Book Image

Optimizing Your Modernization Journey with AWS

By : Mridula Grandhi
Book Image

Optimizing Your Modernization Journey with AWS

By: Mridula Grandhi

Overview of this book

AWS cloud technologies help businesses scale and innovate, however, adopting modern architecture and applications can be a real challenge. This book is a comprehensive guide that ensures your switch to AWS services is smooth and hitch-free. It will enable you to make optimal decisions to bring out the best ROI from AWS cloud adoption. Beginning with nuances of cloud transformation on AWS, you’ll be able to plan and implement the migration steps. The book will facilitate your system modernization journey by getting you acquainted with various technical domains, namely, applications, databases, big data, analytics, networking, and security. Once you’ve learned about the different operations, budgeting, and management best practices such as the 6 Rs of migration approaches and the AWS Well-Architected Framework, you’ll be able to achieve operational excellence in cloud adoption. You’ll also learn how to deploy some of the important AWS tools and services with real-life case studies and use cases. By the end of this book, you’ll be able to successfully implement cloud migration and modernization on AWS and make decisions that best suit your organization.
Table of Contents (20 chapters)
1
Part 1: Migrating to the Cloud
6
Part 2: Cloud Modernization – Application, Data, Analytics, and IT
12
Part 3: Security and Networking Transformation
15
Part 4: Cloud Economics, Compliance, and Governance

Architecting secure workloads on the cloud with AWS

When it comes to protecting data, systems, and assets running on AWS, there are AWS whitepapers that you can take advantage of and use to build your workload security. There are basic tenets that can be employed, summarized as follows:

  • Have a strong identity foundation: The Principle of Least Privilege (POLP) is a fundamental point that is more important than ever before when it comes to securing your resources. POLP enables users, systems, and processes to have access to the resources that are absolutely necessary to execute specific actions. This helps enforce the separation of duties for each transaction within the resources and eliminate most modern attacks. By limiting privileges, you can minimize the overall attack surface of your organization and reduce the pathways a bad actor can exploit the resources that they have access to. By limiting the superuser and administrator privileges, you can prevent, detect, and fend...