Skip to main content

💼 AWS Well-Architected

  • ID: /frameworks/aws-well-architected

Description​

Empty...

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 Cost Optimization103no data
 💼 Automating operations1no data
  💼 COST11-BP01 Perform automation for operationsno data
 💼 Decommission resources5no data
  💼 COST04-BP01 Track resources over their lifetimeno data
  💼 COST04-BP02 Implement a decommissioning processno data
  💼 COST04-BP03 Decommission resourcesno data
  💼 COST04-BP04 Decommission resources automaticallyno data
  💼 COST04-BP05 Enforce data retention policiesno data
 💼 Define a review process and analyze your workload regularly2no data
  💼 COST10-BP01 Develop a workload review processno data
  💼 COST10-BP02 Review and analyze this workload regularlyno data
 💼 Evaluate cost when selecting services6no data
  💼 COST05-BP01 Identify organization requirements for costno data
  💼 COST05-BP02 Analyze all components of the workloadno data
  💼 COST05-BP03 Perform a thorough analysis of each componentno data
  💼 COST05-BP04 Select software with cost-effective licensingno data
  💼 COST05-BP05 Select components of this workload to optimize cost in line with organization prioritiesno data
  💼 COST05-BP06 Perform cost analysis for different usage over timeno data
 💼 Governance63no data
  💼 COST02-BP01 Develop policies based on your organization requirementsno data
  💼 COST02-BP02 Implement goals and targetsno data
  💼 COST02-BP03 Implement an account structureno data
  💼 COST02-BP04 Implement groups and roles3no data
  💼 COST02-BP05 Implement cost controlsno data
  💼 COST02-BP06 Track project lifecycleno data
 💼 Manage demand and supply resources3no data
  💼 COST09-BP01 Perform an analysis on the workload demandno data
  💼 COST09-BP02 Implement a buffer or throttle to manage demandno data
  💼 COST09-BP03 Supply resources dynamicallyno data
 💼 Monitor cost and usage6no data
  💼 COST03-BP01 Configure detailed information sourcesno data
  💼 COST03-BP02 Add organization information to cost and usageno data
  💼 COST03-BP03 Identify cost attribution categoriesno data
  💼 COST03-BP04 Establish organization metricsno data
  💼 COST03-BP05 Configure billing and cost management toolsno data
  💼 COST03-BP06 Allocate costs based on workload metricsno data
 💼 Plan for data transfer3no data
  💼 COST08-BP01 Perform data transfer modelingno data
  💼 COST08-BP02 Select components to optimize data transfer costno data
  💼 COST08-BP03 Implement services to reduce data transfer costsno data
 💼 Select the best pricing model5no data
  💼 COST07-BP01 Perform pricing model analysisno data
  💼 COST07-BP02 Choose Regions based on costno data
  💼 COST07-BP03 Select third-party agreements with cost-efficient termsno data
  💼 COST07-BP04 Implement pricing models for all components of this workloadno data
  💼 COST07-BP05 Perform pricing model analysis at the management account levelno data
 💼 Select the correct resource type, size, and number4no data
  💼 COST06-BP01 Perform cost modelingno data
  💼 COST06-BP02 Select resource type, size, and number based on datano data
  💼 COST06-BP03 Select resource type, size, and number automatically based on metricsno data
  💼 COST06-BP04 Consider using shared resourcesno data
💼 Operational Excellence115no data
 💼 Design for operations104no data
  💼 OPS05-BP01 Use version controlno data
  💼 OPS05-BP02 Test and validate changesno data
  💼 OPS05-BP03 Use configuration management systemsno data
  💼 OPS05-BP04 Use build and deployment management systemsno data
  💼 OPS05-BP05 Perform patch management4no data
  💼 OPS05-BP06 Share design standardsno data
  💼 OPS05-BP07 Implement practices to improve code qualityno data
  💼 OPS05-BP08 Use multiple environmentno data
