Skip to main content

⭐ Repository

πŸ’Ό AWS Well-Architected

  • ID: /frameworks/aws-well-architected

Description​

Empty...

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό Cost Optimization53no data
γ€€πŸ’Ό Cost effective resources4no data
γ€€γ€€πŸ’Ό Evaluate cost when selecting services6no data
γ€€γ€€γ€€πŸ’Ό COST05-BP01 Identify organization requirements for costno data
γ€€γ€€γ€€πŸ’Ό COST05-BP02 Analyze all components of the workloadno data
γ€€γ€€γ€€πŸ’Ό COST05-BP03 Perform a thorough analysis of each componentno data
γ€€γ€€γ€€πŸ’Ό COST05-BP04 Select software with cost-effective licensingno data
γ€€γ€€γ€€πŸ’Ό COST05-BP05 Select components of this workload to optimize cost in line with organization prioritiesno data
γ€€γ€€γ€€πŸ’Ό COST05-BP06 Perform cost analysis for different usage over timeno data
γ€€γ€€πŸ’Ό Plan for data transfer3no data
γ€€γ€€γ€€πŸ’Ό COST08-BP01 Perform data transfer modelingno data
γ€€γ€€γ€€πŸ’Ό COST08-BP02 Select components to optimize data transfer costno data
γ€€γ€€γ€€πŸ’Ό COST08-BP03 Implement services to reduce data transfer costsno data
γ€€γ€€πŸ’Ό Select the best pricing model5no data
γ€€γ€€γ€€πŸ’Ό COST07-BP01 Perform pricing model analysisno data
γ€€γ€€γ€€πŸ’Ό COST07-BP02 Choose Regions based on costno data
γ€€γ€€γ€€πŸ’Ό COST07-BP03 Select third-party agreements with cost-efficient termsno data
γ€€γ€€γ€€πŸ’Ό COST07-BP04 Implement pricing models for all components of this workloadno data
γ€€γ€€γ€€πŸ’Ό COST07-BP05 Perform pricing model analysis at the management account levelno data
γ€€γ€€πŸ’Ό Select the correct resource type, size, and number4no data
γ€€γ€€γ€€πŸ’Ό COST06-BP01 Perform cost modelingno data
γ€€γ€€γ€€πŸ’Ό COST06-BP02 Select resource type, size, and number based on datano data
γ€€γ€€γ€€πŸ’Ό COST06-BP03 Select resource type, size, and number automatically based on metricsno data
γ€€γ€€γ€€πŸ’Ό COST06-BP04 Consider using shared resourcesno data
γ€€πŸ’Ό Expenditure and usage awareness33no data
γ€€γ€€πŸ’Ό Decommission resources5no data
γ€€γ€€γ€€πŸ’Ό COST04-BP01 Track resources over their lifetimeno data
γ€€γ€€γ€€πŸ’Ό COST04-BP02 Implement a decommissioning processno data
γ€€γ€€γ€€πŸ’Ό COST04-BP03 Decommission resourcesno data
γ€€γ€€γ€€πŸ’Ό COST04-BP04 Decommission resources automaticallyno data
γ€€γ€€γ€€πŸ’Ό COST04-BP05 Enforce data retention policiesno data
γ€€γ€€πŸ’Ό Governance63no data
γ€€γ€€γ€€πŸ’Ό COST02-BP01 Develop policies based on your organization requirementsno data
γ€€γ€€γ€€πŸ’Ό COST02-BP02 Implement goals and targetsno data
γ€€γ€€γ€€πŸ’Ό COST02-BP03 Implement an account structureno data
γ€€γ€€γ€€πŸ’Ό COST02-BP04 Implement groups and roles3no data
γ€€γ€€γ€€πŸ’Ό COST02-BP05 Implement cost controlsno data
γ€€γ€€γ€€πŸ’Ό COST02-BP06 Track project lifecycleno data
γ€€γ€€πŸ’Ό Monitor cost and usage6no data
γ€€γ€€γ€€πŸ’Ό COST03-BP01 Configure detailed information sourcesno data
γ€€γ€€γ€€πŸ’Ό COST03-BP02 Add organization information to cost and usageno data
γ€€γ€€γ€€πŸ’Ό COST03-BP03 Identify cost attribution categoriesno data
γ€€γ€€γ€€πŸ’Ό COST03-BP04 Establish organization metricsno data
γ€€γ€€γ€€πŸ’Ό COST03-BP05 Configure billing and cost management toolsno data
γ€€γ€€γ€€πŸ’Ό COST03-BP06 Allocate costs based on workload metricsno data
γ€€πŸ’Ό Manage demand and supply resources3no data
γ€€γ€€πŸ’Ό COST09-BP01 Perform an analysis on the workload demandno data
γ€€γ€€πŸ’Ό COST09-BP02 Implement a buffer or throttle to manage demandno data
γ€€γ€€πŸ’Ό COST09-BP03 Supply resources dynamicallyno data
