Search for Well Architected Advice
-
Operational Excellence
-
- Resources have identified owners
- Processes and procedures have identified owners
- Operations activities have identified owners responsible for their performance
- Team members know what they are responsible for
- Mechanisms exist to identify responsibility and ownership
- Mechanisms exist to request additions, changes, and exceptions
- Responsibilities between teams are predefined or negotiated
-
- Executive Sponsorship
- Team members are empowered to take action when outcomes are at risk
- Escalation is encouraged
- Communications are timely, clear, and actionable
- Experimentation is encouraged
- Team members are encouraged to maintain and grow their skill sets
- Resource teams appropriately
- Diverse opinions are encouraged and sought within and across teams
-
- Use version control
- Test and validate changes
- Use configuration management systems
- Use build and deployment management systems
- Perform patch management
- Implement practices to improve code quality
- Share design standards
- Use multiple environments
- Make frequent, small, reversible changes
- Fully automate integration and deployment
-
Security
-
- Evaluate and implement new security services and features regularly
- Automate testing and validation of security controls in pipelines
- Identify and prioritize risks using a threat model
- Keep up-to-date with security recommendations
- Keep up-to-date with security threats
- Identify and validate control objectives
- Secure account root user and properties
- Separate workloads using accounts
-
- Analyze public and cross-account access
- Manage access based on life cycle
- Share resources securely with a third party
- Reduce permissions continuously
- Share resources securely within your organization
- Establish emergency access process
- Define permission guardrails for your organization
- Grant least privilege access
- Define access requirements
-
- Build a program that embeds security ownership in workload teams
- Centralize services for packages and dependencies
- Manual code reviews
- Automate testing throughout the development and release lifecycle
- Train for application security
- Regularly assess security properties of the pipelines
- Deploy software programmatically
- Perform regular penetration testing
-
-
Reliability
-
- How do you ensure sufficient gap between quotas and maximum usage to accommodate failover?
- How do you automate quota management?
- How do you monitor and manage service quotas?
- How do you accommodate fixed service quotas and constraints through architecture?
- How do you manage service quotas and constraints across accounts and Regions?
- How do you manage service quotas and constraints?
- How do you build a program that embeds reliability into workload teams?
-
- How do you enforce non-overlapping private IP address ranges in all private address spaces?
- How do you prefer hub-and-spoke topologies over many-to-many mesh?
- How do you ensure IP subnet allocation accounts for expansion and availability?
- How do you provision redundant connectivity between private networks in the cloud and on-premises environments?
- How do you use highly available network connectivity for workload public endpoints?
-
- Monitor end-to-end tracing of requests through your system
- Conduct reviews regularly
- Analytics
- Automate responses (Real-time processing and alarming)
- Send notifications (Real-time processing and alarming)
- Define and calculate metrics (Aggregation)
- Monitor End-to-End Tracing of Requests Through Your System
-
- Monitor all components of the workload to detect failures
- Fail over to healthy resources
- Automate healing on all layers
- Rely on the data plane and not the control plane during recovery
- Use static stability to prevent bimodal behavior
- Send notifications when events impact availability
- Architect your product to meet availability targets and uptime service level agreements (SLAs)
-
-
Cost Optimization
-
- Establish ownership of cost optimization
- Establish a partnership between finance and technology
- Establish cloud budgets and forecasts
- Implement cost awareness in your organizational processes
- Monitor cost proactively
- Keep up-to-date with new service releases
- Quantify business value from cost optimization
- Report and notify on cost optimization
- Create a cost-aware culture
-
- Perform cost analysis for different usage over time
- Analyze all components of this workload
- Perform a thorough analysis of each component
- Select components of this workload to optimize cost in line with organization priorities
- Perform cost analysis for different usage over time
- Select software with cost effective licensing
-
-
Performance
-
- Learn about and understand available cloud services and features
- Evaluate how trade-offs impact customers and architecture efficiency
- Use guidance from your cloud provider or an appropriate partner to learn about architecture patterns and best practices
- Factor cost into architectural decisions
- Use policies and reference architectures
- Use benchmarking to drive architectural decisions
- Use a data-driven approach for architectural choices
-
- Use purpose-built data store that best support your data access and storage requirements
- Collect and record data store performance metrics
- Evaluate available configuration options for data store
- Implement Strategies to Improve Query Performance in Data Store
- Implement data access patterns that utilize caching
-
- Understand how networking impacts performance
- Evaluate available networking features
- Choose appropriate dedicated connectivity or VPN for your workload
- Use load balancing to distribute traffic across multiple resources
- Choose network protocols to improve performance
- Choose your workload's location based on network requirements
- Optimize network configuration based on metrics
-
- Establish key performance indicators (KPIs) to measure workload health and performance
- Use monitoring solutions to understand the areas where performance is most critical
- Define a process to improve workload performance
- Review metrics at regular intervals
- Load test your workload
- Use automation to proactively remediate performance-related issues
- Keep your workload and services up-to-date
-
-
Sustainability
-
- Optimize geographic placement of workloads based on their networking requirements
- Align SLAs with sustainability goals
- Optimize geographic placement of workloads based on their networking requirements
- Stop the creation and maintenance of unused assets
- Optimize team member resources for activities performed
- Implement buffering or throttling to flatten the demand curve
-
- Optimize software and architecture for asynchronous and scheduled jobs
- Remove or refactor workload components with low or no use
- Optimize areas of code that consume the most time or resources
- Optimize impact on devices and equipment
- Use software patterns and architectures that best support data access and storage patterns
- Remove unneeded or redundant data
- Use technologies that support data access and storage patterns
- Use policies to manage the lifecycle of your datasets
- Use shared file systems or storage to access common data
- Back up data only when difficult to recreate
- Use elasticity and automation to expand block storage or file system
- Minimize data movement across networks
-
- Articles coming soon
< All Topics
Print
Validate software integrity
PostedNovember 28, 2024
UpdatedNovember 28, 2024
ByKevin McCaffrey
Validating the integrity of software, code, and libraries is crucial to ensuring that only trusted and untampered software is used in your workload. Implementing mechanisms such as code signing and checksums helps verify the authenticity and integrity of the software, preventing the introduction of malicious or altered code. By validating software integrity, you protect your environment from potential security threats that could arise from compromised software or libraries.
