AWS Architecture Blog
Category: Security, Identity, & Compliance
Five Talent Collaborates with Customers Using the AWS Well-Architected Tool
Since its launch at re:Invent 2018, the AWS Well-Architected Tool (AWS WA Tool) has provided a consistent process for documenting and measuring architecture workloads using the best practices from the AWS Well-Architected Framework. However, sharing workload reports for collaborative work experience was time consuming. The new workload sharing feature solves these issues by offering a […]
One to Many: Evolving VPC Design
Since its inception, the Amazon Virtual Private Cloud (VPC) has acted as the embodiment of security and privacy for customers who are looking to run their applications in a controlled, private, secure, and isolated environment. This logically isolated space has evolved, and in its evolution has increased the avenues that customers can take to create […]
Building a Serverless FHIR Interface on AWS
Technology is revolutionizing the healthcare industry but it can be a challenge for healthcare providers to take full advantage because of software systems that don’t easily communicate with each other. A single patient visit involves multiple systems such as practice management, electronic health records, and billing. When these systems can’t operate together, it’s harder to […]
Updates to Serverless Architectural Patterns and Best Practices
September 8, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. As we sail past the halfway point between re:Invent 2018 and re:Invent 2019, I’d like to revisit some of the recent serverless announcements we’ve made. These are all complimentary to the patterns discussed in the re:Invent architecture track’s Serverless Architectural […]
Building an AWS Landing Zone from Scratch in Six Weeks
In an effort to deliver a simpler, smarter, and more unified experience on its website, the UK’s Ministry of Justice and its Lead Technical Architect, James Abley, created a bespoke AWS Landing Zone, a pre-defined template for an AWS account or infrastructure. And they did it in six weeks. Supporting 33 agencies and public bodies, […]
This Is My Architecture: Mobile Cryptocurrency Mining
In North America, approximately 95% of adults over the age of 25 have a bank account. In the developing world, that number is only about 52%. Cryptocurrencies can provide a platform for millions of unbanked people in the world to achieve financial freedom on a more level financial playing field. Electroneum, a cryptocurrency company located […]
New Whitepaper: Active Directory Domain Services on AWS
The cloud is now at the center of most Enterprise IT strategies. As such, a well-planned move to the cloud can result in immediate business payoff. To achieve such success, it’s important that you adopt Microsoft Active Directory (AD), the foundation of many large enterprise Windows and .NET applications in a secure, scalable, and highly […]
Stream Amazon CloudWatch Logs to a Centralized Account for Audit and Analysis
September 8, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Note: This blog post was updated June 6, 2019. A key component of enterprise multi-account environments is logging. Centralized logging provides a single point of access to all salient logs generated across accounts and regions, and is critical for auditing, […]
Store, Protect, Optimize Your Healthcare Data with AWS: Part 1
This blog post was co-authored by Ujjwal Ratan, a senior AI/ML solutions architect on the global life sciences team. Healthcare data is generated at an ever-increasing rate and is predicted to reach 35 zettabytes by 2020. Being able to cost-effectively and securely manage this data whether for patient care, research or legal reasons is increasingly […]
Security of Cloud HSMBackups
Today, our customers use AWS CloudHSM to meet corporate, contractual and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) instances within the AWS cloud. CloudHSM delivers all the benefits of traditional HSMs including secure generation, storage, and management of cryptographic keys used for data encryption that are controlled and accessible […]