 Logicworks. All Rights Reserved.
RESOURCES:
1. Secrets of Cloud Leaders
Some companies are cloud trailblazers - reaping greater business benefits from their cloud deployment.
What are they doing differently? Download the “Secrets of the Cloud Leaders” survey report to read the
findings and learn how cloud leaders achieve success.
2. 9 Considerations For Securing Web Apps in the Cloud
Securing your applications in AWS requires consistently applying the right security practices, so you can
avoid delays in application development—and grow your business. Download this guide to review the do’s
and don’ts in cloud security.
(https://www.alertlogic.com/resources/whitepapers/read-this-guide-rethink-web-application-security/).
3. DevOps on AWS eBook
In this eBook, learn how to improve operations on the AWS cloud and deploy applications in a rapid,
repeatable, and reliable manner with automation. Download here (http://go.logicworks.net/devops-on-aws-
cloud-ebook).

More Related Content

What's hot

AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & HybridAWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
Amazon Web Services
 

What's hot (20)

The Application Server Platform of the Future - Container & Cloud Native and ...
The Application Server Platform of the Future - Container & Cloud Native and ...The Application Server Platform of the Future - Container & Cloud Native and ...
The Application Server Platform of the Future - Container & Cloud Native and ...
 
Cloud and Enterprise Tools – Rob Purdy, General Manager, Datacom
Cloud and Enterprise Tools – Rob Purdy, General Manager, DatacomCloud and Enterprise Tools – Rob Purdy, General Manager, Datacom
Cloud and Enterprise Tools – Rob Purdy, General Manager, Datacom
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
Netflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open SourceNetflix Cloud Architecture and Open Source
Netflix Cloud Architecture and Open Source
 
Cloud Native Operations
Cloud Native OperationsCloud Native Operations
Cloud Native Operations
 
Top 10 DevOps Areas Need To Focus
Top 10 DevOps Areas Need To FocusTop 10 DevOps Areas Need To Focus
Top 10 DevOps Areas Need To Focus
 
DockerCon EU 2017 - Containers are not just for microservices
DockerCon EU 2017 - Containers are not just for microservicesDockerCon EU 2017 - Containers are not just for microservices
DockerCon EU 2017 - Containers are not just for microservices
 
FLUX - Crash Course in Cloud 2.0
FLUX - Crash Course in Cloud 2.0 FLUX - Crash Course in Cloud 2.0
FLUX - Crash Course in Cloud 2.0
 
Automating Cloud Operations: Tips from Managed Services
Automating Cloud Operations: Tips from Managed ServicesAutomating Cloud Operations: Tips from Managed Services
Automating Cloud Operations: Tips from Managed Services
 
Kubernetes DevOps - Atul - Microsoft - CC18
Kubernetes DevOps - Atul - Microsoft - CC18Kubernetes DevOps - Atul - Microsoft - CC18
Kubernetes DevOps - Atul - Microsoft - CC18
 
Webinar_DevOps_Nov10_D2
Webinar_DevOps_Nov10_D2Webinar_DevOps_Nov10_D2
Webinar_DevOps_Nov10_D2
 
Microsoft: Invent with Purpose
Microsoft: Invent with PurposeMicrosoft: Invent with Purpose
Microsoft: Invent with Purpose
 
Kubo (Cloud Foundry Container Platform): Your Gateway Drug to Cloud-native
Kubo (Cloud Foundry Container Platform): Your Gateway Drug to Cloud-nativeKubo (Cloud Foundry Container Platform): Your Gateway Drug to Cloud-native
Kubo (Cloud Foundry Container Platform): Your Gateway Drug to Cloud-native
 
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & HybridAWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
AWS Summit Tel Aviv - Enterprise Track - Enterprise Apps & Hybrid
 
Continuous Deployment Strategies
Continuous Deployment StrategiesContinuous Deployment Strategies
Continuous Deployment Strategies
 
20 mins to Faking the DevOps Unicorn by Matt williams, Datadog
20 mins to Faking the DevOps Unicorn by Matt williams, Datadog20 mins to Faking the DevOps Unicorn by Matt williams, Datadog
20 mins to Faking the DevOps Unicorn by Matt williams, Datadog
 
