AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1/18
- My account was judged to be at risk of intrusion, when I received such a reminder email, I needed to upload it to my account to answer one to four questions, when I checked one by one and then changed...
- They don't stop to send pishing emails or try to access to my account, I got the servers of this domain are...
- I have an application deployed on on-prem server, is there a way to use only IAM role or policy to access AWS SDk. I dont want to provide or store the secret key and access key anywhere to access it....
- Hello, In one of my company's AWS account we have vulnerable information leak issue. AWS Batch jobs were launched with ENV variables and this variables contains very important and vulnerable details....
- I am working on an IoT solution in which IoT devices send data to AWS Kinesis streams. Each device is identified by an IoT Thing Name, and we use this name (or its hashed value) as the Kinesis...
- Hi Team, We want to import AWS data into Jira Service Management (JSM) assets [cloud]. We do have a plugin in Atlassian Marketplace with the name - "Assets - AWS Integration" but currently is...
- Hi, I have a rest API deployed on ECS and fronted with an ALB. I set a rule on WAF to block DDOS attack. If there are more than 10 request in one minute, then the requests should block. However, it...
- Hello guys, "How can I report a loophole I’ve discovered in AWS?"
- I have a web server which I do not want to expose to the entire internet. I know that legitimate requests to this server will come from {somewhere}.us-west-2.compute.amazonaws.com. How can I make a...
- A company implements a containerized application by using Amazon Elastic Container Service (Amazon ECS) and Amazon API Gateway The application data is stored in Amazon Aurora databases and Amazon...
- A company's solutions architect is analyzing costs of a multi-application environment. The environment is deployed across multiple Availability Zones in a single AWS Region. After a recent...
- Hi all I'm looking for some advice on to what extent Cognito's Custom Authentication (define-, create- and verify auth challenge lambdas) can integrate with 'Advanced Security' and adaptive...
- Hi AWS, I am installing vault server on Amazon Windows 11 platform. The steps I performed so far are: 1. Install vault executable zip. Unzipped it and store it inside location `C:\vault\vault.exe`. 2....
- Hi all, We had a WAF review completed earlier this year, and are reviewing recommendations with a view to action. One of those is: Determine key performance indicators (KPIs) and workload metrics....
- Has anyone here actually implemented this use case? It seems like it might just be a concept, so I'd love to hear detailed insights from anyone with practical...
- Hi everyone, I understand that I can use AWS WAF captcha feature with or without integrating with my application. What I do not fully understand is the differences between using captcha with...
- I use CloudFront with AWS WAF to monitor requests. But after I enable AWS WAF, I can see nothing in the Security trends within a specified time range chart. I can see Robot requests within the...
- Hi everyone, I would like to use RDS Proxy. As far as I know, I have to add database username and password in Secrets Manager, which later will be used by RDS Proxy to connect to my RDS instance. I...
Recent articles
see all1/18
- EXPERTpublished 19 days ago1 votes283 views
- EXPERTpublished 21 days ago0 votes393 views
- EXPERTpublished 21 days ago2 votes377 views
- AWS OFFICIALUpdated 13 days ago7 votes1633 views
- AWS OFFICIALUpdated a month ago2 votes1489 views
- EXPERTpublished a month ago0 votes308 views
AWS re:Post Live | Maximize EC2 Network Performance by Monitoring Packet Loss - Live on August 12th!
EXPERTpublished a month ago0 votes1117 views- EXPERTpublished 2 months ago1 votes1865 views
- EXPERTpublished 4 months ago0 votes4592 views
- EXPERTpublished 5 months ago0 votes2221 views
Recent selections
see all1/2
1/18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTBrettski-AWS
EXPERTAntonio_Lagrotteria
EXPERTOleksii Bebych
EXPERTOsvaldo Marte
EXPERTSedat Salman
EXPERTAdeleke Adebowale J
EXPERTTushar_J
EXPERTMatt-B
EXPERTIndranil Banerjee AWS
EXPERTAWS-User-alantam
EXPERTGK
EXPERTKallu
EXPERTMax Clements
EXPERTThanniru Anil Kumar
EXPERTAndrii S
EXPERT