γ€€πŸ’Ό Optimize over time2no data
γ€€γ€€πŸ’Ό Automating operations1no data
γ€€γ€€γ€€πŸ’Ό COST11-BP01 Perform automation for operationsno data
γ€€γ€€πŸ’Ό Define a review process and analyze your workload regularly2no data
γ€€γ€€γ€€πŸ’Ό COST10-BP01 Develop a workload review processno data
γ€€γ€€γ€€πŸ’Ό COST10-BP02 Review and analyze this workload regularlyno data
γ€€πŸ’Ό Practice Cloud Financial Management9no data
γ€€γ€€πŸ’Ό COST01-BP01 Establish ownership of cost optimizationno data
γ€€γ€€πŸ’Ό COST01-BP02 Establish a partnership between finance and technologyno data
γ€€γ€€πŸ’Ό COST01-BP03 Establish cloud budgets and forecastsno data
γ€€γ€€πŸ’Ό COST01-BP04 Implement cost awareness in your organizational processesno data
γ€€γ€€πŸ’Ό COST01-BP05 Report and notify on cost optimizationno data
γ€€γ€€πŸ’Ό COST01-BP06 Monitor cost proactivelyno data
γ€€γ€€πŸ’Ό COST01-BP07 Keep up-to-date with new service releasesno data
γ€€γ€€πŸ’Ό COST01-BP08 Create a cost-aware cultureno data
γ€€γ€€πŸ’Ό COST01-BP08 Create a cost-aware cultureno data
πŸ’Ό Operational Excellence43no data
γ€€πŸ’Ό Evolve1no data
γ€€γ€€πŸ’Ό Learn, share, and improve9no data
γ€€γ€€γ€€πŸ’Ό OPS11-BP01 Have a process for continuous improvementno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP02 Perform post-incident analysisno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP03 Implement feedback loopsno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP04 Perform knowledge managementno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP05 Define drivers for improvementno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP06 Validate insightsno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP07 Perform operations metrics reviewsno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP08 Document and share lessons learnedno data
γ€€γ€€γ€€πŸ’Ό OPS11-BP09 Allocate time to make improvementsno data
γ€€πŸ’Ό Operate3no data
γ€€γ€€πŸ’Ό Responding to events7no data
γ€€γ€€γ€€πŸ’Ό OPS10-BP01 Use a process for event, incident, and problem managementno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP02 Have a process per alertno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP03 Prioritize operational events based on business impactno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP04 Define escalation pathsno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP05 Define a customer communication plan for service-impacting eventsno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP06 Communicate status through dashboardsno data
γ€€γ€€γ€€πŸ’Ό OPS10-BP07 Automate responses to eventsno data
γ€€γ€€πŸ’Ό Understanding operational health3no data
γ€€γ€€γ€€πŸ’Ό OPS05-BP03 Use configuration management systemsno data
γ€€γ€€γ€€πŸ’Ό OPS09-BP01 Measure operations goals and KPIs with metricsno data
γ€€γ€€γ€€πŸ’Ό OPS09-BP02 Communicate status and trends to ensure visibility into operationno data
γ€€γ€€πŸ’Ό Utilizing workload observability5no data
γ€€γ€€γ€€πŸ’Ό OPS08-BP01 Analyze workload metricsno data
γ€€γ€€γ€€πŸ’Ό OPS08-BP02 Analyze workload logsno data
γ€€γ€€γ€€πŸ’Ό OPS08-BP03 Analyze workload tracesno data
γ€€γ€€γ€€πŸ’Ό OPS08-BP04 Create actionable alertsno data
γ€€γ€€γ€€πŸ’Ό OPS08-BP05 Create dashboardsno data
γ€€πŸ’Ό Organization3no data
γ€€γ€€πŸ’Ό Operating model6no data
γ€€γ€€γ€€πŸ’Ό OPS02-BP01 Resources have identified ownersno data
γ€€γ€€γ€€πŸ’Ό OPS02-BP02 Processes and procedures have identified ownersno data