Intro - Cloud Native
Intro - Cloud NativeIntro - Cloud Native
Intro - Cloud Native
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash Storage
 
The Elephant in the Cloud: Bring True Cloud Economics to Hadoop/BigInsights
The Elephant in the Cloud:  Bring True Cloud Economics to Hadoop/BigInsightsThe Elephant in the Cloud:  Bring True Cloud Economics to Hadoop/BigInsights
The Elephant in the Cloud: Bring True Cloud Economics to Hadoop/BigInsights
 

Similar to How to Architect AWS for Mission-Critical Applications

Similar to How to Architect AWS for Mission-Critical Applications (20)

Docker vs. Kubernetes vs. Serverless
Docker vs. Kubernetes vs. ServerlessDocker vs. Kubernetes vs. Serverless
Docker vs. Kubernetes vs. Serverless
 
Pivotal Container Service (PKS) at SF Cloud Foundry Meetup
Pivotal Container Service (PKS) at SF Cloud Foundry MeetupPivotal Container Service (PKS) at SF Cloud Foundry Meetup
Pivotal Container Service (PKS) at SF Cloud Foundry Meetup
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
DevOps Case Studies
DevOps Case StudiesDevOps Case Studies
DevOps Case Studies
 
It summit 2014_migrating_applications_to_the_cloud-5
It summit 2014_migrating_applications_to_the_cloud-5It summit 2014_migrating_applications_to_the_cloud-5
It summit 2014_migrating_applications_to_the_cloud-5
 
Adobe Advertising Cloud: The Reality of Cloud Bursting with OpenStack
Adobe Advertising Cloud: The Reality of Cloud Bursting with OpenStackAdobe Advertising Cloud: The Reality of Cloud Bursting with OpenStack
Adobe Advertising Cloud: The Reality of Cloud Bursting with OpenStack
 
Cloudify 6 Webinar
Cloudify 6 WebinarCloudify 6 Webinar
Cloudify 6 Webinar
 
HBaseCon2017 Splice Machine as a Service: Multi-tenant HBase using DCOS (Meso...
HBaseCon2017 Splice Machine as a Service: Multi-tenant HBase using DCOS (Meso...HBaseCon2017 Splice Machine as a Service: Multi-tenant HBase using DCOS (Meso...
HBaseCon2017 Splice Machine as a Service: Multi-tenant HBase using DCOS (Meso...
 
Using Blueprints to Overcome Multi-speed IT Challenges
Using Blueprints to Overcome Multi-speed IT ChallengesUsing Blueprints to Overcome Multi-speed IT Challenges
Using Blueprints to Overcome Multi-speed IT Challenges
 
Best of re:Invent 2016 meetup presentation
Best of re:Invent 2016 meetup presentationBest of re:Invent 2016 meetup presentation
Best of re:Invent 2016 meetup presentation
 
AWS Workshop Series: Microsoft licensing and active directory on AWS
AWS Workshop Series: Microsoft licensing and active directory on AWSAWS Workshop Series: Microsoft licensing and active directory on AWS
AWS Workshop Series: Microsoft licensing and active directory on AWS
 
DevOps LA Meetup Intro to Habitat
DevOps LA Meetup Intro to HabitatDevOps LA Meetup Intro to Habitat
DevOps LA Meetup Intro to Habitat
 
How a National Transportation Software Provider Migrated a Mission-Critical T...
How a National Transportation Software Provider Migrated a Mission-Critical T...How a National Transportation Software Provider Migrated a Mission-Critical T...
How a National Transportation Software Provider Migrated a Mission-Critical T...
 
Architecture: When, how, and if to Adopt Microservices
Architecture: When, how, and if to Adopt MicroservicesArchitecture: When, how, and if to Adopt Microservices
Architecture: When, how, and if to Adopt Microservices
 
AWS Workloads on AWS
AWS Workloads on AWSAWS Workloads on AWS
AWS Workloads on AWS
 
Enterprise Cloud Platform - Keynote
Enterprise Cloud Platform - KeynoteEnterprise Cloud Platform - Keynote
Enterprise Cloud Platform - Keynote
 
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
GPSWKS404-GPS Game Changing C2S Services To Transform Your Customers Speed To...
 