  💼 OPS05-BP09 Make frequent, small, reversible changesno data
  💼 OPS05-BP10 Fully automate integration and deploymentno data
 💼 Implement observability51no data
  💼 OPS04-BP01 Identify key performance indicatorsno data
  💼 OPS04-BP02 Implement application telemetryno data
  💼 OPS04-BP03 Implement user experience telemetryno data
  💼 OPS04-BP04 Implement dependency telemetryno data
  💼 OPS04-BP05 Implement distributed tracing1no data
 💼 Learn, share, and improve9no data
  💼 OPS11-BP01 Have a process for continuous improvementno data
  💼 OPS11-BP02 Perform post-incident analysisno data
  💼 OPS11-BP03 Implement feedback loopsno data
  💼 OPS11-BP04 Perform knowledge managementno data
  💼 OPS11-BP05 Define drivers for improvementno data
  💼 OPS11-BP06 Validate insightsno data
  💼 OPS11-BP07 Perform operations metrics reviewsno data
  💼 OPS11-BP08 Document and share lessons learnedno data
  💼 OPS11-BP09 Allocate time to make improvementsno data
 💼 Mitigate deployment risks4no data
  💼 OPS06-BP01 Plan for unsuccessful changesno data
  💼 OPS06-BP02 Test deploymentsno data
  💼 OPS06-BP03 Employ safe deployment strategiesno data
  💼 OPS06-BP04 Automate testing and rollbackno data
 💼 Operating model6no data
  💼 OPS02-BP01 Resources have identified ownersno data
  💼 OPS02-BP02 Processes and procedures have identified ownersno data
  💼 OPS02-BP03 Operations activities have identified owners responsible for their performanceno data
  💼 OPS02-BP04 Mechanisms exist to manage responsibilities and ownershipno data
  💼 OPS02-BP05 Mechanisms exist to request additions, changes, and exceptionsno data
  💼 OPS02-BP06 Responsibilities between teams are predefined or negotiatedno data
 💼 Operational readiness and change management6no data
  💼 OPS07-BP01 Ensure personnel capabilityno data
  💼 OPS07-BP02 Ensure a consistent review of operational readinessno data
  💼 OPS07-BP03 Use runbooks to perform proceduresno data
  💼 OPS07-BP04 Use playbooks to investigate issuesno data
  💼 OPS07-BP05 Make informed decisions to deploy systems and changesno data
  💼 OPS07-BP06 Create support plans for production workloadsno data
 💼 Organization priorities6no data
  💼 OPS01-BP01 Evaluate external customer needsno data
  💼 OPS01-BP02 Evaluate internal customer needsno data
  💼 OPS01-BP03 Evaluate governance requirementsno data
  💼 OPS01-BP04 Evaluate compliance requirementsno data
  💼 OPS01-BP05 Evaluate threat landscapeno data
  💼 OPS01-BP06 Evaluate tradeoffs while managing benefits and risksno data
 💼 Organizational culture7no data
  💼 OPS03-BP01 Provide executive sponsorshipno data
  💼 OPS03-BP02 Team members are empowered to take action when outcomes are at riskno data
  💼 OPS03-BP03 Escalation is encouragedno data
  💼 OPS03-BP04 Communications are timely, clear, and actionableno data
  💼 OPS03-BP05 Experimentation is encouragedno data
  💼 OPS03-BP06 Team members are encouraged to maintain and grow their skill setsno data
  💼 OPS03-BP07 Resource teams appropriatelyno data
 💼 Responding to events7no data
  💼 OPS10-BP01 Use a process for event, incident, and problem managementno data
  💼 OPS10-BP02 Have a process per alertno data
  💼 OPS10-BP03 Prioritize operational events based on business impactno data
  💼 OPS10-BP04 Define escalation pathsno data
  💼 OPS10-BP05 Define a customer communication plan for service-impacting eventsno data
  💼 OPS10-BP06 Communicate status through dashboardsno data
  💼 OPS10-BP07 Automate responses to eventsno data
 💼 Understanding operational health31no data
  💼 OPS09-BP01 Measure operations goals and KPIs with metricsno data
  💼 OPS09-BP02 Communicate status and trends to ensure visibility into operation1no data
  💼 OPS09-BP03 Review operations metrics and prioritize improvementno data
