Amazon Web Services
Amazon Web Services
Business case:
Introduction to business:
AWS (Amazon Web Services) is Amazon's complete cloud computing platform, which comprises
infrastructure as a service (IaaS), platform as a service (PaaS), and packaged software as a service (SaaS)
products. AWS services may provide a company with resources like computational power, database
storage, and content distribution. Amazon Web Services (AWS) was founded in 2006 as an extension of
Amazon.com's internal infrastructure for handling its online retail activities. AWS is among one of the
very first firms to provide a pay-as-you-go cloud-based platform, which expands to meet users' needs for
computation, storage, and throughput. AWS provides a variety of tools and solutions for businesses and
software developers which may be utilized in data centers throughout the globe (Gillis, A. S. (2020, April
7).
AWS provides a vast number of services as well as an almost limitless amount of configuration options
for them to be used in conjunction with your application deployment. Most businesses struggle to find out
how to set up their environments in one of the most cost-effective manners while still meeting their
scalability and reliability needs. Because there are so many choices, it's easy to pick the least expensive
alternative. Cost-cutting also necessitates keeping track of consumption. It's simple to lose sight of a
deployed resource that's no longer required. You can be paying needless expenses if you don't keep track
of resources like Amazon EC2, RDS, DynamoDB, and others. You could have Amazon EBS volumes
that aren't associated with any resources, for example.
Moreover, some challenges that we came across regarding the migration of AWS are:
AWS cloud migration involves a lot of preparation and skill, but changing in the correct way saves
money and satisfies company goals. As a result, it's critical to enlist the support of AWS migration
professionals or partners who provide AWS services & solutions and benefit from their expertise.
System Architecture (as per IEEE Standard 1471-2000 Recommended
Practice):
System of interest:
Software: Web application, cloud services, architectural services, mobile application, websites.
Utilization: the system is being utilized for placing and fulfilling orders by the customers
“Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention,
commitment to operational excellence, and long-term thinking. Customer reviews, 1-Click shopping, personalized
recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Fire tablets, Fire TV,
Amazon Echo, and Alexa are some of the products and services pioneered by Amazon."
Which can basically be shortened to be guided through competition and innovation that guarantees excellence in
terms of being both future and short run-oriented. For these very reasons, AWS has come up with many different
services that prove to be beneficial for its customers by valuing their reviews above all.
Environment:
Internal:
Due to the recent pandemic, there has been a surge in online orders and hence it was important to keep
inventory and track orders that were being placed on the website and through the application. Moreover,
cloud services had been very popular among customers in recent years.
External:
External factors such as growing competition from giant companies like Ali Baba and other e-commerce
websites have put a strain on the orders that were being placed. Moreover, this stunted the business’
growth in recent years.
Interaction among the system interconnected with both the environments are seen through the customers
and companies which acquire the service both within UAE as well as abroad.
Stakeholders:
Concerns of stakeholders:
Security governance:
Develop, manage, and convey security duties, obligations, obligations, principles, practices, and
procedures in an effective and efficient manner. The efficiency of any security program depends
on having clear lines of consistency and accountability.
Assuring security:
Establish provable privacy and security measures that satisfy those objectives by documenting
controls into a complete control architecture. Examine your cloud vendor's audited financial
statements, compliance licenses, or attestations to learn more about the rules they already had in
place, how all those controls have now been tested, and whether the measures in your stretched IT
network are working properly.
Access management:
At a large scale, manage identities and permissions. You can build identities in AWS or link your
identity source, then give users the rights they need to sign in, access, provision, and coordinate
AWS resources and associated apps.
Determining threat:
Recognize and detect possible security flaws, dangers, or unusual actions. You'll be able to
prioritize defensive controls if you have a better grasp of security concerns. You will be able to
respond to attacks quicker and benefit from security incidents if you have effective threat
detection.
Managing vulnerability:
Identify, categorize, fix, and remediate security vulnerabilities on a regular basis. Changes to
current systems or the installation of new systems might potentially cause vulnerabilities. Scan
for vulnerabilities on a regular basis to assist guard against emerging threats. To correlate systems
with known vulnerabilities, use detection software and endpoint agents.
Protecting infrastructure:
Verify that your workload's systems and services are secured from unexpected and illegal access,
as well as potential vulnerabilities. Protecting your infrastructure against unwanted and
unintended access, as well as a potential vulnerability, will help you improve your cloud security
posture.
Protecting data:
Retain knowledge and transparency over data in your business, as well as how it is viewed and
utilized. One of the main goals of your security program is to protect your data against
unexpected and unauthorized access, as well as potential vulnerabilities.
