AWS Architecture Blog

Category: Security, Identity, & Compliance

Updates to Serverless Architectural Patterns and Best Practices

As we sail past the halfway point between re:Invent 2018 and re:Invent 2019, I’d like to revisit some of the recent serverless announcements we’ve made. These are all complimentary to the patterns discussed in the re:Invent architecture track’s Serverless Architectural Patterns and Best Practices session. AWS Event Fork Pipelines AWS Event Fork Pipelines was announced […]

Read More
Ministry of Justice Landing Zone

Building an AWS Landing Zone from Scratch in Six Weeks

In an effort to deliver a simpler, smarter, and more unified experience on its website, the UK’s Ministry of Justice and its Lead Technical Architect, James Abley, created a bespoke AWS Landing Zone, a pre-defined template for an AWS account or infrastructure. And they did it in six weeks. Supporting 33 agencies and public bodies, […]

Read More
This Is My Architecture

This Is My Architecture: Mobile Cryptocurrency Mining

In North America, approximately 95% of adults over the age of 25 have a bank account. In the developing world, that number is only about 52%. Cryptocurrencies can provide a platform for millions of unbanked people in the world to achieve financial freedom on a more level financial playing field. Electroneum, a cryptocurrency company located […]

Read More
Active Directory Whitepaper

New Whitepaper: Active Directory Domain Services on AWS

The cloud is now at the center of most Enterprise IT strategies. As such, a well-planned move to the cloud can result in immediate business payoff. To achieve such success, it’s important that you adopt Microsoft Active Directory (AD), the foundation of many large enterprise Windows and .NET applications in a secure, scalable, and highly […]

Read More

Stream Amazon CloudWatch Logs to a Centralized Account for Audit and Analysis

Note: This blog post was updated June 6, 2019. A key component of enterprise multi-account environments is logging. Centralized logging provides a single point of access to all salient logs generated across accounts and regions, and is critical for auditing, security and compliance. While some customers use the built-in ability to push Amazon CloudWatch Logs […]

Read More

Store, Protect, Optimize Your Healthcare Data with AWS: Part 1

This blog post was co-authored by Ujjwal Ratan, a senior AI/ML solutions architect on the global life sciences team. Healthcare data is generated at an ever-increasing rate and is predicted to reach 35 zettabytes by 2020. Being able to cost-effectively and securely manage this data whether for patient care, research or legal reasons is increasingly […]

Read More

Security of Cloud HSMBackups

Today, our customers use AWS CloudHSM to meet corporate, contractual and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) instances within the AWS cloud. CloudHSM delivers all the benefits of traditional HSMs including secure generation, storage, and management of cryptographic keys used for data encryption that are controlled and accessible […]

Read More

Glenn’s Take on re:Invent 2017 Part 1

GREETINGS FROM LAS VEGAS Glenn Gore here, Chief Architect for AWS. I’m in Las Vegas this week — with 43K others — for re:Invent 2017. We have a lot of exciting announcements this week. I’m going to post to the AWS Architecture blog each day with my take on what’s interesting about some of the […]

Read More