Book Image

Optimizing Your Modernization Journey with AWS

By : Mridula Grandhi
Book Image

Optimizing Your Modernization Journey with AWS

By: Mridula Grandhi

Overview of this book

AWS cloud technologies help businesses scale and innovate, however, adopting modern architecture and applications can be a real challenge. This book is a comprehensive guide that ensures your switch to AWS services is smooth and hitch-free. It will enable you to make optimal decisions to bring out the best ROI from AWS cloud adoption. Beginning with nuances of cloud transformation on AWS, you’ll be able to plan and implement the migration steps. The book will facilitate your system modernization journey by getting you acquainted with various technical domains, namely, applications, databases, big data, analytics, networking, and security. Once you’ve learned about the different operations, budgeting, and management best practices such as the 6 Rs of migration approaches and the AWS Well-Architected Framework, you’ll be able to achieve operational excellence in cloud adoption. You’ll also learn how to deploy some of the important AWS tools and services with real-life case studies and use cases. By the end of this book, you’ll be able to successfully implement cloud migration and modernization on AWS and make decisions that best suit your organization.
Table of Contents (20 chapters)
1
Part 1: Migrating to the Cloud
6
Part 2: Cloud Modernization – Application, Data, Analytics, and IT
12
Part 3: Security and Networking Transformation
15
Part 4: Cloud Economics, Compliance, and Governance

Understanding the security implications of digital transformation

There is a large uptick in security vulnerabilities for enterprises that do not follow a security-by-design methodology in their digital transformation efforts. Enterprises often find themselves dealing with security vulnerabilities in their infrastructure, web applications, Application Programming Interfaces (APIs), and microservices that can lead to business and reputation loss.

Legacy vulnerabilities and misconfigurations remain a challenge for many enterprises and can be used as an entry point for enterprise value chain attacks. Let us learn about the main security challenges that can introduce cybersecurity risks in today’s digital world:

  • Unsecured data

With the increase in the number of web transactions, the volume of data is increasing and is vulnerable to attacks. This data usually flows through three distinct areas:

  • Data at rest within applications, whether it is on-premises...