
AWS OVERVIEW CODE
As business demand increased, multiple commits from multiple sources to the IAC code repository resulted in build failures and resource quota exhaustion. Every code commits to an Infrastructure as Code (IAC) repository that resulted in an AWS CodeBuild job followed by inconsistent client infrastructure. GPO’s primary roadblock was related to infrastructure configuration management. GPO had to manage configuration options in multiple places: Command Line Interface (CLI)/CDK applications, the AWS Management Console, and the application’s repository.
AWS OVERVIEW SOFTWARE
( AWS CDK), which is an open-source software development framework to define your cloud application resources using familiar programming languages. In addition to this, GPO had to repeat this hand-off process for every new customer they onboarded, which was not scalable.Ī fully integrated application delivery pipeline seemed to require either managing an additional web application stack or losing out on the benefits of existing provisioning framework in the AWS Cloud developed using The AWS Cloud Development Kit. The entire effort used to take days, along with a significant number of operational efforts. This involved a hand-off process from field teams to the cloud teams, which required back-and-forth communication to get everything set up. Configuration change requests continually inspired a need for more process documentation and ongoing effort from multiple roles.Īt GPO, the IT team provisioned new environments for each new customer that they onboard. Like any other enterprise content provider, managing over a million pages of content across dozens of tailored websites brought application delivery to the forefront of GPO‘s technical challenges. AWS Proton helps platform engineers scale their impact with a self-service model, which results in higher velocity for the development and deployment process throughout an application lifecycle. With AWS Proton, customers can standardize centralized templates to meet security, cost, and compliance goals. IntroductionĪWS Proton is a managed service for platform engineers to increase the pace of innovation by defining, vending, and maintaining infrastructure templates for self-service deployments. Automate in a hybrid environment with our information management and security tools to easily integrate AWS as a seamless and secure extension of your on-premises and legacy environments.This post was co-written by Joshua Major, VP of Engineering, GPO, and Jesse Varnado, Director of Engineering, GPO. You can also automate infrastructure and application security checks to continually enforce your security and compliance controls and help ensure confidentiality, integrity, and availability at all times. For example, by employing technologies like machine learning, AWS enables you to automatically and continuously discover, classify, and protect sensitive data in AWS with just a few clicks in the AWS console. Select from a wide variety of deeply integrated solutions that can be combined to automate tasks in novel ways, making it easier for your security team to work closely with developer and operations teams to create and deploy code faster and more securely. The design of our global infrastructure allows you to retain complete control over the regions in which your data is physically located, helping you meet data residency requirements.Īutomating security tasks on AWS enables you to be more secure by reducing human configuration errors and giving your team more time to focus on other work critical to your business. We also give you the control and visibility you need to help demonstrate that you comply with regional and local data privacy laws and regulations. We provide tools that allow you to easily encrypt your data in transit and at rest to help ensure that only authorized users can access it, using keys managed by our AWS Key Management System (KMS) or managing your own encryption keys with CloudHSM using FIPS 140-2 Level 3 validated HSMs. Additional encryption layers exist as well for example, all VPC cross-region peering traffic, and customer or service-to-service TLS connections. All data flowing across the AWS global network that interconnects our datacenters and regions is automatically encrypted at the physical layer before it leaves our secured facilities. With AWS you can build on the most secure global infrastructure, knowing you always own your data, including the ability to encrypt it, move it, and manage retention. Because our customers care deeply about data security, we have a world-class team of security experts monitoring our systems 24x7 to protect your content.
