Overview
INCLUDED ACTIVITIES CRITICAL DESIGN AREAS DISCOVERY:
•Identify the proper attendees for each of the critical design area workshops (one workshop per Critical Design Area)
•Schedule and conduct each of the workshops, each lasting up to two hours, for each of the Critical Design Areas
•Identify, schedule, and facilitate additional break-out sessions as necessary (as determined by Trace3)
WORKLOAD RATIONALIZATION:
•Identify the first two workloads to be adapted for deployment onto landing zones into your public cloud environment
•Conduct up to eight discovery/evaluation workshops lasting up to two hours per workshop to analyze the two identified workloadsagainst each of the critical design areas
•Review the current deployment methods of the two identified workloads
CLOUD DESIGN AND DEPLOYMENT:
•Lead design of cloud foundation’s architecture
•Lead design of the two identified applications’/workloads’ architecture, landing zones, and deployment pipelines
•Lead the deployment of the cloud foundation, one to two landing zones (depending on cloud), and two identified workloads intoa non-production environment
DELIVERABLES
AWS Control Tower and F5 Distributed Cloud Services Integration Workshop: Developing a bespoke AWS Control Tower design integrated with F5 Distributed Cloud Services, serving as a playbook for the AWS platform implementation.
Project Execution Plan: Detailed backlog of tasks, ensuring a streamlined deployment process.
Custom AWS Control Tower Design: Tailored to your requirements, incorporating F5 Distributed Cloud Services for enhanced security.
New AWS Account Structure: Establishing a secure baseline across your AWS accounts using F5 Distributed Cloud Services.
AWS Landing Zone Model Implementation: Standardizing accounts and using Infrastructure as Code for scalability.
Networking and Storage Configuration: Setting up VPCs, subnets, security groups, and storage services as per your needs.
Identity Management and Tagging Strategy: Integrating with your SSO platform and implementing an effective tagging system.
Security Controls and AWS SCP Policies: Embedding baseline security and up to two SCP Policies for governance.
Comprehensive Documentation: Providing detailed documentation of the deployment, including F5 Distributed Cloud Services integration.
This solution ensures a secure, scalable AWS environment, leveraging the strength of F5 Distributed Cloud Services for unmatched security and performance. It represents a holistic approach to AWS Control Tower deployment, significantly enhanced with the security and network optimization capabilities of F5 Distributed Cloud Services. It's designed to provide your enterprise with a secure, scalable, and efficient cloud infrastructure, tailored to meet your specific business needs and objectives.
Sold by | Trace3 |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.
Support
Our certified architects and engineers, partnered with your organization’s teams, will utilize our proven methodology and deep cloud architecture experience to deliver a cloud foundation designed to adapt with your business methodology to deliver a successful project outcome.
Please contact the Trace3 Cloud Solutions Group for additional details on our approach to implementing AWS Control Tower with F5 Distributed Cloud Services.
Phone: 877-575-8877 Email: AWSMarketplaceSales@trace3.com Contact Us: https://www.trace3.com/contact