Containerizing couchbase with microservice architecture on mesosphere.pptx
Containerizing couchbase with microservice architecture on mesosphere.pptxContainerizing couchbase with microservice architecture on mesosphere.pptx
Containerizing couchbase with microservice architecture on mesosphere.pptx
 
Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?
 
The Fastest Way to Redis on Pivotal Cloud Foundry
The Fastest Way to Redis on Pivotal Cloud FoundryThe Fastest Way to Redis on Pivotal Cloud Foundry
The Fastest Way to Redis on Pivotal Cloud Foundry
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

How to Architect AWS for Mission-Critical Applications

  • 1. ©2017 Logicworks. All Rights Reserved. 1 Today’s Agenda 9:30-10am: How to Architect for High Availability 10:45-11:30am: Workshop: Working with Elastic Load Balancing: https://www.qwiklabs.com/focuses/3441?locale=en 11:30-12pm: How to Architect for Security and Cost 12-12:30pm: Lunch & Q&A
  • 2. How to Architect for Mission- Critical Applications Phil Christensen Senior Solutions Architect Logicworks www.logicworks.net ©2017 Logicworks. All Rights Reserved.
  • 3. About Logicworks ©2017 Logicworks. All Rights Reserved. 3 Cloud Strategy & Migration Managed Cloud Cloud Security DevOps Automation We design, build, automate, and manage enterprise clouds.
  • 4. How to Architect for Mission-Critical Applications High Availability Phil Christensen Senior Solutions Architect Logicworks www.logicworks.net ©2017 Logicworks. All Rights Reserved.
  • 5. ©2017 Logicworks. All Rights Reserved. 5 How to Improve Availability Throw people and money at availability problems: • Buy better hardware • Buy DR • 24/7 NOC team Develop smarter software to control your cloud: • Design for failure • Automate! OLD WORLD AWS CLOUD
  • 6. ① Design for failure ② Design for constant change ③ Disposable infrastructure ④ Destructive testing ©2017 Logicworks. All Rights Reserved. 6 Principles of Cloud HA
  • 7. Design for Failure ©2017 Logicworks. All Rights Reserved.
  • 8. AWS already gives you the tools for high availability…  Availability Zones and Regions  99.99% EC2 Reliability  Built-in Reliability with Services like RDS  AWS Auto Scaling  Lower Cost Disaster Recovery ©2017 Logicworks. All Rights Reserved. 8 Design for Failure: Foundation
  • 9. Assume everything fails and work backwards Applications should continue to function even if the underlying physical hardware fails or is removed/replaced When, not if, an individual component fails, the application does not fail ©2017 Logicworks. All Rights Reserved. 9 Design for Failure: Core Concepts “Everything fails, all the time.” Werner Vogels, CTO Amazon.com
  • 10. Design for Failure: Foundation Let’s start from Day 1, User 1: • Amazon Route 53 for DNS • A single Elastic IP • A single Amazon EC2 instance  With full stack on this host:  Web app  Database  Management  And so on… Amazon EC2 instance Elastic IP User Amazon Route 53 10
  • 11. Design for Failure: Foundation • We could potentially get to a few hundred to a few thousand depending on application complexity and traffic, but… • No failover • No redundancy • Too many eggs in one basket 11 Amazon EC2 instance Elastic IP User Amazon Route 53
  • 12. Design for Failure: Foundation First, let’s separate out our single host into more than one: • Web • Improve scaling capabilities • Database • Make your life easier: use RDS Web instance Elastic IP RDS DB instance User Amazon Route 53 12
  • 13. Design for Failure: Foundation Next, let’s address our lack of failover and redundancy issues: Add another web instance  Use a different Availability Zone RDS Multi-AZ deployment Elastic Load Balancing (ELB) Web Instance RDS DB Instance Active (Multi-AZ) Availability Zone Availability Zone Web Instance RDS DB Instance Standby (Multi-AZ) ELB Balancer 13
  • 14. Design for Failure: Foundation Best Practices Use multiple Availability Zones Use Elastic Load Balancing Configure CloudWatch alerts for real-time monitoring Consider cross-region replication of crucial data using read replicas Web Instance RDS DB Instance Active (Multi-AZ) Availability Zone Availability Zone Web Instance RDS DB Instance Standby (Multi-AZ) ELB Balancer 14
  • 15. Design for Constant Change ©2017 Logicworks. All Rights Reserved. 15