γ€€γ€€γ€€πŸ’Ό OPS02-BP03 Operations activities have identified owners responsible for their performanceno data
γ€€γ€€γ€€πŸ’Ό OPS02-BP04 Mechanisms exist to manage responsibilities and ownershipno data
γ€€γ€€γ€€πŸ’Ό OPS02-BP05 Mechanisms exist to request additions, changes, and exceptionsno data
γ€€γ€€γ€€πŸ’Ό OPS02-BP06 Responsibilities between teams are predefined or negotiatedno data
γ€€γ€€πŸ’Ό Organization priorities6no data
γ€€γ€€γ€€πŸ’Ό OPS01-BP01 Evaluate external customer needsno data
γ€€γ€€γ€€πŸ’Ό OPS01-BP02 Evaluate internal customer needsno data
γ€€γ€€γ€€πŸ’Ό OPS01-BP03 Evaluate governance requirementsno data
γ€€γ€€γ€€πŸ’Ό OPS01-BP04 Evaluate compliance requirementsno data
γ€€γ€€γ€€πŸ’Ό OPS01-BP05 Evaluate threat landscapeno data
γ€€γ€€γ€€πŸ’Ό OPS01-BP06 Evaluate tradeoffs while managing benefits and risksno data
γ€€γ€€πŸ’Ό Organizational culture7no data
γ€€γ€€γ€€πŸ’Ό OPS03-BP01 Provide executive sponsorshipno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP02 Team members are empowered to take action when outcomes are at riskno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP03 Escalation is encouragedno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP04 Communications are timely, clear, and actionableno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP05 Experimentation is encouragedno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP06 Team members are encouraged to maintain and grow their skill setsno data
γ€€γ€€γ€€πŸ’Ό OPS03-BP07 Resource teams appropriatelyno data
γ€€πŸ’Ό Prepare43no data
γ€€γ€€πŸ’Ό Design for operations102no data
γ€€γ€€γ€€πŸ’Ό OPS05-BP01 Use version controlno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP02 Test and validate changesno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP03 Use configuration management systemsno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP04 Use build and deployment management systemsno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP05 Perform patch management2no data
γ€€γ€€γ€€πŸ’Ό OPS05-BP06 Share design standardsno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP07 Implement practices to improve code qualityno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP08 Use multiple environmentno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP09 Make frequent, small, reversible changesno data
γ€€γ€€γ€€πŸ’Ό OPS05-BP10 Fully automate integration and deploymentno data
γ€€γ€€πŸ’Ό Implement observability51no data
γ€€γ€€γ€€πŸ’Ό OPS04-BP01 Identify key performance indicatorsno data
γ€€γ€€γ€€πŸ’Ό OPS04-BP02 Implement application telemetryno data
γ€€γ€€γ€€πŸ’Ό OPS04-BP03 Implement user experience telemetryno data
γ€€γ€€γ€€πŸ’Ό OPS04-BP04 Implement dependency telemetryno data
γ€€γ€€γ€€πŸ’Ό OPS04-BP05 Implement distributed tracing1no data
γ€€γ€€πŸ’Ό Mitigate deployment risks4no data
γ€€γ€€γ€€πŸ’Ό OPS06-BP01 Plan for unsuccessful changesno data
γ€€γ€€γ€€πŸ’Ό OPS06-BP02 Test deploymentsno data
γ€€γ€€γ€€πŸ’Ό OPS06-BP03 Employ safe deployment strategiesno data
γ€€γ€€γ€€πŸ’Ό OPS06-BP04 Automate testing and rollbackno data
γ€€γ€€πŸ’Ό Operational readiness and change management6no data
γ€€γ€€γ€€πŸ’Ό OPS07-BP01 Ensure personnel capabilityno data
γ€€γ€€γ€€πŸ’Ό OPS07-BP02 Ensure a consistent review of operational readinessno data
γ€€γ€€γ€€πŸ’Ό OPS07-BP03 Use runbooks to perform proceduresno data
γ€€γ€€γ€€πŸ’Ό OPS07-BP04 Use playbooks to investigate issuesno data
γ€€γ€€γ€€πŸ’Ό OPS07-BP05 Make informed decisions to deploy systems and changesno data
