Book Image

Realize Enterprise Architecture with AWS and SAFe

By : Rajnish Harjika
Book Image

Realize Enterprise Architecture with AWS and SAFe

By: Rajnish Harjika

Overview of this book

Agile implementation of enterprise architecture (EA) in the cloud is a powerful organizational tool, but it is challenging, particularly for architects who are used to on-premises environments. This in-depth guide will tell you all you need to know to reap the benefits of applying EA in your organization to achieve operational efficiency. Starting with an overview of the foundations of enterprise architecture, you'll see how it can be applied to AWS as well as explore the frameworks AWS provides for EA, such as the AWS Well-Architected Framework. That's not all – the book shows you how these frameworks align with The Open Group Architecture Framework (TOGAF) architecture development method (ADM) and the Zachman Framework so that you can choose the right fit for your organization. As you advance, you'll learn how to apply SAFe to make your organization agile as well as efficient. Once you've gotten to grips with the theory, you can explore use cases and take a quiz at the end of the book to test yourself and see how EA is applied in practice. By the end of this enterprise architecture book, you'll have the skills and knowledge required to apply EA in the cloud with AWS and drive your organization to become super-efficient and agile.
Table of Contents (17 chapters)
1
Part 1 – Enterprise Architecture Foundation and Implementation
5
Part 2 – Enterprise Architecture Frameworks
9
Part 3 – SAFe in EA and the Cloud
12
Part 4 – Setting Up an EA

The enterprise architecture approach

IT portfolios can be standardized so that enterprise architects can avoid obsolescence by using technology architecture management. Technologies are inventoried with vendor and life cycle information (release date, end of life, and so on) that’s been obtained from existing Customer Managed Databases and cleansed. A normalization tool can streamline technology names when there are multiple sources of information. A technology life cycle database and technology inventory may also be compiled from external libraries.

After that, they conduct the following procedures:

  • Pick the technologies that will be evaluated as standards, based on feedback from developers, architects, and risk managers.
  • Decide whether to rate the vendor based on its ability to support applications, its business capabilities, or its vendor dependency.
  • Throughout the various stages of a technology’s life cycle, its status can be updated:
    • Envisioning...