SlideShare a Scribd company logo
1 of 30
Download to read offline
Boost produktivitet med
AWS Well-Architected
Håkon Eriksen DRANGE
Principal Cloud Architect
AWS Well-Architected Program Lead - Sopra Steria Group
2
C2 - Restricted use
Bilde © https://aws.amazon.com/blogs/enterprise-strategy/go-faster-but-how-how-mapping-your-product-development-process-can-help-you-build-a-high-performing-organization/
3
C2 - Restricted use
In today’s era of volatility, there is no other way but to re-invent.
The only sustainable advantage you can have over others is
agility, that’s it.
Because nothing else is sustainable, everything else you create,
somebody else will replicate.
You can’t feel disruption until it’s too late!
Jeff Bezos
Grunnlegger av Amazon
Bilde © thetimes.co.uk
Kilde: https://aws.amazon.com/executive-insights/content/cloud-for-ceos/
4
C2 - Restricted use
Hørt det før?
5
C2 - Restricted use
5
• .. kan vi klare å tilpasse oss nye
krav og behov, raskere?
• .. kan vi få redusere lead time?
• .. kan vi unngå å finne opp
hjulet på nytt i hvert DevOps
team?
Hvordan
6
C2 - Restricted use
• Verktøy for å utvikle skyløsninger i henhold til beste praksis
• Hjelper deg å evaluere arkitektur - systematisk
• Kan gi deg sikrere, mer skalerbare og kostnadseffektive løsninger
• Input til produktbacklogprioritering
• Idé og designfase
• Før produksjonssetting
• Ved omfattende endringer
AWS Well-Architected Framework
«WAF»
Kilder: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/
https://aws.amazon.com/blogs/architecture/accelerating-well-architected-framework-reviews-using-integrated-aws-trusted-advisor-insights/
7
C2 - Restricted use
Introduction to Well-Architected
Kilde: https://aws.amazon.com/blogs/architecture/announcing-updates-to-the-aws-well-architected-framework/
8
C2 - Restricted use
AWS Well-Architected Framework pillarer
Operational Excellence Reliability
The ability for taking advantage of cloud
technologies to protect data, systems, and
assets in a way that can improve your security
posture.
The ability to support development and run
workloads effectively, gain insight into their
operations, and to continuously improve
supporting processes and procedures to deliver
business value.
The ability of a workload to perform its
intended function correctly and consistently
when it’s expected to.
Security
Performance Efficiency Sustainability
The ability to run systems to deliver business
value at the lowest price point.
The ability to use computing resources
efficiently to meet system requirements, and to
maintain that efficiency as demand changes
and technologies evolve.
The ability to continually improve sustainability
impacts by reducing energy consumption and
increasing efficiency across all components of a
workload by maximizing the benefits from the
provisioned resources and minimizing the total
resources required.
Cost Optimization
9
C2 - Restricted use
Well-Architected Framework Review (WAFR)
Hovedformål: Identifisere forbedringspotensialer for sluttbrukere eller organisasjonen
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/
10
C2 - Restricted use
Well-Architected Framework Review (WAFR)
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/
11
C2 - Restricted use
AWS Well-Architected Tool
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
12
C2 - Restricted use
• Kategorier med spørsmål
• Spørsmål med beste praksis anbefalinger.
• Hver beste praksis anbefaling har teknisk implementasjonsveiledning
Struktur
AWS Well-Architected Framework
13
C2 - Restricted use
Any workload that has some form of network connectivity, whether it’s the internet or a private network, requires multiple layers of
defense to help protect from external and internal network-based threats.
Users, both in your workforce and your customers, can be located anywhere.
You need to pivot from traditional models of trusting anyone and anything that has access to your network.
When you follow the principle of applying security at all layers, you employ a Zero Trust approach.
Zero Trust security is a model where application components or microservices are considered discrete from each other and no
component or microservice trusts any other.
Security Pillar – Infrastructure protection
SEC 5: How do you protect your network resources?
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-networks.html
14
C2 - Restricted use
Beste praksis
1. SEC05-BP01 Create network layers
2. SEC05-BP02 Control traffic at all layers
3. SEC05-BP03 Automate network protection
4. SEC05-BP04 Implement inspection and protection
Security Pillar
SEC 5: How do you protect your network resources?
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-networks.html
15
C2 - Restricted use
A reliable workload starts with upfront design decisions for both software and infrastructure.
Your architecture choices will impact your workload behavior across all of the Well-Architected pillars. For reliability,
there are specific patterns you must follow.
The following questions focus on these considerations for reliability:
REL 3: How do you design your workload service architecture?
REL 4: How do you design interactions in a distributed system to prevent failures?
REL 5: How do you design interactions in a distributed system to mitigate or withstand failures?
Reliability Pillar – Workload architecture
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/workload-architecture.html
16
C2 - Restricted use
Reliability Pillar – Workload architecture
REL03-BP01 Choose how to segment your workload
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_service_architecture_monolith_soa_microservice.html
17
C2 - Restricted use
Domain Driven Design
Reliability Pillar – Workload architecture
REL03-BP02 Build services focused on specific business domains and functionality
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_service_architecture_business_domains.html
18