Incident response:
By properly responding to security problems, you can lessen the potential for harm. So that they
can mitigate the possible impact by responding quickly, effectively, and consistently to security
issues.
Reliability: to keep in check whether the system can be trusted to fulfill the task at hand
Scalability: the extent to which the system can handle the workload
Use Case: In use case diagrams we present a high-level picture of the system and describe its
needs to our system's stakeholders.
The Zachman Framework: divides the organization's architecture into multiple viewpoints and
classifies it. This makes finding issues to consider inside the architecture much easier.
BPMN Models: The BPMN gives businesses the opportunity to explain the internal dynamics of
a system using graphics and graphical notations, making it easier to comprehend the system's
functionalities.
Component diagram
From: (How to Quickly Design AWS Architecture Diagrams. (2021, September 27).
Zachman Framework:
Zachman
What How Where Who When Why
Framework
types types
outputs through
responsibilitie
s
outputs
system strategy
AWS offers more services and features than any other cloud provider, ranging from traditional
infrastructure technologies like computation, storage, and databases to new technologies like artificial
intelligence and machine learning, data lakes and analytics, and the Internet of Things. This enables
moving your existing apps to the cloud and building practically just about everything you can imagine
faster, simpler, and more cost-effective.
Within those services, AWS provides the most advanced capabilities. For example, AWS has the most
datasets which are intended for various sorts of applications, allowing you to pick the best tool for the job
in terms of cost and performance.
We may utilize perfectly alright security controls to offer your workers, apps, and equipment the access
they must have AWS facilities and benefits under readily deployable governance guardrails for
applications operating on AWS. AWS Identity Services gives a clear lot of flexibility in where and how
you handle your staff, vendor, and customer identities, so you can transfer existing workloads to AWS
with confidence. AWS Identity Services enables to development of a unified authentication and
authorization approach across your physical and AWS environments for hybrid workload deployments.
We may use AWS Identity Services for customer-facing web and phone applications to easily add sign-up
and sign-in capabilities for your app users, which are supported by scalable cloud directories.
The process requires accessing the service either through the application available for download on both
androids and IOS software. We can also access the service through the web browser at the website. Once
done, we must create an account to further utilize the services. Once an account is made through an email
and by entering basic information, you can access the services you are looking for. One may even
upgrade to a premium to access specialized service offerings.
Business process modeling notation (BPMN):
t2.medium
$0 $0.046 $0.046
Vendor Recommended
Taken from: (AWS Marketplace: Bonita BPM powered by System Sector. (n.d.). Awsmarketplace.)
Through our analysis we were able to conclude several problems that needed action to be taken in order
to optimize the system. The very first problem that was identified was the dependence of actions on
digital means. Although there is human monitoring of the actions that take place, we feel that it is
necessary to increase the frequency of these monitoring sessions in order to ensure complete transparency
and to identify any discrepancies that may be a result of mechanized software dependence. This led us to
convert the system into one that involved greater human interaction through integrated roles that ensured
monitoring and human involvement. This made the whole system more effective in the sense that it had
little to no errors and any discrepancies that were recorded were immediately tracked and taken care of.
Service-oriented architecture:
Taken from: (DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A.,
Sivasubramanian, S., Vosshall, P., & Vogels, W. (2007)
API gateway
Compute resource Amazon RDS
/cart
GET AWS Lambda
Method/verb GET
URI www.aws/awslambda/regional/amazonrds.com
JSON {“item”: “compute”, “database”: “RDS”}
References:
https://www.google.com/url?sa=i&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fcreately.com%2Fblog%2Fdiagrams
%2Faws-templates-for-architecture-diagrams
%2F&psig=AOvVaw1Zk8V9JKbCMIxeN5NxEWYt&ust=1649693851295000&source=images
&cd=vfe&ved=0CAoQjRxqFwoTCLDLo9PyifcCFQAAAAAdAAAAABAD
https://docs.aws.amazon.com/mediaconnect/latest/ug/use-cases-distribution.html
https://aws.amazon.com/marketplace/pp/prodview-phheiroj6liqo
https://www.google.com/url?sa=i&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttps%2Fforum.camunda.org%2Ft
%2Fbpmn-vs-aws-step-function
%2F5460&psig=AOvVaw2jydrV9L0eFkngJiOArCXb&ust=1649700696225000&source
=images&cd=vfe&ved=0CAoQjRxqFwoTCLCM-8KMivcCFQAAAAAdAAAAABAD
DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A.,
Sivasubramanian, S., Vosshall, P., & Vogels, W. (2007). Dynamo. ACM SIGOPS