AWS announces AWS Interconnect – multicloud (preview), providing simple, resilient, high-speed private connections to other cloud service providers. AWS Interconnect - multicloud is easy to configure and provides high-speed, resilient connectivity with dedicated bandwidth, enabling customers to interconnect AWS networking services such as AWS Transit Gateway, AWS Cloud WAN, and Amazon VPC to other cloud service providers with ease.
AWS Well-Architected Framework
AWS Well-Architected helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on six pillars — operational excellence, security, reliability, performance efficiency, cost optimization, and sustainability — AWS Well-Architected provides a consistent approach for customers and partners to evaluate architectures, and implement designs that can scale over time.
Recent questions
see all1 / 18
- Evermed builds software that participates in Australia's e-prescribing ecosystem which requires various government compliance requirements to be met. As part of this compliance one of the points is th...
- Hi, We are finalizing the network architecture for a high-traffic service that spans two accounts (Network and Prod) connected via Transit Gateway (TGW). We are seeking to optimize this structure to ...
- Hi all, I'm trying to configure basic auth and SAML in my OpenSearch cluster. I'm following https://docs.aws.amazon.com/opensearch-service/latest/developerguide/saml.html and https://docs.opensearch.o...
- I had free $100 credits in my account. But I mistakenly upgraded my account while i was checking other plans, and lost my free creds. Is there any way i can revert this upgrade, cz it was a mistake ?
- Hi, How do we go about resetting 2FA for an AWS account. We have the username and password, but it says we have no passkey set up and we can't find where we can reset this. All usual avenues like for...
- The Cost optimization hub has a dashboard and it shows the total cost savings including all member accounts with AWS organization. Below there is a tab of "view opportunities" to see the details/resou...
- **Problem**: I have a AWS environment that utilizes Control Tower, it previously automatically created a Log Archive Account. Within this account. I need to modify the existing Control Tower S3 buck...
- Currently, I have a Cognito user pool set up with Social sign-on, not using hosted ui. In my PreSignUp lambda, if it detects an existing user in the pool, it links the two accounts automatically via A...
- I’m trying to understand the rollout timeline of the .NET 8 managed runtime in AWS Lambda. **Note: Lambda function has Auto set in runtime configuration ** On these dates, I observed different runtim...
- Thank you in advance! I am Arturo - https://www.techfolla.it, from Italy I have been targeted by repeated very sophisticated cyberattacks reported to the ISP and to the Police: the end of the first 6...
- So most of the topology is like following when we have a fleet of Firewalls behind gwlb: Traffic A to B: A -> GWLBE -> GWLB -> FW(with Geneve decapsulation/encapsulation) -> GWLBE -> B Response B to A...
- I have enabled Cognito App Client to have refresh token rotation. Using the js sdk, I am able to make requests to rotate tokens by using current refresh token and command `GetTokensFromRefreshTokenCom...
- How can I design a secure architecture for a public-facing API on AWS when the application interacts with multiple backend services (databases, event-driven components, and external APIs) while ensuri...
- What’s the recommended way to test whether my Bedrock application is resistant to prompt injection and jailbreaks before going to production?
- Hi There, Our recent AWS bill showed a noticeable spike in data transfer / egress charges, and we’re having trouble finding the component responsible. We suspect it may involve traffic leaving a VPC ...
- We are deploying multiple foundation models through Bedrock. How can we monitor their performance, token usage, and cost impact in production to optimize usage and prevent overspending?
- I am trying Inspector Code Security Connected a GitHub repo with several projects. Those projects show up in the Code Security repository list. I selected each and clicked on 'On-demand Scan'. A mess...
- Greetings all, When working on complex network ACL, we sometimes have to enter IP Addresses - Looking back at the network ACL months later, I can't figure out who owns the IP Address what what is it...
Recent articles
see all1 / 18
- AvinashEXPERTpublished 7 days ago1 votes69 viewsPurpose of this article is to offer general guidance on how to troubleshoot issues related to deployment of CrowdStrike Falcon Next-Gen SIEM for AWS through AWS Marketplace. It summarizes common issue...
- AWS OFFICIALUpdated 11 days ago1 votes213 viewsThis article presents best practices that you can use to collect and manage security data, so that you can differentiate legitimate entities from threat actors.
- Raks KhareEXPERTpublished 19 days ago2 votes71 viewsIn multi-tenant Amazon Redshift environments, metadata security prevents tenants from viewing other tenants' schemas, tables, and system catalogs which is critical for security and compliance. This ha...