C2 - Restricted use
Reliability Pillar – Fault isolation
REL10-BP01 Deploy the workload to multiple locations
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_fault_isolation_multiaz_region_system.html
19
C2 - Restricted use
Reliability Pillar – Workload architecture
REL11-BP05 Use static stability to prevent bimodal behavior
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_withstand_component_failures_static_stability.html
20
C2 - Restricted use
The economic benefits of just-in-time supply should be balanced against the need to provision to account for resource
failures, high availability, and provision time.
Depending on whether your demand is fixed or variable, plan to create metrics and automation that will ensure that
management of your environment is minimal – even as you scale.
Beste praksis:
1. COST09-BP01 Perform an analysis on the workload demand
2. COST09-BP02 Implement a buffer or throttle to manage demand
3. COST09-BP03 Supply resources dynamically
Cost Optimization Pillar – Manage demand and supply resources
COST 9: How do you manage demand, and supply resources?
Kilde: https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/manage-demand-and-supply-resources.html
21
C2 - Restricted use
AWS Well-Architected Tool - Resultatanalyse
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
22
C2 - Restricted use
AWS Well-Architected Tool - Resultatanalyse
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
23
C2 - Restricted use
AWS Well-Architected Tool - Prioritering
Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
24
C2 - Restricted use
Raskere utvikling og lansering
• Redusere “brannslukking”
• Identifisere
kapasitetsutfordringer
• Bruke automatisering til å
eksperimentere
• Realisere verdi oftere
Håndtere risiko
• Få innsikt i hvilke områder i
arkitekturen som kan innebære
risiko
• Adressere risiko før eventuell
negativ påvirkning på
virksomheten
Databaserte beslutninger
• Skape bevissthet om hvordan
arkitekturvalg og avveininger kan
ha ulike konsekvenser
• Mulighetsrom på kort og lang sikt
• Knyttet til forretningsmål
Well-Architected verktøykassen
Hjelper DevOps team med
Lær AWS beste praksis
• Gjøre team kjent med beste
praksis basert på tusenvis av
historiske gjennomganger
25
C2 - Restricted use
Kilde: Sopra Steria Group - Modern Architecture Best Practices
25
Sopra Steria Group hyperscaler Well-Architected program
Detection
Internal or customer workloads
▪ Prospection
▪ Pre-sales activities / Cloud
Architecture High-Level Definition
▪ Project launch / Cloud Architecture
Low-Level Definition and implementation
▪ Incident/Problem Review
▪ Regular basis, all along the project
lifecycle / Major update or milestone,
Renewal preparation, Innovation
Committee preparation
1 2
Well-Architected Review
3
4
Registration Review Execution
Project Delivery – Improvement Plan
CRM
Partner
System
Mandatory
Sopra Steria Partner KPI:
▪ Well-Architected Program
▪ Certification, specialization
▪ MSP
✓ Enhancement of customer’s satisfaction
✓ Business opportunities and project’s margin improvement
✓ Source of Industrialisation
✓ All type of activities – assessment,
migration, modernization, operation,
security
✓ Post-training activities, delivered
with mentoring
✓ Provide visibility to Cloud Service
Provider Business Leaders (Partner,
Sales with,…).
✓ Mandatory with AWS to stay in the
WA program
Customer Experience Improvement:
▪ Operational Excellence
▪ Security
▪ Reliability
▪ Performance
▪ Cost Reduction
▪ Sustainability
#HRI, MRI execution #Improvement plan execution
# Review with outcomes
26
C2 - Restricted use
Sopra Steria Digital and Cloud Services for Hyperscalers
Well-Architected Practices: beyond foundation, specific lens
Kilde: Sopra Steria Group - Modern Architecture Best Practices
Azure Well-Architected Review App and Data Modernization
Readiness
Data Services | Well-Architected
Review
Examine your workload through
the lenses of reliability, cost
management, operational
excellence, security and
performance efficiency.
Take the first step in modernizing
your workloads by taking this
application and modernisation
assessment.
Examine your data services
through the lenses of reliability,
cost management, operational
excellence, security and
performance efficiency.
Cloud Adoption Security Review DevOps Capability Assessment Analytics | Well-Architected
Review
Assess your Security Journey
for Cloud Adoption. Receive
actionable considerations to
improve your security posture.
Understand current capabilities
across the entire software release
lifecycle and quickly identify
opportunities for improvement based
on the Microsoft DevOps practices.
Assess your analytics workload
through the lenses of reliability,
cost management, operational
excellence, security, and
performance efficiency.
AWS Well-Architected Review Serverless Lens Migration Lens
Examine your workload through
the different pillars of best
practices for architecting
workloads on the AWS Cloud.
This lens covers scenarios such as
RESTful microservices, mobile app
backends, stream processing, and
web applications
How to successfully migrate
workloads to AWS.
Container Build Lens Machine Learning lens Financial Services Industry Lens
Best practices for how to build
and manage containerized
workloads on AWS.
Best practices for architecting your
machine learning (ML) workloads on
AWS.
Best practices for architecting
your Financial Services Industry
workloads on AWS.
Source: AWS Well-Architected Lenses Source: MICROSOFT ASSESSMENTS
27
C2 - Restricted use
• Idé og designfase
• Før produksjonssetting
• Ved omfattende endringer
• Status hver 6-12 måned
Se til Well-Architected i SDLC -> profit
Figur: © https://ardas-it.com/cloud-software-development-life-cycle-in-ardas
28
C2 - Restricted use
Kom i gang
AWS Architecture Center Onboarding guide
29
C2 - Restricted use
2024-02-03 - Rubiks - Boost produktivitet med Well-Architected

