WS Well-Architected Framework terms:
        
                        
                                                                                    
                                                                                            Component:  | 
                                                                                                                        The code, configuration, orAWS Resources that together deliver against a requirement  | 
                                                                                 
                                                                                            
                                                                                            Workload:  | 
                                                                                                                        A set of components that together deliver business value  | 
                                                                                 
                                                                                            
                                                                                            Level of effort:  | 
                                                                                                                        The amount of time, effort, and complexity a task requires for implementation.  | 
                                                                                 
                                                                         
                             
    
    
            Security: Detection, Infra, Data & IAM
        
                        
                                                                                    
                                                                                            To detect and investigate security events:  | 
                                                                                                                        Capture and analyze events from logs and metrics to gain visibility.  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Take action on security events and potential threats to help secure a workload.  | 
                                                                                 
                                                                                            
                                                                                            To protect network + compute resources:  | 
                                                                                                                        Any workload that with some form of network connectivity, whether  the internet or a private network, requires multiple layers of defense  | 
                                                                                 
                                                                                            
                                                                                            To  classify data:  | 
                                                                                                                        Criticality and sensitivity for protection and retention controls.  | 
                                                                                 
                                                                                            
                                                                                            Protecting data:  | 
                                                                                                                        Multiple controls to:  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        At rest: Prevent unauthorized access or loss.  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        In transit: Reduce the risk of unauthorized access or loss  | 
                                                                                 
                                                                                            
                                                                                            To prepare and and recover from incidents:  | 
                                                                                                                        Log file access and changes  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Process and launch tools to automate responses through APIs  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Prepare, pre-provision tooling and create a “clean environment” via AWS CloudFormation  | 
                                                                                 
                                                                                            
                                                                                            To incorporate and validate security properties of apps thru CI/CD lifecycles:  | 
                                                                                                                        Validate the security properties of tools and applications help to reduce the likelihood of security issues in production  | 
                                                                                 
                                                                                            
                                                                                            Identity and access:  | 
                                                                                                                        Human Identities ~ Interact with AWS resources via a web browser, client application, or interactive command line tools  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Machine Identities ~ Service applications, operational tools and workloads  | 
                                                                                 
                                                                         
                            The utilization of cloud technologies to protect data, systems, and assets  
                             
                             | 
                                                                              | 
                                                        
                                
    
    
            Performance efficiency
        
                        
                                                                                    
                                                                                            The ability to use computing resources efficiently to meet system requirements  | 
                                                                                 
                                                                                            
                                                                                            Selecting best performing architecture:  | 
                                                                                                                        Multiple approaches are required for more effective performance across a workload  | 
                                                                                 
                                                                                            
                                                                                            3 Compute  options:  | 
                                                                                 
                                                                                            
                                                                                            1 Instances -  | 
                                                                                                                        Virtualized servers  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Different families and sizes  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Solid-state drives (SSDs) and graphics processing units (GPUs)  | 
                                                                                 
                                                                                            
                                                                                            2 Containers -  | 
                                                                                                                        A method of operating system virtualization:  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        AWS Fargate - serverless compute for containers or Amazon EC2  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Amazon Elastic Container Service (ECS) or Amazon Elastic Kubernetes Service (EKS)- container orchestration platforms  | 
                                                                                 
                                                                                            
                                                                                            3 Functions -  | 
                                                                                                                        Abstract run environment from the code you want to apply.  | 
                                                                                 
                                                                                            
                                                                                            Storage  | 
                                                                                 
                                                                                            
                                                                                            The more efficient storage solution for a system varies based on:  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                 
                                                                                            
                                                                                            1) The kind of access operation (block, file, or object):  | 
                                                                                 
                                                                                            
                                                                                            1a - Object  | 
                                                                                                                        From any internet location for user-generated content, active archive, serverless computing  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Divides data into separate, self-contained units that are re-stored in a flat environment, with all objects at the same level  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Contain metadata: information about the file that helps with processing and usability  | 
                                                                                 
                                                                                            
                                                                                            1b - Block Storage  | 
                                                                                                                        Often configured to decouple the data from the user’s environment and spread it across multiple environments that can better serve the data  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Data is split into fixed blocks of data and then stored separately with unique identifiers  | 
                                                                                 