 💼 Utilizing workload observability5no data
  💼 OPS08-BP01 Analyze workload metricsno data
  💼 OPS08-BP02 Analyze workload logsno data
  💼 OPS08-BP03 Analyze workload tracesno data
  💼 OPS08-BP04 Create actionable alertsno data
  💼 OPS08-BP05 Create dashboardsno data
💼 Performance Efficiency53no data
 💼 Architecture selection7no data
  💼 PERF01-BP01 Learn about and understand available cloud services and featuresno data
  💼 PERF01-BP02 Use guidance from your cloud provider or an appropriate partner to learn about architecture patterns and best practicesno data
  💼 PERF01-BP03 Factor cost into architectural decisionsno data
  💼 PERF01-BP04 Evaluate how trade-offs impact customers and architecture efficiencyno data
  💼 PERF01-BP05 Use policies and reference architecturesno data
  💼 PERF01-BP06 Use benchmarking to drive architectural decisionsno data
  💼 PERF01-BP07 Use a data-driven approach for architectural choicesno data
 💼 Compute and hardware6no data
  💼 PERF02-BP01 Select the best compute options for your workloadno data
  💼 PERF02-BP02 Understand the available compute configuration and featuresno data
  💼 PERF02-BP03 Collect compute-related metricsno data
  💼 PERF02-BP04 Configure and right-size compute resourcesno data
  💼 PERF02-BP05 Scale your compute resources dynamicallyno data
  💼 PERF02-BP06 Use optimized hardware-based compute acceleratorsno data
 💼 Data management4no data
  💼 PERF03-BP01 Use a purpose-built data store that best supports your data access and storage requirementsno data
  💼 PERF03-BP02 Evaluate available configuration options for data storeno data
  💼 PERF03-BP03 Collect and record data store performance metricsno data
  💼 PERF03-BP04 Implement strategies to improve query performance in data storeno data
 💼 Networking and content delivery73no data
  💼 PERF04-BP01 Understand how networking impacts performanceno data
  💼 PERF04-BP02 Evaluate available networking featuresno data
  💼 PERF04-BP03 Choose appropriate dedicated connectivity or VPN for your workloadno data
  💼 PERF04-BP04 Use load balancing to distribute traffic across multiple resources3no data
  💼 PERF04-BP05 Choose network protocols to improve performanceno data
  💼 PERF04-BP06 Choose your workload's location based on network requirementsno data
  💼 PERF04-BP07 Optimize network configuration based on metricsno data
 💼 Process and culture7no data
  💼 PERF05-BP01 Establish key performance indicators (KPIs) to measure workload health and performanceno data
  💼 PERF05-BP02 Use monitoring solutions to understand the areas where performance is most criticalno data
  💼 PERF05-BP03 Define a process to improve workload performanceno data
  💼 PERF05-BP04 Load test your workloadno data
  💼 PERF05-BP05 Use automation to proactively remediate performance-related issuesno data
  💼 PERF05-BP06 Keep your workload and services up-to-dateno data
  💼 PERF05-BP07 Review metrics at regular intervalsno data
💼 Reliability1310no data
 💼 Back up data44no data
  💼 REL09-BP01 Identify and back up all data that needs to be backed up, or reproduce the data from sources2no data
  💼 REL09-BP02 Secure and encrypt backups1no data
  💼 REL09-BP03 Perform data backup automatically3no data
  💼 REL09-BP04 Perform periodic recovery of the data to verify backup integrity and processesno data
 💼 Design interactions in a distributed system to mitigate or withstand failures7no data
  💼 REL05-BP01 Implement graceful degradation to transform applicable hard dependencies into soft dependenciesno data
  💼 REL05-BP02 Throttle requestsno data
  💼 REL05-BP03 Control and limit retry callsno data
  💼 REL05-BP04 Fail fast and limit queuesno data
  💼 REL05-BP05 Set client timeoutsno data
  💼 REL05-BP06 Make systems stateless where possibleno data