  • 16. Changes we must prepare for: A. Updates to infrastructure or instance configurations B. Instance or component failure C. Changing capacity requirements D. Ongoing development of custom software ©2017 Logicworks. All Rights Reserved. 16 Design for Constant Change
  • 17. The key to changing your infrastructure frequently and securely is automation. ©2017 Logicworks. All Rights Reserved. 17 Design for Constant Change: Automation Infrastructure Buildout Configuration Management Iterative Deployment Process Monitoring
  • 18. A. Engineers want to change infrastructure ©2017 Logicworks. All Rights Reserved. 18 Design for Constant Change: Automation • Human error • High risk of change • Slow • Hours or days of engineering time • Can’t rollback • Change code, not servers • Can be rolled back • Affects all instances • Every server maintains ideal configuration MANUAL AUTOMATED
  • 19. B. Instance or component failure ©2017 Logicworks. All Rights Reserved. 19 Design for Constant Change: Automation • Alert notifies human • Human must take action to rebuild from AMI or scratch • High potential of downtime • Failover to other instance in ASG • Automated rebuild of failed instance • Automated deploy of most recent code push to instance MANUAL AUTOMATED
  • 20. ©2017 Logicworks. All Rights Reserved. 20 Design for Constant Change: Auto Scaling When to use ASGs? Availability AND Scalability Misconceptions about ASGs? More on this in our Workshop
  • 21. ©2017 Logicworks. All Rights Reserved. 21 Design for Constant Change: Build Process
  • 22. C. Capacity is Reached ©2017 Logicworks. All Rights Reserved. 22 Design for Constant Change: Automation • Alert notifies human • Human must take action to rebuild from AMI or scratch • High potential of downtime • Failover to other instance in ASG • Automated rebuild of failed instance • Automated deploy of most recent code push to instance MANUAL AUTOMATED SAME PROCESS
  • 23. D. Developers deploy new code ©2017 Logicworks. All Rights Reserved. 23 Design for Constant Change: Automation • Manual deploy, high risk of error • Infrastructure doesn’t change • Potential conflict between packages, updates, etc. • Push-button deploys • Containers • Infrastructure is tested, too MANUAL AUTOMATED
  • 24. Configuration management is your best friend in the cloud. ©2017 Logicworks. All Rights Reserved. 24 Design for Constant Change: CM The goal of configuration management is to create and maintain system configurations. Individual deployments are merely instances of the template Proactive correction of misconfigured resources Special scanners to monitor for unusual changes
  • 25. ©2017 Logicworks. All Rights Reserved. 25 Design for Constant Change: Monitoring Do real-time monitoring with CloudWatch Use Simple Notification Service (SNS) for real-time alarms based on CloudWatch metrics AWS CloudTrail AWS Config AWS Inspector
  • 27. It is expensive, time-consuming, and often boring to fix a server. ©2017 Logicworks. All Rights Reserved. 27 Disposable Infrastructure: Core Concepts So why fix a server when you can throw it away and build a new one?
  • 28. ©2017 Logicworks. All Rights Reserved. 28 Disposable Infrastructure: Benefits Infrastructure never strays from initial “known-good” state You are forced to test the “failure” process, higher certainty of appropriate failure response Failure is a routine and continuous way of doing business However, requires FULL automation of instance boot process
  • 29. ©2017 Logicworks. All Rights Reserved. 29 Applications host critical data for 86% of Fortune 500 enterprises High potential threat exposure New application, wanted to test viability of immutable infrastructure Custom AWS environment built from AWS CloudFormation template library Multiple templates for different projects and application components Environment is blown away and rebuilt many times a day The entire build-out and bootstrapping process happens in minutes True immutable infrastructure Security-as-code as a service BACKGROUND: SOLUTION: Enterprise Backup Software Company Disposable Infrastructure: Case Study