More Related Content

Similar to 2024-02-03 - Rubiks - Boost produktivitet med Well-Architected

Barracuda, AWS & Securosis: Application Security for the Cloud
Barracuda, AWS & Securosis:  Application Security for the CloudBarracuda, AWS & Securosis:  Application Security for the Cloud
Barracuda, AWS & Securosis: Application Security for the CloudAmazon Web Services
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxAWS Chicago
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudDan Usher
 
20 questions from digital cloud
20 questions from digital cloud20 questions from digital cloud
20 questions from digital cloudVishnu Sure
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for EnterpriseMohit Chhabra
 
AWS Well-Architected: Build Better Architecture, Better Business
AWS Well-Architected: Build Better Architecture, Better BusinessAWS Well-Architected: Build Better Architecture, Better Business
AWS Well-Architected: Build Better Architecture, Better BusinessDevOps.com
 
AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)Jamie van Brunschot
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-mainsaifam
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesAmazon Web Services
 
WebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptxWebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptxPrashanth Panduranga
 
WebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdfWebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdfPrashanth Panduranga
 
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docxWeek1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docxphilipnelson29183
 
Aws cloud best_practices
Aws cloud best_practicesAws cloud best_practices
Aws cloud best_practicessaifam
 
遷移過程中建置混和雲架構的最佳實踐分享
遷移過程中建置混和雲架構的最佳實踐分享遷移過程中建置混和雲架構的最佳實踐分享
遷移過程中建置混和雲架構的最佳實踐分享Amazon Web Services
 
Microsoft Cloud Database & Cloud BI
Microsoft Cloud Database & Cloud BIMicrosoft Cloud Database & Cloud BI
Microsoft Cloud Database & Cloud BIMark Kromer
 
Application Modernization with AWS - A Transformation in Digital Era
Application Modernization with AWS - A Transformation in Digital EraApplication Modernization with AWS - A Transformation in Digital Era
Application Modernization with AWS - A Transformation in Digital EraBhuvaneswari Subramani
 
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015Darryl Nelson
 
Enterprise Management for the AWS Cloud
Enterprise Management for the AWS CloudEnterprise Management for the AWS Cloud
Enterprise Management for the AWS Cloud2nd Watch
 

Similar to 2024-02-03 - Rubiks - Boost produktivitet med Well-Architected (20)

Barracuda, AWS & Securosis: Application Security for the Cloud
Barracuda, AWS & Securosis:  Application Security for the CloudBarracuda, AWS & Securosis:  Application Security for the Cloud
Barracuda, AWS & Securosis: Application Security for the Cloud
 
