Shorticle 839 – Get prioritized and contextual best practice recommendations through AWS Trusted Advisor Priority
For cloud native application, reviewing the configuration, code and setup for services, each cloud service provider introduces Machine learning based review and recommender services like Azure Advisor, AWS Trusted Advisor and Google Recommender. These services helps you to validate your cloud services and infrastructure against best practices and remediate if there is any critical violations to be addressed.
For example, AWS Trusted Advisor works on Five pillars of Well-Architected Framework (WAF) such as
·????????Performance efficiency
·????????Cost optimization
·????????Security and compliance
·????????Operational Efficiency and
·????????Reliability
It provides comprehensive report on potential violations categorized against service limits, cost optimization against monthly savings, security and compliance violations such as data privacy, fault tolerance to address reliability and high availability and performance efficiency to reduce latency.
Recently Trusted Advisor is recently enhanced by introducing Trusted Advisor Priority where it displays various findings in Trusted Advisor by priority of critical findings and hence helps users to act upon fixing them based on the findings.
领英推è
There are about 200 checks (policies) in Trusted Advisor to check against best practices in infrastructure and cloud services and depending on the support tier like Basic support, Developer Support, Business support or Enterprise support. These checks will be carried out based on the support level (like a static analysis on code, configuration and setup) to identify potential violations and categorically organize the findings as Action recommended (critical violation) and Investigation recommended (Warning level findings).
AWS Trusted Advisor combined with
·????????Compute Optimizer (to identify potential right-sizing optimization for compute services),
·????????Amazon GuardDuty (to continuously monitor AWS accounts and workloads for any unauthorized access/behaviour or malicious activity) and
·????????VPC Flow logs (to monitor network traffic and IP access to find if there is any anomaly in network traffic)
can help to handle multi-dimensional static review in cloud resources and implement best practices.