γ€€γ€€γ€€πŸ’Ό OPS07-BP06 Create support plans for production workloadsno data
πŸ’Ό Performance Efficiency5no data
γ€€πŸ’Ό Architecture selection7no data
γ€€γ€€πŸ’Ό PERF01-BP01 Learn about and understand available cloud services and featuresno data
γ€€γ€€πŸ’Ό PERF01-BP02 Use guidance from your cloud provider or an appropriate partner to learn about architecture patterns and best practicesno data
γ€€γ€€πŸ’Ό PERF01-BP03 Factor cost into architectural decisionsno data
γ€€γ€€πŸ’Ό PERF01-BP04 Evaluate how trade-offs impact customers and architecture efficiencyno data
γ€€γ€€πŸ’Ό PERF01-BP05 Use policies and reference architecturesno data
γ€€γ€€πŸ’Ό PERF01-BP06 Use benchmarking to drive architectural decisionsno data
γ€€γ€€πŸ’Ό PERF01-BP07 Use a data-driven approach for architectural choicesno data
γ€€πŸ’Ό Compute and hardware6no data
γ€€γ€€πŸ’Ό PERF02-BP01 Select the best compute options for your workloadno data
γ€€γ€€πŸ’Ό PERF02-BP02 Understand the available compute configuration and featuresno data
γ€€γ€€πŸ’Ό PERF02-BP03 Collect compute-related metricsno data
γ€€γ€€πŸ’Ό PERF02-BP04 Configure and right-size compute resourcesno data
γ€€γ€€πŸ’Ό PERF02-BP05 Scale your compute resources dynamicallyno data
γ€€γ€€πŸ’Ό PERF02-BP06 Use optimized hardware-based compute acceleratorsno data
γ€€πŸ’Ό Data management4no data
γ€€γ€€πŸ’Ό PERF03-BP01 Use a purpose-built data store that best supports your data access and storage requirementsno data
γ€€γ€€πŸ’Ό PERF03-BP02 Evaluate available configuration options for data storeno data
γ€€γ€€πŸ’Ό PERF03-BP03 Collect and record data store performance metricsno data
γ€€γ€€πŸ’Ό PERF03-BP04 Implement strategies to improve query performance in data storeno data
γ€€πŸ’Ό Networking and content delivery7no data
γ€€γ€€πŸ’Ό PERF04-BP01 Understand how networking impacts performanceno data
γ€€γ€€πŸ’Ό PERF04-BP02 Evaluate available networking featuresno data
γ€€γ€€πŸ’Ό PERF04-BP03 Choose appropriate dedicated connectivity or VPN for your workloadno data
γ€€γ€€πŸ’Ό PERF04-BP04 Use load balancing to distribute traffic across multiple resourcesno data
γ€€γ€€πŸ’Ό PERF04-BP05 Choose network protocols to improve performanceno data
γ€€γ€€πŸ’Ό PERF04-BP06 Choose your workload's location based on network requirementsno data
γ€€γ€€πŸ’Ό PERF04-BP07 Optimize network configuration based on metricsno data
γ€€πŸ’Ό Process and culture7no data
γ€€γ€€πŸ’Ό PERF05-BP01 Establish key performance indicators (KPIs) to measure workload health and performanceno data
γ€€γ€€πŸ’Ό PERF05-BP02 Use monitoring solutions to understand the areas where performance is most criticalno data
γ€€γ€€πŸ’Ό PERF05-BP03 Define a process to improve workload performanceno data
γ€€γ€€πŸ’Ό PERF05-BP04 Load test your workloadno data
γ€€γ€€πŸ’Ό PERF05-BP05 Use automation to proactively remediate performance-related issuesno data
γ€€γ€€πŸ’Ό PERF05-BP06 Keep your workload and services up-to-dateno data
γ€€γ€€πŸ’Ό PERF05-BP07 Review metrics at regular intervalsno data
πŸ’Ό Reliability4no data
γ€€πŸ’Ό Change management3no data
γ€€γ€€πŸ’Ό Design your workload to adapt to changes in demand4no data
γ€€γ€€γ€€πŸ’Ό REL07-BP01 Use automation when obtaining or scaling resourcesno data
γ€€γ€€γ€€πŸ’Ό REL07-BP02 Obtain resources upon detection of impairment to a workloadno data
γ€€γ€€γ€€πŸ’Ό REL07-BP03 Obtain resources upon detection that more resources are needed for a workloadno data
γ€€γ€€γ€€πŸ’Ό REL07-BP04 Load test your workloadno data
γ€€γ€€πŸ’Ό Implement change5no data