  💼 REL05-BP07 Implement emergency leversno data
 💼 Design interactions in a distributed system to prevent failures4no data
  💼 REL04-BP01 Identify the kind of distributed systems you depend onno data
  💼 REL04-BP02 Implement loosely coupled dependenciesno data
  💼 REL04-BP03 Do constant workno data
  💼 REL04-BP04 Make mutating operations idempotentno data
 💼 Design your workload service architecture3no data
  💼 REL03-BP01 Choose how to segment your workloadno data
  💼 REL03-BP02 Build services focused on specific business domains and functionalityno data
  💼 REL03-BP03 Provide service contracts per APIno data
 💼 Design your workload to adapt to changes in demand43no data
  💼 REL07-BP01 Use automation when obtaining or scaling resourcesno data
  💼 REL07-BP02 Obtain resources upon detection of impairment to a workload3no data
  💼 REL07-BP03 Obtain resources upon detection that more resources are needed for a workloadno data
  💼 REL07-BP04 Load test your workloadno data
 💼 Design your workload to withstand component failures75no data
  💼 REL11-BP01 Monitor all components of the workload to detect failures2no data
  💼 REL11-BP02 Fail over to healthy resources1no data
  💼 REL11-BP03 Automate healing on all layers3no data
  💼 REL11-BP04 Rely on the data plane and not the control plane during recoveryno data
  💼 REL11-BP05 Use static stability to prevent bimodal behaviorno data
  💼 REL11-BP06 Send notifications when events impact availability1no data
  💼 REL11-BP07 Architect your product to meet availability targets and uptime service level agreements (SLAs)no data
 💼 Implement change5no data
  💼 REL08-BP01 Use runbooks for standard activities such as deploymentno data
  💼 REL08-BP02 Integrate functional testing as part of your deploymentno data
  💼 REL08-BP03 Integrate resiliency testing as part of your deploymentno data
  💼 REL08-BP04 Deploy using immutable infrastructureno data
  💼 REL08-BP05 Deploy changes with automationno data
 💼 Manage service quotas and constraints6no data
  💼 REL01-BP01 Aware of service quotas and constraintsno data
  💼 REL01-BP02 Manage service quotas across accounts and regionsno data
  💼 REL01-BP03 Accommodate fixed service quotas and constraints through architectureno data
  💼 REL01-BP04 Monitor and manage quotasno data
  💼 REL01-BP05 Automate quota managementno data
  💼 REL01-BP06 Ensure that a sufficient gap exists between the current quotas and the maximum usage to accommodate failoverno data
 💼 Monitor workload resources73no data
  💼 REL06-BP01 Monitor all components for the workload (Generation)no data
  💼 REL06-BP02 Define and calculate metrics (Aggregation)no data
  💼 REL06-BP03 Send notifications (Real-time processing and alarming)no data
  💼 REL06-BP04 Automate responses (Real-time processing and alarming)3no data
  💼 REL06-BP05 Analyze logsno data
  💼 REL06-BP06 Regularly review monitoring scope and metricsno data
  💼 REL06-BP07 Monitor end-to-end tracing of requests through your systemno data
 💼 Plan for Disaster Recovery (DR)52no data
  💼 REL13-BP01 Define recovery objectives for downtime and data lossno data
  💼 REL13-BP02 Use defined recovery strategies to meet the recovery objectivesno data
  💼 REL13-BP03 Test disaster recovery implementation to validate the implementationno data
  💼 REL13-BP04 Manage configuration drift at the DR site or Regionno data
  💼 REL13-BP05 Automate recovery2no data
 💼 Plan your network topology5no data
  💼 REL02-BP01 Use highly available network connectivity for your workload public endpointsno data
  💼 REL02-BP02 Provision redundant connectivity between private networks in the cloud and on-premises environmentsno data
  💼 REL02-BP03 Ensure IP subnet allocation accounts for expansion and availabilityno data
