Book Image

Optimizing Your Modernization Journey with AWS

By : Mridula Grandhi
Book Image

Optimizing Your Modernization Journey with AWS

By: Mridula Grandhi

Overview of this book

AWS cloud technologies help businesses scale and innovate, however, adopting modern architecture and applications can be a real challenge. This book is a comprehensive guide that ensures your switch to AWS services is smooth and hitch-free. It will enable you to make optimal decisions to bring out the best ROI from AWS cloud adoption. Beginning with nuances of cloud transformation on AWS, you’ll be able to plan and implement the migration steps. The book will facilitate your system modernization journey by getting you acquainted with various technical domains, namely, applications, databases, big data, analytics, networking, and security. Once you’ve learned about the different operations, budgeting, and management best practices such as the 6 Rs of migration approaches and the AWS Well-Architected Framework, you’ll be able to achieve operational excellence in cloud adoption. You’ll also learn how to deploy some of the important AWS tools and services with real-life case studies and use cases. By the end of this book, you’ll be able to successfully implement cloud migration and modernization on AWS and make decisions that best suit your organization.
Table of Contents (20 chapters)
1
Part 1: Migrating to the Cloud
6
Part 2: Cloud Modernization – Application, Data, Analytics, and IT
12
Part 3: Security and Networking Transformation
15
Part 4: Cloud Economics, Compliance, and Governance

Building a threat model

The security pillar of the framework calls out threat modeling as a specific best practice for building a good foundation of secure workloads. As the complexity of IT systems is growing, integrating threat modeling into your application development life cycle becomes a crucial component to mitigate potential security threats bringing down your business value. The number of use cases adds to the complexity, making it ineffective to use ad hoc approaches to find and mitigate threats.

Threat modeling offers an approach that is systematic to capture the potential threats to a workload and implement mitigations to make sure the resources of your organization are not impacting your security posture. As you are equipped with the right resources to find and address issues early in the design process, the mitigations will result in a low cost when compared to doing the same later in the application development life cycle. Let us look at the core steps of threat modeling...