γ€€γ€€γ€€πŸ’Ό REL08-BP01 Use runbooks for standard activities such as deploymentno data
γ€€γ€€γ€€πŸ’Ό REL08-BP02 Integrate functional testing as part of your deploymentno data
γ€€γ€€γ€€πŸ’Ό REL08-BP03 Integrate resiliency testing as part of your deploymentno data
γ€€γ€€γ€€πŸ’Ό REL08-BP04 Deploy using immutable infrastructureno data
γ€€γ€€γ€€πŸ’Ό REL08-BP05 Deploy changes with automationno data
γ€€γ€€πŸ’Ό Monitor workload resources7no data
γ€€γ€€γ€€πŸ’Ό REL06-BP01 Monitor all components for the workload (Generation)no data
γ€€γ€€γ€€πŸ’Ό REL06-BP02 Define and calculate metrics (Aggregation)no data
γ€€γ€€γ€€πŸ’Ό REL06-BP03 Send notifications (Real-time processing and alarming)no data
γ€€γ€€γ€€πŸ’Ό REL06-BP04 Automate responses (Real-time processing and alarming)no data
γ€€γ€€γ€€πŸ’Ό REL06-BP05 Analyze logsno data
γ€€γ€€γ€€πŸ’Ό REL06-BP06 Regularly review monitoring scope and metricsno data
γ€€γ€€γ€€πŸ’Ό REL06-BP07 Monitor end-to-end tracing of requests through your systemno data
γ€€πŸ’Ό Failure management5no data
γ€€γ€€πŸ’Ό Back up data4no data
γ€€γ€€γ€€πŸ’Ό REL09-BP01 Identify and back up all data that needs to be backed up, or reproduce the data from sourcesno data
γ€€γ€€γ€€πŸ’Ό REL09-BP02 Secure and encrypt backupsno data
γ€€γ€€γ€€πŸ’Ό REL09-BP03 Perform data backup automaticallyno data
γ€€γ€€γ€€πŸ’Ό REL09-BP04 Perform periodic recovery of the data to verify backup integrity and processesno data
γ€€γ€€πŸ’Ό Design your workload to withstand component failures7no data
γ€€γ€€γ€€πŸ’Ό REL11-BP01 Monitor all components of the workload to detect failuresno data
γ€€γ€€γ€€πŸ’Ό REL11-BP02 Fail over to healthy resourcesno data
γ€€γ€€γ€€πŸ’Ό REL11-BP03 Automate healing on all layersno data
γ€€γ€€γ€€πŸ’Ό REL11-BP04 Rely on the data plane and not the control plane during recoveryno data
γ€€γ€€γ€€πŸ’Ό REL11-BP05 Use static stability to prevent bimodal behaviorno data
γ€€γ€€γ€€πŸ’Ό REL11-BP06 Send notifications when events impact availabilityno data
γ€€γ€€γ€€πŸ’Ό REL11-BP07 Architect your product to meet availability targets and uptime service level agreements (SLAs)no data
γ€€γ€€πŸ’Ό Plan for Disaster Recovery (DR)5no data
γ€€γ€€γ€€πŸ’Ό REL13-BP01 Define recovery objectives for downtime and data lossno data
γ€€γ€€γ€€πŸ’Ό REL13-BP02 Use defined recovery strategies to meet the recovery objectivesno data
γ€€γ€€γ€€πŸ’Ό REL13-BP03 Test disaster recovery implementation to validate the implementationno data
γ€€γ€€γ€€πŸ’Ό REL13-BP04 Manage configuration drift at the DR site or Regionno data
γ€€γ€€γ€€πŸ’Ό REL13-BP05 Automate recoveryno data
γ€€γ€€πŸ’Ό Test reliability5no data
γ€€γ€€γ€€πŸ’Ό REL12-BP01 Use playbooks to investigate failuresno data
γ€€γ€€γ€€πŸ’Ό REL12-BP02 Perform post-incident analysisno data
γ€€γ€€γ€€πŸ’Ό REL12-BP03 Test scalability and performance requirementsno data
γ€€γ€€γ€€πŸ’Ό REL12-BP04 Test resiliency using chaos engineeringno data
γ€€γ€€γ€€πŸ’Ό REL12-BP05 Conduct game days regularlyno data
γ€€γ€€πŸ’Ό Use fault isolation to protect your workload3no data
γ€€γ€€γ€€πŸ’Ό REL10-BP01 Deploy the workload to multiple locationsno data
γ€€γ€€γ€€πŸ’Ό REL10-BP02 Automate recovery for components constrained to a single locationno data
γ€€γ€€γ€€πŸ’Ό REL10-BP03 Use bulkhead architectures to limit scope of impactno data
γ€€πŸ’Ό Foundations2no data
γ€€γ€€πŸ’Ό Manage service quotas and constraints6no data
γ€€γ€€γ€€πŸ’Ό REL01-BP01 Aware of service quotas and constraintsno data
γ€€γ€€γ€€πŸ’Ό REL01-BP02 Manage service quotas across accounts and regionsno data