- Implement code signing: Use code signing to ensure that the software, scripts, and libraries in your workload are from trusted sources and have not been tampered with. Code signing allows you to verify the authenticity of the code’s origin and its integrity. For example, AWS Signer provides a centralized way to manage the code-signing lifecycle, allowing you to sign binaries, scripts, and other artifacts with cryptographic signatures. This helps validate that the software has not been altered since it was signed by the author.
- Verify code signing certificates: When using signed software, verify the associated code signing certificates to confirm the author’s identity and ensure that the software has not been tampered with. AWS Signer can manage the signing certificates, including public and private keys, to help ensure that the software in your workload is legitimate and secure.
- Validate checksums for downloaded software: For software that you download from third-party providers, always verify the checksum provided by the source against the checksum of the downloaded file. This helps ensure that the software has not been tampered with during transmission. By comparing the calculated checksum of the downloaded software with the checksum provided by the vendor, you can confirm the integrity of the file.
- Use advanced patterns for AWS Lambda code signing: When deploying AWS Lambda functions, use AWS Signer to sign your Lambda code packages. This ensures that only trusted code is deployed in your Lambda functions. Code signing in AWS Lambda requires that the function code is signed and verified before deployment, helping prevent unauthorized code from running in your environment.
- Automate software integrity checks: Automate the validation of software integrity by incorporating checksum verification, code signing, and certificate validation into your CI/CD pipeline. This ensures that all code and libraries used in your environment are validated before deployment, reducing the risk of introducing malicious or compromised software.
- Monitor software integrity in production: Continuously monitor the integrity of the software in your environment. Use tools like AWS CloudWatch and AWS Config to track changes in your software and validate that no unauthorized modifications have occurred.
Supporting Questions:
- How do you ensure that the software, code, and libraries used in your workload are from trusted sources and have not been tampered with?
- What mechanisms do you use to validate the integrity of downloaded software or scripts?
- How do you integrate software integrity validation into your deployment pipeline?
Roles and Responsibilities:
Security Engineer:
- Responsibilities:
- Implement code signing and checksum validation mechanisms to ensure the integrity of all software used in the workload.
- Verify code signing certificates and automate the integrity validation process in CI/CD pipelines.
- Use AWS Signer to manage code-signing certificates and keys, ensuring that only trusted software is deployed.
Cloud Administrator:
- Responsibilities:
- Ensure that all third-party software downloaded for use in the environment has its checksum verified against the provider’s values.
- Monitor software integrity continuously in production environments using AWS monitoring tools.
Artefacts:
- Code Signing and Certificate Logs: Records of code signing activities and certificate verifications performed during software deployment, helping ensure that signed software is trusted and intact.
- Checksum Validation Reports: Logs and reports of checksum verifications performed for downloaded software and libraries, confirming that no tampering has occurred.
- Code Signing Policies and Procedures: Documentation outlining the procedures for code signing, certificate validation, and checksum verification in the workload.
Relevant AWS Services:
AWS Code Signing and Security Services:
- AWS Signer: Manages the code-signing lifecycle, allowing you to sign and verify software, scripts, and Lambda functions. AWS Signer ensures that software has not been altered and originates from a trusted source.
- AWS Lambda Code Signing: Allows you to enforce that Lambda functions are signed and verified before they are deployed, ensuring that only trusted code is executed.
- AWS Secrets Manager: Helps securely store and manage signing certificates and private keys, ensuring the security of code-signing processes.
Monitoring and Compliance Services:
- AWS CloudWatch: Monitors deployed software for any changes or anomalies in production, helping ensure that the integrity of the software is maintained.
- AWS Config: Tracks changes in your environment’s software configurations and can alert you to unauthorized modifications or deviations from expected configurations.
Table of Contents