  • 30. RESULTS: ©2017 Logicworks. All Rights Reserved. 30 0.001% instance failure rate 100% uptime for production application Single-click deployment to production, without any instance configuration tasks No residual impacts from previous failed or passed tests 60% higher deployment efficiency over similar projects within company Disposable Infrastructure: Case Study
  • 31. ©2017 Logicworks. All Rights Reserved. 31 Lean IT team 20+ team websites Transition to microservices and Docker containers Custom configuration to host containers Automated self-healing and auto scaling across containers, tasks • 100% Uptime • Horizontal and vertical scalability Deployment automation • Maintained existing deployment pipeline with modifications for AWS BACKGROUND: SOLUTION: National Sports Media Company Disposable Infrastructure: Case Study
  • 32. Test Resiliency ©2017 Logicworks. All Rights Reserved.
  • 33. Empirically prove resiliency (don’t just assume) Netflix Chaos Monkey Exposes unexpected failure scenarios ©2017 Logicworks. All Rights Reserved. 33 Test Resiliency: Destructive Testing
  • 34. Security Impact of Automation ©2017 Logicworks. All Rights Reserved.
  • 35. ©2017 Logicworks. All Rights Reserved. 35 Our Automation Framework Infrastructure Buildout Configuration Management Iterative Deployment Process Monitoring
  • 36. ©2017 Logicworks. All Rights Reserved. 36 Security Impact of Automation ① Reduced human error ② Central control ③ Central security configuration standard ④ Improved transparency ⑤ Reduced cost of security upgrades ⑥ Simplified patching ⑦ Happy auditors
  • 37. Summary ©2017 Logicworks. All Rights Reserved.
  • 38. If you want to increase resiliency, automate The ideal is Disposable Infrastructure, but if you do nothing else, start with configuration management The same work you do to increase resiliency also increases scalability, cost efficiency, security (more on this next) ©2017 Logicworks. All Rights Reserved. 38 Summary
  • 39. ©2017 Logicworks. All Rights Reserved. 39 Workshop!
  • 40. AWS CLOUD SECURITY Jason Giddens, Manager, Channel Sales Engineering, Alert Logic
  • 41. AWS Cloud Security Agenda: • Shared Security Model • What's different in AWS? • AWS Best Practices
  • 43. The Good:  Customers benefit from an environment built for the most security sensitive organizations  AWS manages and validates testing against more than 3000 security controls so you don’t have to  You get to define the right security controls for your workload sensitivity  You always have full ownership and control of your data
  • 44. The Bad: Attackers Are Focused on Your Network, Hosts, and Apps • Secure coding and best practices • Software and virtual patching • Configuration management • Access management • Application level attack monitoring • Access management • Patch management • Configuration hardening • Security monitoring • Log analysis • Network threat detection • Security monitoring • Logical network segmentation • Perimeter security services • External DDoS, spoofing, and scanning prevented • Hardened hypervisor • System image library • Root access for customer • Configuration best practices Service Providers Responsibility
  • 45. Challenges of Security for Hybrid Cloud - Legacy security tools don’t deploy or work well in the cloud - Hard to find good security people that ‘get’ cloud - Different threat surface Cloud Environment Breaches On Premise Source: Alert Logic CSR 2016 42% 25% 19% 8% 4% 2% Application-Attack Brute-Force Suspicious Activity Recon Trojan-Activity DOS 18% 51% 22% 3% 5% 1% Application-Attack Brute-Force Suspicious Acitivity Recon Trojan-Activity DOS
  • 46. 5 47 74 89 184 289 277 222 207 571 Denial of Service Crimeware Physical Theft / Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Security risk is shifting to unprotected web applications Web app attacks are now the #1 source of data breaches But less than 5% of data center security budgets are spent on app security Source: Verizon DBIR 2017 n= 1,935 UP 300% SINCE 2014 $23 to $1 Percentage of Breaches 10% 20% 30% Source: Gartner Web App Attacks
  • 47. Design for security from Day One Design for security: • Role Based IAM • No root access • MFA Everywhere (!) • Encrypt Everywhere (!) • Keys are like Fruit – they go bad quickly
  • 48. Visibility Visibility: • CloudTrail • Log Review • 3rd Party Review
  • 49. Trust No One / Automate Trust No One • Least Privilege Model • Only what you need, nothing more. • Strict EC2 Roles Automate: • Cattle not Pets • Be Immutable