γ€€γ€€γ€€πŸ’Ό REL01-BP03 Accommodate fixed service quotas and constraints through architectureno data
γ€€γ€€γ€€πŸ’Ό REL01-BP04 Monitor and manage quotasno data
γ€€γ€€γ€€πŸ’Ό REL01-BP05 Automate quota managementno data
γ€€γ€€γ€€πŸ’Ό REL01-BP06 Ensure that a sufficient gap exists between the current quotas and the maximum usage to accommodate failoverno data
γ€€γ€€πŸ’Ό Plan your network topology5no data
γ€€γ€€γ€€πŸ’Ό REL02-BP01 Use highly available network connectivity for your workload public endpointsno data
γ€€γ€€γ€€πŸ’Ό REL02-BP02 Provision redundant connectivity between private networks in the cloud and on-premises environmentsno data
γ€€γ€€γ€€πŸ’Ό REL02-BP03 Ensure IP subnet allocation accounts for expansion and availabilityno data
γ€€γ€€γ€€πŸ’Ό REL02-BP04 Prefer hub-and-spoke topologies over many-to-many meshno data
γ€€γ€€γ€€πŸ’Ό REL02-BP05 Enforce non-overlapping private IP address ranges in all private address spaces where they are connectedno data
γ€€πŸ’Ό Workload architecture3no data
γ€€γ€€πŸ’Ό Design interactions in a distributed system to mitigate or withstand failures7no data
γ€€γ€€γ€€πŸ’Ό REL05-BP01 Implement graceful degradation to transform applicable hard dependencies into soft dependenciesno data
γ€€γ€€γ€€πŸ’Ό REL05-BP02 Throttle requestsno data
γ€€γ€€γ€€πŸ’Ό REL05-BP03 Control and limit retry callsno data
γ€€γ€€γ€€πŸ’Ό REL05-BP04 Fail fast and limit queuesno data
γ€€γ€€γ€€πŸ’Ό REL05-BP05 Set client timeoutsno data
γ€€γ€€γ€€πŸ’Ό REL05-BP06 Make systems stateless where possibleno data
γ€€γ€€γ€€πŸ’Ό REL05-BP07 Implement emergency leversno data
γ€€γ€€πŸ’Ό Design interactions in a distributed system to prevent failures4no data
γ€€γ€€γ€€πŸ’Ό REL04-BP01 Identify the kind of distributed systems you depend onno data
γ€€γ€€γ€€πŸ’Ό REL04-BP02 Implement loosely coupled dependenciesno data
γ€€γ€€γ€€πŸ’Ό REL04-BP03 Do constant workno data
γ€€γ€€γ€€πŸ’Ό REL04-BP04 Make mutating operations idempotentno data
γ€€γ€€πŸ’Ό Design your workload service architecture3no data
γ€€γ€€γ€€πŸ’Ό REL03-BP01 Choose how to segment your workloadno data
γ€€γ€€γ€€πŸ’Ό REL03-BP02 Build services focused on specific business domains and functionalityno data
γ€€γ€€γ€€πŸ’Ό REL03-BP03 Provide service contracts per APIno data
πŸ’Ό Security71no data
γ€€πŸ’Ό Application Security8no data
γ€€γ€€πŸ’Ό SEC11-BP01 Train for application securityno data
γ€€γ€€πŸ’Ό SEC11-BP02 Automate testing throughout the development and release lifecycleno data
γ€€γ€€πŸ’Ό SEC11-BP03 Perform regular penetration testingno data
γ€€γ€€πŸ’Ό SEC11-BP04 Conduct code reviewsno data
γ€€γ€€πŸ’Ό SEC11-BP05 Centralize services for packages and dependenciesno data
γ€€γ€€πŸ’Ό SEC11-BP06 Deploy software programmaticallyno data
γ€€γ€€πŸ’Ό SEC11-BP07 Regularly assess security properties of the pipelinesno data
γ€€γ€€πŸ’Ό SEC11-BP08 Build a program that embeds security ownership in workload teamsno data
γ€€πŸ’Ό Data protection3no data
γ€€γ€€πŸ’Ό Data Classification4no data
γ€€γ€€γ€€πŸ’Ό SEC07-BP01 Understand your data classification schemeno data
γ€€γ€€γ€€πŸ’Ό SEC07-BP02 Apply data protection controls based on data sensitivityno data
γ€€γ€€γ€€πŸ’Ό SEC07-BP03 Automate identification and classificationno data
γ€€γ€€γ€€πŸ’Ό SEC07-BP04 Define scalable data lifecycle managementno data
γ€€γ€€πŸ’Ό Protecting Data at Rest4no data
γ€€γ€€γ€€πŸ’Ό SEC08-BP01 Implement secure key managementno data
γ€€γ€€γ€€πŸ’Ό SEC08-BP02 Enforce encryption at restno data
γ€€γ€€γ€€πŸ’Ό SEC08-BP03 Automate data at rest protectionno data
