AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1/18
- Hello, I use an EC2 instance where some inportant and sensitive data are located. My clients are really concern about how these data are secured, and they frequently ask me to justify myself on this...
- There are some unimportant accounts that we want to disable config recordings on to minimize costs, so we were planning on adding exceptions to the mandatory control for config so that we can disable...
- Good morning, I am a student at the Federal Technological University of Paraná (UTFPR) and I created a tool that aims to recommend controls from the AWS Well-Architected Security Pillar based on user...
- Hi all, I would like to hear your approaches when applying a rate-based rule via AWS WAF. What are the best ways to permanently block IP addresses that trigger the RBR? I would also like to send...
- I am working on a solo AWS project for practice/learning. I've never worked with DynamoDB before so I was just wondering if I could have some guidance regarding my DyanmoDB Schema to ensure that I am...
- I wanted to put this pout there since i know a lot of people might struggle with this but when you use quick setup and initiate conformance packs in yoru org and decide they are causing more harm...
- I have set up a WAF to protect my API with targeted bot control. I use the fetch wrapper `AwsWafIntegration.fetch()` to call the api, however when I call the API from localhost the WAF responds with a...
- I need to perform signing/verification and/or encryption/decryption using a key present in hsm. To elaborate, I wan to fetch the key from aws cloudhsm and the use that key to perform crypto...
- Hi All, In Blu Insights, I have created a secured space( from S3 bucket resources ). Using this secured space, i have created a Codebase project and Transformation centre project. I have added my...
- Hello, I just have a question if there is a way to propagate tags onto Cloudwatch Insights Alarms? I don't seem to find anything related to this information and I have a Solution in place right now...
- I have been using Amazon Connect for several months. We mainly use the StartOutboundVoiceContact endpoint to trigger the Amazon Connect flow via REST request. But we encountered the error 429 Too...
- In our ECS Fargate configuration utilizing an Application Load Balancer by default cross zone loadbalcer is enabled, how does the implementation of cross-zone load balancing benefit our...
- Hi, how to connect in androiud app i receive: java.security.KeyStoreException: JKS not found or error when using BKS ;java.io.IOException: Wrong version of key store. i successfully connect to db by...
- Within the settings of my Cloudfront distribution, edit behavior, I enabled "Response headers policy - optional" and set it to "Managed-CORS-with-preflight-and-SecurityHeadersPolicy" which allows all...
- Hello, We recently got an email from AWS stating "Reported Vulnerability: Open Port Mapper/RPC Bind" The servers listed are a couple (not all) ECS Servers that run Amazon Linux 2. This surprised me...
- Hi all, I've tried looking for documentation but am not seeing anything specific. I would like to send a notification to various destinations (Teams channel and e-mail) whenever an AWS WAF Rate-Based...
- Hi, I am not able to verify the signature outside of the HSM which is created within aws cloudhsm using ECDSA private key I tried using openssl for the same and exported the public key from aws...
- I have a master key in KMS, and I generate ~25 datakeys for my application. I need to store these data keys (of course, encrypted) somewhere more secure and easy to access using APIs or some library....
Recent community articles
see all1/18
- EXPERTpublished a month ago0 votes2336 views
- EXPERTpublished 2 months ago0 votes2044 views
- EXPERTpublished 2 months ago0 votes2320 views
- EXPERTpublished 2 months ago0 votes1781 views
- published 2 months ago1 votes3673 views
- EXPERTpublished 3 months ago1 votes4469 views
- EXPERTpublished 3 months ago0 votes2110 views
- EXPERTpublished 3 months ago3 votes3250 views
- EXPERTpublished 4 months ago1 votes2212 views
- EXPERTpublished 6 months ago0 votes2800 views
- EXPERTpublished 8 months ago5 votes2199 views
- EXPERTpublished 8 months ago0 votes4011 views
Recent selections
see all1/2
1/18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTBrettski-AWS
EXPERTAntonio_Lagrotteria
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTOleksii Bebych
EXPERTGiovanni Lauria
EXPERTTushar_J
EXPERTMatt-B
EXPERTIndranil Banerjee AWS
EXPERTA_J
EXPERTAWS-User-alantam
EXPERTGK
EXPERTKallu
EXPERTAndrii S
EXPERT