☁️
CTHFM: AWS
  • Welcome
  • Getting Started
    • Account Setup
  • AWS CLI
    • AWS CLI Overview
    • Installation
  • AWS Fundamentals
    • AWS Documentation
    • AWS Shared Responsibility Model
    • Organizational Hierarchy
    • AWS Principals
    • IAM Fundamentals
      • IAM Policy Components
      • IAM Documentation References
    • AWS Security Services Overview
    • AWS Core Services
    • AWS Frameworks
    • Regions and Availability Zones
  • SQL
    • SQL Refresher for Threat Hunting
  • Logging Reference
    • Cloudtrail
      • What is Cloudtrail?
      • Setting Up Cloudtrail
      • Cloudtrail Events Structure
      • Filtering and Searching CloudTrail Logs
      • IAM ID Prefixes
      • Additional Resources
      • API References
    • VPCFlow Logs
    • GuardDuty
      • Multi-Account Setup
      • GuardDuty Concepts
      • GuardDuty Finding References
      • S3 Protection
      • Malware Protection
        • EC2 Malware Protection
          • EC2 Protection Resources
          • Monitoring Scans
          • EC2 Malware Protection Events: CloudWatch
        • S3 Malware Protection
          • Enabling S3 Malware Protection
          • After Enabling S3 Malware Protection
          • S3 Malware Resource Plan Status
          • S3 Malware Protection Quotas
      • RDS Protection Enablement
      • Lambda Protection Enablement
      • Trusted IP Lists and Threat Lists in Amazon GuardDuty
      • Remediation Recommendations
      • GuardDuty API Reference
      • GuardDuty Quotas
    • Access Analyzer
      • Setup
      • External Access and Unused Access Analyzer Findings
      • Review Findings
      • Access Analyzer Resources
      • Access Analyzer API Reference
    • AWS Network Firewall
      • Permissions
      • Firewall Log Contents
      • Logging Destinations
      • CloudWatch Firewall Metrics
    • AWS Config
      • Resource Management in AWS Config
      • AWS Config Integrations
      • AWS Config Resources
      • Configuration Item
      • Config Rules
        • Evaluation Modes
  • CloudWatch
    • Amazon CloudWatch
      • CloudWatch Concepts
      • CloudWatch Metrics
        • Filter Pattern Syntax
      • CloudWatch Alarms
        • Alarm Recommendations
      • Subscriptions
      • CloudWatch Agent
      • CloudWatch Insights
        • Supported Logs and Discovered Fields
        • CloudWatch Insights Query Syntax
      • Anomaly Detection
        • Create Anomaly Detector
        • Alarms for Anomaly Detections
      • CloudWatch Filter Syntax
      • CloudWatch Service Quota
  • Athena For Threat Hunting
    • Introduction to Athena
    • Setting Up Athena
    • SQL For Threat Hunters
    • Automated Response
    • Query Best Practices
  • AWS Security Research and Resources
    • AWS Security Blog
    • AWS Goat
    • Cloud Goat
    • Pacu
    • Prowler
    • Scout Suite
  • Threat Hunting in AWS
    • Threat Hunting in AWS
    • Threat Hunting Introduction
    • Threat Hunting Process
      • Hypothesis Generation
      • Investigation
      • Identification
      • Resolution & Follow Up
    • Pyramid of Pain
    • MITRE Att&ck
      • MITRE Att&ck Concepts
      • MITRE Att&CK Data Sources
      • MITRE Att&CK Mitigations
    • MITRE Att&ck: AWS
      • MITRE Att&CK Matrix
      • Amazon Web Services Security Control Mappings
    • AWS Threat Hunting Ideas
      • AWS Threat Hunting Ideas: EC2
      • AWS Threat Hunting Ideas: Lambda
      • AWS Threat Hunting Ideas: SQS
      • AWS Threat Hunting Ideas: SNS
      • AWS Threat Hunting Ideas: RDS
Powered by GitBook
On this page
  • 1. AWS Well-Architected Framework
  • 2. AWS Cloud Adoption Framework (CAF)
  • 3. AWS Security Reference Architecture (SRA)
  • Summary Table
  1. AWS Fundamentals

AWS Frameworks

PreviousAWS Core ServicesNextRegions and Availability Zones

Last updated 8 months ago

Overview of AWS Frameworks

AWS provides several frameworks to guide organizations in building secure, resilient, and efficient environments in the cloud. These frameworks are designed to ensure best practices are followed in architecture, security, governance, and operational management. Below are the key AWS frameworks and their purpose.