                                                                                            
                                                                                            1c - File  | 
                                                                                                                        Data is stored as a single piece of information inside a folder, just like you’d organize pieces of paper inside a manila folder.  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Problem is, just like with your filing cabinet, that virtual drawer can only open so far. File-based storage systems must scale out by adding more systems, rather than scale up by adding more capacity.  | 
                                                                                 
                                                                                            
                                                                                            2) Frequency of update (WORM, dynamic)  | 
                                                                                 
                                                                                            
                                                                                            WORM -  | 
                                                                                                                        Write once, read many (WORM) model  | 
                                                                                 
                                                                                            
                                                                                            Dynamic  | 
                                                                                 
                                                                                            
                                                                                            3) Availability and durability constraints  | 
                                                                                 
                                                                                            
                                                                                            Database  | 
                                                                                 
                                                                                            
                                                                                            Forms:  | 
                                                                                                                        Relational, key-value, document, in-memory, graph, time series, and ledger  | 
                                                                                 
                                                                                            
                                                                                            Select according to:  | 
                                                                                                                        Availability, consistency, partition tolerance, latency, durability, scalability, and query capability  | 
                                                                                 
                                                                                            
                                                                                            Network  | 
                                                                                                                        As the network is between all workload components, it can have great impacts, both positive and negative, on workload performance and behavior  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Determine workload requirements for bandwidth, latency, jitter, and throughput  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        Physical constraints, such as user or on-premises resources, determine location options  | 
                                                                                 
                                                                         
                             
                             | 
                                                                              | 
                                                        
                                
    
    
            Operational excellence
        
                        
                                                                                    
                                                                                            Organization  | 
                                                                                 
                                                                                            
                                                                                            Teams must have a shared understanding of your entire workload, their role in it, and shared business goals  | 
                                                                                 
                                                                                            
                                                                                            To determine priorities:  | 
                                                                                                                        Have shared goals to set priorities for resources  | 
                                                                                 
                                                                                            
                                                                                            How an organizational culture supports business outcomes:  | 
                                                                                                                        Provide support for team members  | 
                                                                                 
                                                                                            
                                                                                            Preparation  | 
                                                                                 
                                                                                            
                                                                                            Understand workloads and their expected behaviors  | 
                                                                                 
                                                                                            
                                                                                            To understand its state:  | 
                                                                                                                        Design your workload so that it provides the information necessary across all components (for example, metrics, logs, and traces)  | 
                                                                                 
                                                                                            
                                                                                            To reduce defects, ease remediation, and improve flow into production:  | 
                                                                                                                        Adopt approaches that improve flow of changes into production that achieve refactoring fast feedback on quality, and bug fixing  | 
                                                                                 
                                                                                            
                                                                                            Before supporting a workload:  | 
                                                                                                                        Evaluate the operational readiness of your workload, processes and procedures, and personnel to understand the operational risks  | 
                                                                                 
                                                                                            
                                                                                            Operate  | 
                                                                                 
                                                                                            
                                                                                            Measured by the achievement of business and customer outcomes:  | 
                                                                                 
                                                                                            
                                                                                            |   | 
                                                                                                                        After we identify metrics that will be used in calculations  | 
                                                                                 
                                                                                            
                                                                                            To understand the health of your workload:  | 
                                                                                                                        Define, capture, and analyze workload metrics to gain visibility to workload events  | 
                                                                                 
                                                                                            
                                                                                            To manage workload and operations events:  | 
                                                                                                                        Prepare and validate procedures for responding  | 
                                                                                 
                                                                                            
                                                                                            Evolve  | 
                                                                                 
                                                                                            
                                                                                            Learn, share, and continuously improve  | 
                                                                                 
                                                                                            
                                                                                            To evolve operations:  | 
                                                                                                                        Dedicate time and resources for nearly continuous incremental improvement to evolve the effectiveness and efficiency of your operations  | 
                                                                                 
                                                                         
                             
                             | 
                                                            
            
Created By
Metadata
Comments
No comments yet. Add yours below!
Add a Comment
More Cheat Sheets by datamansam