  💼 REL02-BP04 Prefer hub-and-spoke topologies over many-to-many meshno data
  💼 REL02-BP05 Enforce non-overlapping private IP address ranges in all private address spaces where they are connectedno data
 💼 Test reliability5no data
  💼 REL12-BP01 Use playbooks to investigate failuresno data
  💼 REL12-BP02 Perform post-incident analysisno data
  💼 REL12-BP03 Test scalability and performance requirementsno data
  💼 REL12-BP04 Test resiliency using chaos engineeringno data
  💼 REL12-BP05 Conduct game days regularlyno data
 💼 Use fault isolation to protect your workload3no data
  💼 REL10-BP01 Deploy the workload to multiple locationsno data
  💼 REL10-BP02 Automate recovery for components constrained to a single locationno data
  💼 REL10-BP03 Use bulkhead architectures to limit scope of impactno data
💼 Security1242no data
 💼 Application Security8no data
  💼 SEC11-BP01 Train for application securityno data
  💼 SEC11-BP02 Automate testing throughout the development and release lifecycleno data
  💼 SEC11-BP03 Perform regular penetration testingno data
  💼 SEC11-BP04 Conduct code reviewsno data
  💼 SEC11-BP05 Centralize services for packages and dependenciesno data
  💼 SEC11-BP06 Deploy software programmaticallyno data
  💼 SEC11-BP07 Regularly assess security properties of the pipelinesno data
  💼 SEC11-BP08 Build a program that embeds security ownership in workload teamsno data
 💼 Data Classification4no data
  💼 SEC07-BP01 Understand your data classification schemeno data
  💼 SEC07-BP02 Apply data protection controls based on data sensitivityno data
  💼 SEC07-BP03 Automate identification and classificationno data
  💼 SEC07-BP04 Define scalable data lifecycle managementno data
 💼 Detection42no data
  💼 SEC04-BP01 Configure service and application loggingno data
  💼 SEC04-BP02 Capture logs, findings, and metrics in standardized locationsno data
  💼 SEC04-BP03 Correlate and enrich security alerts2no data
  💼 SEC04-BP04 Initiate remediation for non-compliant resources2no data
 💼 Identity management64no data
  💼 SEC02-BP01 Use strong sign-in mechanisms3no data
  💼 SEC02-BP02 Use temporary credentialsno data
  💼 SEC02-BP03 Store and use secrets securely1no data
  💼 SEC02-BP04 Rely on a centralized identity providerno data
  💼 SEC02-BP05 Audit and rotate credentials periodicallyno data
  💼 SEC02-BP06 Employ user groups and attributesno data
 💼 Operating your workloads securely81no data
  💼 SEC01-BP01 Separate workloads using accountsno data
  💼 SEC01-BP02 Secure account root user and properties1no data
  💼 SEC01-BP03 Identify and validate control objectivesno data
  💼 SEC01-BP04 Stay up to date with security threats and recommendationsno data
  💼 SEC01-BP05 Reduce security management scopeno data
  💼 SEC01-BP06 Automate deployment of standard security controlsno data
  💼 SEC01-BP07 Identify threats and prioritize mitigations using a threat modelno data
  💼 SEC01-BP08 Evaluate and implement new security services and features regularlyno data
 💼 Permissions management91no data
  💼 SEC03-BP01 Define access requirements1no data
  💼 SEC03-BP02 Grant least privilege accessno data
  💼 SEC03-BP03 Establish emergency access processno data
  💼 SEC03-BP04 Reduce permissions continuouslyno data
  💼 SEC03-BP05 Define permission guardrails for your organizationno data
  💼 SEC03-BP06 Manage access based on lifecycleno data
  💼 SEC03-BP07 Analyze public and cross-account accessno data
  💼 SEC03-BP08 Share resources securely within your organizationno data
  💼 SEC03-BP09 Share resources securely with a third partyno data
 💼 Preparation81no data
  💼 SEC10-BP01 Identify key personnel and external resourcesno data
  💼 SEC10-BP02 Develop incident management plansno data
  💼 SEC10-BP03 Prepare forensic capabilitiesno data
