Book Image

Optimizing Your Modernization Journey with AWS

By : Mridula Grandhi
Book Image

Optimizing Your Modernization Journey with AWS

By: Mridula Grandhi

Overview of this book

AWS cloud technologies help businesses scale and innovate, however, adopting modern architecture and applications can be a real challenge. This book is a comprehensive guide that ensures your switch to AWS services is smooth and hitch-free. It will enable you to make optimal decisions to bring out the best ROI from AWS cloud adoption. Beginning with nuances of cloud transformation on AWS, you’ll be able to plan and implement the migration steps. The book will facilitate your system modernization journey by getting you acquainted with various technical domains, namely, applications, databases, big data, analytics, networking, and security. Once you’ve learned about the different operations, budgeting, and management best practices such as the 6 Rs of migration approaches and the AWS Well-Architected Framework, you’ll be able to achieve operational excellence in cloud adoption. You’ll also learn how to deploy some of the important AWS tools and services with real-life case studies and use cases. By the end of this book, you’ll be able to successfully implement cloud migration and modernization on AWS and make decisions that best suit your organization.
Table of Contents (20 chapters)
1
Part 1: Migrating to the Cloud
6
Part 2: Cloud Modernization – Application, Data, Analytics, and IT
12
Part 3: Security and Networking Transformation
15
Part 4: Cloud Economics, Compliance, and Governance

Data protection using AWS

Employing privacy controls and foundational best practices to strengthen your security posture for your workloads is crucial on the cloud. AWS offers technical, operational, and contractual measures to protect your data. This section will cover some of the foundational best practices and privacy controls to apply to your workloads.

Data classification

Classifying data is a way to categorize your data based on its criticality and sensitivity. By classifying the data, you are able to determine the appropriate protection controls. The process of data classification involves the following steps:

  1. Identifying the data: This step lets you understand the type of data your workload is processing. Information such as business processes that are involved, the data owner, and any legal and compliance requirements where it’s stored will help you determine the resulting controls that need to be implemented. For more information on the detailed process...