  • 50. Use the Tools Amazon provides high quality security controls: • VPC • Code Deploy • Cloud Formation Templates • CloudFront • Route 53 • AWS KMS • Amazon Inspector • AWS Config • …. More
  • 51. Leaders 28 8 6 4 10 25 3 5 5 11 8 10 15 24 Other Amazon Check Point Chronicle Data Cisco Fortinet Intel Security Okta Symantec Barricade JumpCloud Evident.io Palerra Microsoft CloudPassage CloudCheckr FortyCloud ThreatStack Alert Logic A recognized security leader “Alert Logic has a head start in the cloud, and it shows.” PETER STEPHENSON SC Magazine review “…the depth and breadth of the offering’s analytics and threat management process goes beyond anything we’ve seen…”Who is your primary in-use vendor for Cloud Infrastructure Security? Who are the top vendors in consideration for Cloud Infrastructure Security? Alert Logic
  • 52. Best Practices and Policies for Improving TCO of Your AWS Environment Presenter: • Bob Kilbride, Director of Channel Sales, CloudHealth Technologies June 2017
  • 53. 53 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. TCO: The Total Picture
  • 54. 54 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Optimization Standardization Consolidation Novice
  • 55. 55 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Novice • Unpredictable AWS expenses. • Nagging sense of waste. • No standards for security. • Lack of automation. • Limited or no monitoring. • Little or no usage of cost optimization. • Little or no usage of elasticity.
  • 56. 56 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. Prescription for Success Novice  Gain visibility  Leverage basic cost optimizations
  • 57. 57 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Consolidation • Unclear ROI. • Unsure of best instance types for you. • Unable to determine cost per business group. • No change control. • Little or no understanding of the different workloads you operate in the cloud.
  • 58. 58 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. Prescription for Success Consolidation  Align cost and usage to business  Remove obsolete infrastructure  Tighten security policies  Leverage elasticity  Standardize on system of record  Raise stakeholder cloud IQ
  • 59. 59 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Standardization • Unsure of best configuration for workloads. • Lack of plan for availability/reliability process. • Lack of continuous optimization. • Lack of data driven operating requirements. • Lack of supporting people/roles.
  • 60. 60 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. Prescription for Success Standardization  Continuously monitor workloads.  Continuously standardize workloads.  Adopt continuous monitoring.  Adopt continuous optimization process.  Automate optimization.  Assign people/roles.
  • 61. 61 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Optimization • Full transparency • Reference architectures. • Documented policies. • Continuous optimization process. • Continuous monitoring. • Automated optimization. • Clear roles and responsibilities. • Forecasting / ”What if” analysis. • High availability / Reliability.
  • 62. 62 © 2017 CLOUDHEALTH ® TECHNOLOGIES I NC. How do you know where you are? Optimization You’ve achieved cloud success!
  • 63. Lunch! ©2017 Logicworks. All Rights Reserved. RESOURCES: 1. Secrets of Cloud Leaders Some companies are cloud trailblazers - reaping greater business benefits from their cloud deployment. What are they doing differently? Download the “Secrets of the Cloud Leaders” survey report to read the findings and learn how cloud leaders achieve success. 2. 9 Considerations For Securing Web Apps in the Cloud Securing your applications in AWS requires consistently applying the right security practices, so you can avoid delays in application development—and grow your business. Download this guide to review the do’s and don’ts in cloud security. (https://www.alertlogic.com/resources/whitepapers/read-this-guide-rethink-web-application-security/). 3. DevOps on AWS eBook In this eBook, learn how to improve operations on the AWS cloud and deploy applications in a rapid, repeatable, and reliable manner with automation. Download here (http://go.logicworks.net/devops-on-aws- cloud-ebook).