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptxSaurabh_Shanbhag - Building_SaaS_on_AWS.pptx
Saurabh_Shanbhag - Building_SaaS_on_AWS.pptx
 
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the CloudSharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
SharePoint Intersections - SP11 - SharePoint and IaaS - The OnPrem in the Cloud
 
20 questions from digital cloud
20 questions from digital cloud20 questions from digital cloud
20 questions from digital cloud
 
Azure Governance for Enterprise
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for Enterprise
 
AWS Well-Architected: Build Better Architecture, Better Business
AWS Well-Architected: Build Better Architecture, Better BusinessAWS Well-Architected: Build Better Architecture, Better Business
AWS Well-Architected: Build Better Architecture, Better Business
 
AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-main
 
Cloud migration-main
Cloud migration-mainCloud migration-main
Cloud migration-main
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
 
WebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptxWebApplicationArchitectureAzure.pptx
WebApplicationArchitectureAzure.pptx
 
WebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdfWebApplicationArchitectureAzure.pdf
WebApplicationArchitectureAzure.pdf
 
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docxWeek1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
Week1SP800-145 NIST Cloud Definitionhttpnvlpubs.nist.govni.docx
 
(GEN117) AWS Compliance Summit
(GEN117) AWS Compliance Summit(GEN117) AWS Compliance Summit
(GEN117) AWS Compliance Summit
 
Aws cloud best_practices
Aws cloud best_practicesAws cloud best_practices
Aws cloud best_practices
 
遷移過程中建置混和雲架構的最佳實踐分享
遷移過程中建置混和雲架構的最佳實踐分享遷移過程中建置混和雲架構的最佳實踐分享
遷移過程中建置混和雲架構的最佳實踐分享
 
Microsoft Cloud Database & Cloud BI
Microsoft Cloud Database & Cloud BIMicrosoft Cloud Database & Cloud BI
Microsoft Cloud Database & Cloud BI
 
Application Modernization with AWS - A Transformation in Digital Era
Application Modernization with AWS - A Transformation in Digital EraApplication Modernization with AWS - A Transformation in Digital Era
Application Modernization with AWS - A Transformation in Digital Era
 
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015
Intro to SW Eng Principles for Cloud Computing - DNelson Apr2015
 
Enterprise Management for the AWS Cloud
Enterprise Management for the AWS CloudEnterprise Management for the AWS Cloud
Enterprise Management for the AWS Cloud
 