1. AWS Well-Architected Framework

The Well-Architected Framework provides guidance for designing and running workloads in the cloud. It helps organizations build secure, high-performing, resilient, and efficient infrastructure for their applications.

Key Pillars:

  1. Operational Excellence: Ensure smooth operations by monitoring, automating, and continuously improving processes.

  2. Security: Implement access controls, data protection, and incident response practices.

  3. Reliability: Design workloads that can recover from failures and meet recovery goals.

  4. Performance Efficiency: Use resources efficiently to maintain the desired performance.

  5. Cost Optimization: Eliminate unnecessary costs and maximize investment value.

  6. Sustainability: Minimize environmental impact by optimizing resource usage.

Use Case:

Regular Well-Architected Reviews identify gaps in architecture and provide recommendations to align with best practices.

2. AWS Cloud Adoption Framework (CAF)

The AWS Cloud Adoption Framework (CAF) helps organizations plan and implement cloud adoption by aligning their cloud strategies with business goals.

CAF Perspectives:

  1. Business: Aligns cloud adoption with business outcomes and stakeholder objectives.

  2. People: Focuses on workforce readiness and managing organizational change.

  3. Governance: Establishes cloud governance models and compliance frameworks.

  4. Platform: Guides the design of cloud environments and resource provisioning.

  5. Security: Ensures compliance, risk management, and security policies.

  6. Operations: Establishes cloud management processes for monitoring and incident response.

Use Case:

Organizations use the CAF to develop a roadmap for cloud migration, ensuring alignment with business goals and managing risks effectively.

3. AWS Security Reference Architecture (SRA)

The AWS Security Reference Architecture (SRA) provides detailed guidance on implementing comprehensive security controls across AWS services. It aligns with industry standards and compliance frameworks like CIS, NIST, and ISO.

Core Areas:

  1. Identity and Access Management: Use of IAM, AWS Organizations, and SSO.

  2. Threat Detection and Incident Response: Services like Amazon GuardDuty, AWS Config, and CloudTrail.

  3. Data Protection: Encryption and key management with AWS KMS and CloudHSM.

  4. Infrastructure Protection: Using VPCs, security groups, and AWS WAF.

  5. Compliance and Governance: Frameworks to automate compliance with AWS Audit Manager and Config.

Use Case:

Use the SRA to build a secure and compliant AWS environment, leveraging best practices for each security domain.

8. AWS Compliance Frameworks

AWS offers various compliance frameworks to help organizations meet industry-specific regulations and certifications like HIPAA, PCI-DSS, SOC, GDPR, and FedRAMP.

Tools and Services:

  • AWS Artifact: Access compliance reports and certifications.

  • AWS Audit Manager: Automate the preparation for compliance audits.

  • AWS Config: Monitor resources for compliance with frameworks like CIS.

Use Case:

Use these frameworks to demonstrate compliance and meet regulatory requirements for operating in the cloud.

Summary Table

Framework

Description

Use Case

Well-Architected Framework

Design secure, high-performing, resilient, and cost-effective architectures

Regular reviews for optimal architecture

Cloud Adoption Framework (CAF)

Align cloud strategies with business goals

Develop a cloud migration roadmap

Security Reference Architecture (SRA)

Implement comprehensive security controls

Build secure, compliant AWS environments

Compliance Frameworks

Meet regulatory and industry-specific compliance requirements

Use AWS Artifact and Config for compliance management

AWS Security Reference Architecture (AWS SRA) - AWS Prescriptive GuidanceAWS Prescriptive Guidance
Logo
AWS Well-Architected Framework - AWS Well-Architected FrameworkAWS Well-Architected Framework
Logo
An Overview of the AWS Cloud Adoption Framework - An Overview of the AWS Cloud Adoption FrameworkAn Overview of the AWS Cloud Adoption Framework
Logo