Editor's Notes

  1. The ability to maintain state and versioning and treat your infrastructure as an application State Machine & Versioned & an essential part of the deployment process (every time you deploy code, deploying your infrastructure is a critical part of that) vs. Scripted / One-off What is NOT infrastructure as code: Just a way to quickly script an environment
  2. This here is the most basic set up you would need to serve up a web application. Any user would first hit Route53 for DNS resolution. Behind the DNS service is an EC2 instance running our webapp and database on a single server, We will need to attach an Elastic IP so Route53 can direct traffic to our webstack at that IP Address with an A record. To scale this infrastructure, the only real option we have is to get a bigger EC2 instance…
  3. So while we could reach potentially a few hundred or few thousand users supported by this single instance, its not a long term play.
  4. So for this scenario today and based upon our discussion, we’re going to go with RDS and MYSQL as our database engine.
  5. Next up we need to address the lack of failover and redundancy in our infrastructure. We’re going to do this by adding in another webapp instance, and enabling the Multi-AZ feature of RDS, which will give us a standby instance in a different AZ from the Primary. We’re also going to replace our EIP with an Elastic Load Balancer to share the load between our two web instances Now we have an app that is a bit more scalable and has some fault tolerance built in as well.
  6. Talking Points Examples for each layer
  7. Attackers are wising up to the fact that businesses are not aware of the extent of their responsibilities – some of which may be beyond their existing capabilities They are focusing their attention on the areas that fall to the customer to address, in particular the web application layer where we have see a large increase in the number of targeted attacks **insert banner with Cloud Security report stats**
  8. Web application attacks were the #1 attack vector causing data breaches, tripling as a proportion of all breaches from 9.4% to 30% from 2014-2017. – ( Verizon 2017 ). These stats are reflected in Alert Logic, where application attacks comprise the Top 5 attacks seen in the SOC – averaging 72% of all attacks across our customer base. Yet, businesses today are spending less than 5% of their security budgets protecting these valuable assets. (Gartner) Discovery: - About how many web applications do you run, whether on premises or in the cloud? - Which web applications would most impact your business if they were breached? - What other applications are you hosting in cloud environments that should be considered?
  9. Industry analysts and influencers including Gartner, Forrester, 451 Group and SC Magazine have continually applauded and recognized our leadership position in protecting cloud application workloads. 451 is interesting – they just asked companies who they were using for cloud infrastructure security, and without prompting we topped the list. Gartner Magic Quadrants and Forrester Waves are either about software vendors or managed services vendors so our unique combination doesn’t fit perfectly in either one. But Forrester believes strongly enough in our combined approach that they placed us into their MSSP Wave where they credit us with having the strongest offering due to our cloud expertise, customer satisfaction, and usability. While we aren’t the traditional MSSP, Forrester’s ranking us as the leading MSSP the first year we were evaluated is a strong testament to the value of our approach and innovation. Discovery: Have you considered any of these service or tool-only vendors for cloud application workload security?
  10. To apply these pillars, you really need to look holistically at cost management. Consider – security, availability, performance and usage Analyze cost by business groups Evaluate workloads for migration Rightsize existing infrastructure Invest in Reserved Instances Implement good governance – tagging, decommission what’s not needed lights on / lights off Automation where possible
  11. Pyramid – with 4 sections add the content from each phase to each corresponding section.
  12. Pyramid – with 4 sections add the content from each phase to each corresponding section. One slide w/ signs, next w/ prescription
  13. Pyramid – with 4 sections add the content from each phase to each corresponding section. One slide w/ signs, next w/ prescription Gain visibility Leverage basic cost optimizations
  14. Pyramid – with 4 sections add the content from each phase to each corresponding section.
  15. Pyramid – with 4 sections add the content from each phase to each corresponding section. Align cost and usage to business Remove obsolete infrastructure Tighten security policies Leverage elasticity Standardize on tool Raise stakeholder cloud IQ
  16. Pyramid – with 4 sections add the content from each phase to each corresponding section.
  17. Pyramid – with 4 sections add the content from each phase to each corresponding section. Continuously monitor workloads Continuously standardize workloads Adopt continuous monitoring. Adopt continuous optimization process. Automate optimization Assign people/roles.
  18. Pyramid – with 4 sections add the content from each phase to each corresponding section.
  19. Pyramid – with 4 sections add the content from each phase to each corresponding section.