Recently uploaded

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

2024-02-03 - Rubiks - Boost produktivitet med Well-Architected

  • 1. Boost produktivitet med AWS Well-Architected Håkon Eriksen DRANGE Principal Cloud Architect AWS Well-Architected Program Lead - Sopra Steria Group
  • 2. 2 C2 - Restricted use Bilde © https://aws.amazon.com/blogs/enterprise-strategy/go-faster-but-how-how-mapping-your-product-development-process-can-help-you-build-a-high-performing-organization/
  • 3. 3 C2 - Restricted use In today’s era of volatility, there is no other way but to re-invent. The only sustainable advantage you can have over others is agility, that’s it. Because nothing else is sustainable, everything else you create, somebody else will replicate. You can’t feel disruption until it’s too late! Jeff Bezos Grunnlegger av Amazon Bilde © thetimes.co.uk Kilde: https://aws.amazon.com/executive-insights/content/cloud-for-ceos/
  • 4. 4 C2 - Restricted use Hørt det før?
  • 5. 5 C2 - Restricted use 5 • .. kan vi klare å tilpasse oss nye krav og behov, raskere? • .. kan vi få redusere lead time? • .. kan vi unngå å finne opp hjulet på nytt i hvert DevOps team? Hvordan
  • 6. 6 C2 - Restricted use • Verktøy for å utvikle skyløsninger i henhold til beste praksis • Hjelper deg å evaluere arkitektur - systematisk • Kan gi deg sikrere, mer skalerbare og kostnadseffektive løsninger • Input til produktbacklogprioritering • Idé og designfase • Før produksjonssetting • Ved omfattende endringer AWS Well-Architected Framework «WAF» Kilder: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/ https://aws.amazon.com/blogs/architecture/accelerating-well-architected-framework-reviews-using-integrated-aws-trusted-advisor-insights/
  • 7. 7 C2 - Restricted use Introduction to Well-Architected Kilde: https://aws.amazon.com/blogs/architecture/announcing-updates-to-the-aws-well-architected-framework/
  • 8. 8 C2 - Restricted use AWS Well-Architected Framework pillarer Operational Excellence Reliability The ability for taking advantage of cloud technologies to protect data, systems, and assets in a way that can improve your security posture. The ability to support development and run workloads effectively, gain insight into their operations, and to continuously improve supporting processes and procedures to deliver business value. The ability of a workload to perform its intended function correctly and consistently when it’s expected to. Security Performance Efficiency Sustainability The ability to run systems to deliver business value at the lowest price point. The ability to use computing resources efficiently to meet system requirements, and to maintain that efficiency as demand changes and technologies evolve. The ability to continually improve sustainability impacts by reducing energy consumption and increasing efficiency across all components of a workload by maximizing the benefits from the provisioned resources and minimizing the total resources required. Cost Optimization
  • 9. 9 C2 - Restricted use Well-Architected Framework Review (WAFR) Hovedformål: Identifisere forbedringspotensialer for sluttbrukere eller organisasjonen Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/
  • 10. 10 C2 - Restricted use Well-Architected Framework Review (WAFR) Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part1/
  • 11. 11 C2 - Restricted use AWS Well-Architected Tool Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
  • 12. 12 C2 - Restricted use • Kategorier med spørsmål • Spørsmål med beste praksis anbefalinger. • Hver beste praksis anbefaling har teknisk implementasjonsveiledning Struktur AWS Well-Architected Framework
  • 13. 13 C2 - Restricted use Any workload that has some form of network connectivity, whether it’s the internet or a private network, requires multiple layers of defense to help protect from external and internal network-based threats. Users, both in your workforce and your customers, can be located anywhere. You need to pivot from traditional models of trusting anyone and anything that has access to your network. When you follow the principle of applying security at all layers, you employ a Zero Trust approach. Zero Trust security is a model where application components or microservices are considered discrete from each other and no component or microservice trusts any other. Security Pillar – Infrastructure protection SEC 5: How do you protect your network resources? Kilde: https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-networks.html
  • 14. 14 C2 - Restricted use Beste praksis 1. SEC05-BP01 Create network layers 2. SEC05-BP02 Control traffic at all layers 3. SEC05-BP03 Automate network protection 4. SEC05-BP04 Implement inspection and protection Security Pillar SEC 5: How do you protect your network resources? Kilde: https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/protecting-networks.html
  • 15. 15 C2 - Restricted use A reliable workload starts with upfront design decisions for both software and infrastructure. Your architecture choices will impact your workload behavior across all of the Well-Architected pillars. For reliability, there are specific patterns you must follow. The following questions focus on these considerations for reliability: REL 3: How do you design your workload service architecture? REL 4: How do you design interactions in a distributed system to prevent failures? REL 5: How do you design interactions in a distributed system to mitigate or withstand failures? Reliability Pillar – Workload architecture Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/workload-architecture.html
  • 16. 16 C2 - Restricted use Reliability Pillar – Workload architecture REL03-BP01 Choose how to segment your workload Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_service_architecture_monolith_soa_microservice.html
  • 17. 17 C2 - Restricted use Domain Driven Design Reliability Pillar – Workload architecture REL03-BP02 Build services focused on specific business domains and functionality Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_service_architecture_business_domains.html