γ€€γ€€γ€€πŸ’Ό SEC08-BP04 Enforce access controlno data
γ€€γ€€πŸ’Ό Protecting Data in Transit3no data
γ€€γ€€γ€€πŸ’Ό SEC09-BP01 Implement secure key and certificate managementno data
γ€€γ€€γ€€πŸ’Ό SEC09-BP02 Enforce encryption in transitno data
γ€€γ€€γ€€πŸ’Ό SEC09-BP03 Authenticate network communicationsno data
γ€€πŸ’Ό Detection41no data
γ€€γ€€πŸ’Ό SEC04-BP01 Configure service and application loggingno data
γ€€γ€€πŸ’Ό SEC04-BP02 Capture logs, findings, and metrics in standardized locationsno data
γ€€γ€€πŸ’Ό SEC04-BP03 Correlate and enrich security alerts1no data
γ€€γ€€πŸ’Ό SEC04-BP04 Initiate remediation for non-compliant resources1no data
γ€€πŸ’Ό Identity and Access Management2no data
γ€€γ€€πŸ’Ό Identity management6no data
γ€€γ€€γ€€πŸ’Ό SEC02-BP01 Use strong sign-in mechanismsno data
γ€€γ€€γ€€πŸ’Ό SEC02-BP02 Use temporary credentialsno data
γ€€γ€€γ€€πŸ’Ό SEC02-BP03 Store and use secrets securelyno data
γ€€γ€€γ€€πŸ’Ό SEC02-BP04 Rely on a centralized identity providerno data
γ€€γ€€γ€€πŸ’Ό SEC02-BP05 Audit and rotate credentials periodicallyno data
γ€€γ€€γ€€πŸ’Ό SEC02-BP06 Employ user groups and attributesno data
γ€€γ€€πŸ’Ό Permissions management9no data
γ€€γ€€γ€€πŸ’Ό SEC03-BP01 Define access requirementsno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP02 Grant least privilege accessno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP03 Establish emergency access processno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP04 Reduce permissions continuouslyno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP05 Define permission guardrails for your organizationno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP06 Manage access based on lifecycleno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP07 Analyze public and cross-account accessno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP08 Share resources securely within your organizationno data
γ€€γ€€γ€€πŸ’Ό SEC03-BP09 Share resources securely with a third partyno data
γ€€πŸ’Ό Incident Response1no data
γ€€γ€€πŸ’Ό Preparation8no data
γ€€γ€€γ€€πŸ’Ό SEC10-BP01 Identify key personnel and external resourcesno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP02 Develop incident management plansno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP03 Prepare forensic capabilitiesno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP04 Develop and test security incident response playbooksno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP05 Pre-provision accessno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP06 Pre-deploy toolsno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP07 Run simulationsno data
γ€€γ€€γ€€πŸ’Ό SEC10-BP08 Establish a framework for learning from incidentsno data
γ€€πŸ’Ό Infrastructure protection21no data
γ€€γ€€πŸ’Ό Protecting Compute5no data
γ€€γ€€γ€€πŸ’Ό SEC06-BP01 Perform vulnerability managementno data
γ€€γ€€γ€€πŸ’Ό SEC06-BP02 Provision compute from hardened imagesno data
γ€€γ€€γ€€πŸ’Ό SEC06-BP03 Reduce manual management and interactive accessno data
γ€€γ€€γ€€πŸ’Ό SEC06-BP04 Validate software integrityno data
γ€€γ€€γ€€πŸ’Ό SEC06-BP05 Automate compute protectionno data
γ€€γ€€πŸ’Ό Protecting Networks41no data
γ€€γ€€γ€€πŸ’Ό SEC05-BP01 Create network layersno data
γ€€γ€€γ€€πŸ’Ό SEC05-BP02 Control traffic flow within your network layersno data
γ€€γ€€γ€€πŸ’Ό SEC05-BP03 Implement inspection-based protection1no data
γ€€γ€€γ€€πŸ’Ό SEC05-BP04 Automate network protection1no data
γ€€πŸ’Ό Security Foundations1no data