- Kanwar BajwaEXPERTpublished 23 days ago0 votes82 viewsThis article demonstrates how to use pagination tokens as checkpoints to create resilient, resumable data processing scripts. When working with AWS APIs that return large datasets, implementing a chec...
- Vamsi KrishnaEXPERTpublished a month ago0 votes119 viewsThis guide helps educational organizations optimize their AWS Promotional credit management.
- SHAJAMEXPERTpublished a month ago0 votes101 viewsAre you paying thousands of dollars for running Lambda functions in your AWS accounts. That's a common scenario where you start of Lambda functions as it is cheap but over time when you invoking the L...
- Bhanusree VadlamudiEXPERTpublished a month ago1 votes138 viewsIn this post, we'll explore how organizations can overcome the common challenge of creating and validating effective disaster recovery plans. We'll introduce AWS's entitlement for ES customers, The Dr...
- Purnaresa YEXPERTpublished a month ago0 votes85 viewsFor Security Leaders and IT Executives to demonstrate quick value while building toward long-term strategic goals.
- Purnaresa YEXPERTpublished a month ago0 votes128 viewsFor platform engineers and security architects looking to embed automated security controls into development workflows.
- Ram AchantaEXPERTpublished a month ago2 votes177 viewsEnterprises struggle with EMR version upgrades, facing challenges like production downtime, performance degradation, and compliance risks. Without a structured approach, organizations often experience...
- Onamu, AntonyEXPERTpublished 2 months ago0 votes124 viewsCalculating EC2 Linux coverage using AWS Cost and Usage Reports to achieve cost reduction through strategic Operating System selection.
- AWS OFFICIALUpdated 2 months ago1 votes332 viewsThis article provides a strategic framework for consolidating your multiple organizations in AWS Organizations. It also outlines how AWS Enterprise Support and Technical Account Managers (TAMs) can gu...
- AWS OFFICIALUpdated 2 months ago1 votes905 viewsThis article explains how to use Simulated Conditions Response and Management (SCRaM) to enhance your incident response readiness. The article includes best practices and proactive activities that you...
- Purnaresa YEXPERTpublished 2 months ago0 votes209 viewsA practical guide to implementing organization-wide EBS encryption using CloudFormation StackSets
- Purnaresa YEXPERTpublished 2 months ago0 votes141 viewsA practical guide to implementing CIS IAM.18 compliance using CloudFormation StackSets
- Purnaresa YEXPERTpublished 2 months ago0 votes192 viewsA practical guide to implementing organization-wide password policies using CloudFormation StackSets
- Purnaresa YEXPERTpublished 2 months ago0 votes122 viewsA practical guide to implementing IAM best practices using Service Control Policies
- Chandresh PatelEXPERTpublished 2 months ago1 votes503 viewsThis article explains how CloudFront Security Savings Bundle can save up to 30% on Amazon CloudFront costs through a 1-year monthly usage commitment. The savings apply to all CloudFront usage types. I...
Recent selections
see all1 / 5
- Benjamin LecoqEXPERTpublished 2 years ago9 votes17.1K viewsRe:invent 2024 takes place in Las Vegas (Nevada) from Monday 12/02 to Friday 12/06. This selection will focus on cost optimization related announcements
- Jonathan_DEXPERTpublished 2 years ago4 votes11.8K viewsDo you have critical workloads running in AWS? Review these handpicked resources to find ways to ensure your applications are resilient to failures.
- AWS OFFICIALUpdated 2 years ago0 votes29 viewsDo you want to monitor your Amazon WorkSpaces usage and optimize your costs? Deploy Cost Optimizer for Amazon WorkSpaces to review your WorkSpaces usage and manage costs.
- AWS OFFICIALUpdated 2 years ago0 votes41 viewsThis selection includes content and solutions supporting FSI related compliance and requirements covering security, immutable storage, and general guidance.
- AWS OFFICIALUpdated 2 years ago0 votes47 viewsAs a best practice, AWS recommends that you use AWS Identity and Access Management (IAM) roles instead of IAM users with long-term credentials such as access keys.
1 / 18
Riku_Kobayashi
EXPERTGary Mclean
EXPERTAntonio Lagrotteria
EXPERTOleksii Bebych
EXPERTOsvaldo Marte
EXPERTSedat SALMAN
EXPERTAdeleke Adebowale .J.
EXPERTTushar Jagdale
EXPERTMatt Barbieri
EXPERTAWS-User-alantam
EXPERTIndranil Banerjee AWS
EXPERTSHAJAM
EXPERTGK
EXPERTGarre Sandeep
EXPERTThanniru Anil Kumar
EXPERTMax Clements
EXPERTNARRAVULA MUNI SAI TEJA
EXPERT