  💼 SEC10-BP04 Develop and test security incident response playbooksno data
  💼 SEC10-BP05 Pre-provision access1no data
  💼 SEC10-BP06 Pre-deploy toolsno data
  💼 SEC10-BP07 Run simulationsno data
  💼 SEC10-BP08 Establish a framework for learning from incidentsno data
 💼 Protecting Compute52no data
  💼 SEC06-BP01 Perform vulnerability management2no data
  💼 SEC06-BP02 Provision compute from hardened imagesno data
  💼 SEC06-BP03 Reduce manual management and interactive accessno data
  💼 SEC06-BP04 Validate software integrityno data
  💼 SEC06-BP05 Automate compute protectionno data
 💼 Protecting Data at Rest426no data
  💼 SEC08-BP01 Implement secure key management2no data
  💼 SEC08-BP02 Enforce encryption at rest17no data
  💼 SEC08-BP03 Automate data at rest protection2no data
  💼 SEC08-BP04 Enforce access control7no data
 💼 Protecting Data in Transit35no data
  💼 SEC09-BP01 Implement secure key and certificate management2no data
  💼 SEC09-BP02 Enforce encryption in transitno data
  💼 SEC09-BP03 Authenticate network communications3no data
 💼 Protecting Networks43no data
  💼 SEC05-BP01 Create network layersno data
  💼 SEC05-BP02 Control traffic flow within your network layersno data
  💼 SEC05-BP03 Implement inspection-based protection3no data
  💼 SEC05-BP04 Automate network protection1no data
 💼 Security Foundationsno data
💼 Sustainability64no data
 💼 Alignment to demand62no data
  💼 SUS02-BP01 Scale workload infrastructure dynamically2no data
  💼 SUS02-BP02 Align SLAs with sustainability goalsno data
  💼 SUS02-BP03 Stop the creation and maintenance of unused assetsno data
  💼 SUS02-BP04 Optimize geographic placement of workloads based on their networking requirementsno data
  💼 SUS02-BP05 Optimize team member resources for activities performedno data
  💼 SUS02-BP06 Implement buffering or throttling to flatten the demand curveno data
 💼 Data management82no data
  💼 SUS04-BP01 Implement a data classification policyno data
  💼 SUS04-BP02 Use technologies that support data access and storage patternsno data
  💼 SUS04-BP03 Use policies to manage the lifecycle of your datasets2no data
  💼 SUS04-BP04 Use elasticity and automation to expand block storage or file systemno data
  💼 SUS04-BP05 Remove unneeded or redundant datano data
  💼 SUS04-BP06 Use shared file systems or storage to access common datano data
  💼 SUS04-BP07 Minimize data movement across networksno data
  💼 SUS04-BP08 Back up data only when difficult to recreateno data
 💼 Hardware and services4no data
  💼 SUS05-BP01 Use the minimum amount of hardware to meet your needsno data
  💼 SUS05-BP02 Use instance types with the least impactno data
  💼 SUS05-BP03 Use managed servicesno data
  💼 SUS05-BP04 Optimize your use of hardware-based compute acceleratorsno data
 💼 Process and culture5no data
  💼 SUS06-BP01 Communicate and cascade your sustainability goalsno data
  💼 SUS06-BP02 Adopt methods that can rapidly introduce sustainability improvementsno data
  💼 SUS06-BP03 Keep your workload up-to-dateno data
  💼 SUS06-BP04 Increase utilization of build environmentsno data
  💼 SUS06-BP05 Use managed device farms for testingno data
 💼 Region selection1no data
  💼 SUS01-BP01 Choose Region based on both business requirements and sustainability goalsno data
 💼 Software and architecture5no data
  💼 SUS03-BP01 Optimize software and architecture for asynchronous and scheduled jobsno data
  💼 SUS03-BP02 Remove or refactor workload components with low or no useno data
  💼 SUS03-BP03 Optimize areas of code that consume the most time or resourcesno data
  💼 SUS03-BP04 Optimize impact on devices and equipmentno data
  💼 SUS03-BP05 Use software patterns and architectures that best support data access and storage patternsno data