γ€€γ€€πŸ’Ό Operating your workloads securely8no data
γ€€γ€€γ€€πŸ’Ό SEC01-BP01 Separate workloads using accountsno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP02 Secure account root user and propertiesno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP03 Identify and validate control objectivesno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP04 Stay up to date with security threats and recommendationsno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP05 Reduce security management scopeno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP06 Automate deployment of standard security controlsno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP07 Identify threats and prioritize mitigations using a threat modelno data
γ€€γ€€γ€€πŸ’Ό SEC01-BP08 Evaluate and implement new security services and features regularlyno data
πŸ’Ό Sustainability6no data
γ€€πŸ’Ό Alignment to demand6no data
γ€€γ€€πŸ’Ό SUS02-BP01 Scale workload infrastructure dynamicallyno data
γ€€γ€€πŸ’Ό SUS02-BP02 Align SLAs with sustainability goalsno data
γ€€γ€€πŸ’Ό SUS02-BP03 Stop the creation and maintenance of unused assetsno data
γ€€γ€€πŸ’Ό SUS02-BP04 Optimize geographic placement of workloads based on their networking requirementsno data
γ€€γ€€πŸ’Ό SUS02-BP05 Optimize team member resources for activities performedno data
γ€€γ€€πŸ’Ό SUS02-BP06 Implement buffering or throttling to flatten the demand curveno data
γ€€πŸ’Ό Data management8no data
γ€€γ€€πŸ’Ό SUS04-BP01 Implement a data classification policyno data
γ€€γ€€πŸ’Ό SUS04-BP02 Use technologies that support data access and storage patternsno data
γ€€γ€€πŸ’Ό SUS04-BP03 Use policies to manage the lifecycle of your datasetsno data
γ€€γ€€πŸ’Ό SUS04-BP04 Use elasticity and automation to expand block storage or file systemno data
γ€€γ€€πŸ’Ό SUS04-BP05 Remove unneeded or redundant datano data
γ€€γ€€πŸ’Ό SUS04-BP06 Use shared file systems or storage to access common datano data
γ€€γ€€πŸ’Ό SUS04-BP07 Minimize data movement across networksno data
γ€€γ€€πŸ’Ό SUS04-BP08 Back up data only when difficult to recreateno data
γ€€πŸ’Ό Hardware and services4no data
γ€€γ€€πŸ’Ό SUS05-BP01 Use the minimum amount of hardware to meet your needsno data
γ€€γ€€πŸ’Ό SUS05-BP02 Use instance types with the least impactno data
γ€€γ€€πŸ’Ό SUS05-BP03 Use managed servicesno data
γ€€γ€€πŸ’Ό SUS05-BP04 Optimize your use of hardware-based compute acceleratorsno data
γ€€πŸ’Ό Process and culture5no data
γ€€γ€€πŸ’Ό SUS06-BP01 Communicate and cascade your sustainability goalsno data
γ€€γ€€πŸ’Ό SUS06-BP02 Adopt methods that can rapidly introduce sustainability improvementsno data
γ€€γ€€πŸ’Ό SUS06-BP03 Keep your workload up-to-dateno data
γ€€γ€€πŸ’Ό SUS06-BP04 Increase utilization of build environmentsno data
γ€€γ€€πŸ’Ό SUS06-BP05 Use managed device farms for testingno data
γ€€πŸ’Ό Region selection1no data
γ€€γ€€πŸ’Ό SUS01-BP01 Choose Region based on both business requirements and sustainability goalsno data
γ€€πŸ’Ό Software and architecture5no data
γ€€γ€€πŸ’Ό SUS03-BP01 Optimize software and architecture for asynchronous and scheduled jobsno data
γ€€γ€€πŸ’Ό SUS03-BP02 Remove or refactor workload components with low or no useno data
γ€€γ€€πŸ’Ό SUS03-BP03 Optimize areas of code that consume the most time or resourcesno data
γ€€γ€€πŸ’Ό SUS03-BP04 Optimize impact on devices and equipmentno data
γ€€γ€€πŸ’Ό SUS03-BP05 Use software patterns and architectures that best support data access and storage patternsno data