  • 18. 18 C2 - Restricted use Reliability Pillar – Fault isolation REL10-BP01 Deploy the workload to multiple locations Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_fault_isolation_multiaz_region_system.html
  • 19. 19 C2 - Restricted use Reliability Pillar – Workload architecture REL11-BP05 Use static stability to prevent bimodal behavior Kilde: https://docs.aws.amazon.com/wellarchitected/latest/reliability-pillar/rel_withstand_component_failures_static_stability.html
  • 20. 20 C2 - Restricted use The economic benefits of just-in-time supply should be balanced against the need to provision to account for resource failures, high availability, and provision time. Depending on whether your demand is fixed or variable, plan to create metrics and automation that will ensure that management of your environment is minimal – even as you scale. Beste praksis: 1. COST09-BP01 Perform an analysis on the workload demand 2. COST09-BP02 Implement a buffer or throttle to manage demand 3. COST09-BP03 Supply resources dynamically Cost Optimization Pillar – Manage demand and supply resources COST 9: How do you manage demand, and supply resources? Kilde: https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/manage-demand-and-supply-resources.html
  • 21. 21 C2 - Restricted use AWS Well-Architected Tool - Resultatanalyse Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
  • 22. 22 C2 - Restricted use AWS Well-Architected Tool - Resultatanalyse Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
  • 23. 23 C2 - Restricted use AWS Well-Architected Tool - Prioritering Kilde: https://aws.amazon.com/blogs/mt/how-to-perform-a-well-architected-framework-review-part3/
  • 24. 24 C2 - Restricted use Raskere utvikling og lansering • Redusere “brannslukking” • Identifisere kapasitetsutfordringer • Bruke automatisering til å eksperimentere • Realisere verdi oftere Håndtere risiko • Få innsikt i hvilke områder i arkitekturen som kan innebære risiko • Adressere risiko før eventuell negativ påvirkning på virksomheten Databaserte beslutninger • Skape bevissthet om hvordan arkitekturvalg og avveininger kan ha ulike konsekvenser • Mulighetsrom på kort og lang sikt • Knyttet til forretningsmål Well-Architected verktøykassen Hjelper DevOps team med Lær AWS beste praksis • Gjøre team kjent med beste praksis basert på tusenvis av historiske gjennomganger
  • 25. 25 C2 - Restricted use Kilde: Sopra Steria Group - Modern Architecture Best Practices 25 Sopra Steria Group hyperscaler Well-Architected program Detection Internal or customer workloads ▪ Prospection ▪ Pre-sales activities / Cloud Architecture High-Level Definition ▪ Project launch / Cloud Architecture Low-Level Definition and implementation ▪ Incident/Problem Review ▪ Regular basis, all along the project lifecycle / Major update or milestone, Renewal preparation, Innovation Committee preparation 1 2 Well-Architected Review 3 4 Registration Review Execution Project Delivery – Improvement Plan CRM Partner System Mandatory Sopra Steria Partner KPI: ▪ Well-Architected Program ▪ Certification, specialization ▪ MSP ✓ Enhancement of customer’s satisfaction ✓ Business opportunities and project’s margin improvement ✓ Source of Industrialisation ✓ All type of activities – assessment, migration, modernization, operation, security ✓ Post-training activities, delivered with mentoring ✓ Provide visibility to Cloud Service Provider Business Leaders (Partner, Sales with,…). ✓ Mandatory with AWS to stay in the WA program Customer Experience Improvement: ▪ Operational Excellence ▪ Security ▪ Reliability ▪ Performance ▪ Cost Reduction ▪ Sustainability #HRI, MRI execution #Improvement plan execution # Review with outcomes
  • 26. 26 C2 - Restricted use Sopra Steria Digital and Cloud Services for Hyperscalers Well-Architected Practices: beyond foundation, specific lens Kilde: Sopra Steria Group - Modern Architecture Best Practices Azure Well-Architected Review App and Data Modernization Readiness Data Services | Well-Architected Review Examine your workload through the lenses of reliability, cost management, operational excellence, security and performance efficiency. Take the first step in modernizing your workloads by taking this application and modernisation assessment. Examine your data services through the lenses of reliability, cost management, operational excellence, security and performance efficiency. Cloud Adoption Security Review DevOps Capability Assessment Analytics | Well-Architected Review Assess your Security Journey for Cloud Adoption. Receive actionable considerations to improve your security posture. Understand current capabilities across the entire software release lifecycle and quickly identify opportunities for improvement based on the Microsoft DevOps practices. Assess your analytics workload through the lenses of reliability, cost management, operational excellence, security, and performance efficiency. AWS Well-Architected Review Serverless Lens Migration Lens Examine your workload through the different pillars of best practices for architecting workloads on the AWS Cloud. This lens covers scenarios such as RESTful microservices, mobile app backends, stream processing, and web applications How to successfully migrate workloads to AWS. Container Build Lens Machine Learning lens Financial Services Industry Lens Best practices for how to build and manage containerized workloads on AWS. Best practices for architecting your machine learning (ML) workloads on AWS. Best practices for architecting your Financial Services Industry workloads on AWS. Source: AWS Well-Architected Lenses Source: MICROSOFT ASSESSMENTS
  • 27. 27 C2 - Restricted use • Idé og designfase • Før produksjonssetting • Ved omfattende endringer • Status hver 6-12 måned Se til Well-Architected i SDLC -> profit Figur: © https://ardas-it.com/cloud-software-development-life-cycle-in-ardas
  • 28. 28 C2 - Restricted use Kom i gang AWS Architecture Center Onboarding guide