Updated: AWS Well-Architected Framework

Insert Application Security Here

Travis Felder
3 min readApr 12, 2023

The Amazon Web Services (AWS) Well-Architected Framework is a comprehensive set of best practices and guidelines designed to help organizations build and deploy secure, high-performing, resilient, and efficient infrastructure for their applications. In this article, we will take a brief look at the history of the AWS Well-Architected Framework and discuss the most recent addition of Application Security in the framework.

A Brief History of the AWS Well-Architected Framework

The AWS Well-Architected Framework was first introduced in 2015. Since then, it has undergone several iterations to keep up with the ever-changing landscape of cloud computing and to address the evolving needs of businesses. The framework is built around five key pillars:

  1. Operational Excellence
  2. Security
  3. Reliability
  4. Performance Efficiency
  5. Cost Optimization

These pillars are designed to provide a consistent approach for evaluating architectures and identifying areas for improvement. By following the best practices outlined in the framework, organizations can ensure that their infrastructure is optimized for their specific workloads and requirements.

Addition of Application Security in the Most Recent Update

In the most recent update to the AWS Well-Architected Framework, Application Security has been added as a crucial component within the Security pillar. This addition highlights the importance of ensuring that applications are secure throughout their lifecycle, from development to deployment and operation.

Let’s take a deeper dive into the eight best practices added to the Security Pillar:

Best Practices for Application Security

  1. Train for application security (SEC11-BP01): Ensuring that developers, operations staff, and security personnel are well-trained in application security is critical for the success of any organization. Regular training sessions can help teams stay up-to-date with the latest security best practices, tools, and techniques.
  2. Automate testing throughout the development and release lifecycle (SEC11-BP02): Automating security testing as part of the continuous integration and continuous delivery (CI/CD) pipeline helps identify and mitigate security vulnerabilities early in the development process, reducing the risk of deploying insecure applications.
  3. Perform regular penetration testing (SEC11-BP03): Conducting regular penetration tests helps identify potential security vulnerabilities in applications and infrastructure. This proactive approach helps organizations identify and remediate issues before they can be exploited by attackers.
  4. Manual code reviews (SEC11-BP04): While automated testing is essential, manual code reviews can help identify issues that automated tools may miss. By incorporating manual code reviews into the development process, teams can ensure that their code adheres to security best practices and coding standards.
  5. Centralize services for packages and dependencies (SEC11-BP05): Centralizing the management of third-party packages and dependencies enables organizations to better track and control the security of their software supply chain. By ensuring that only approved and secure packages are used, organizations can reduce the risk of introducing vulnerabilities into their applications.
  6. Deploy software programmatically (SEC11-BP06): Deploying software programmatically, using infrastructure as code (IaC) and automated deployment tools, helps ensure that application deployments are consistent and adhere to security best practices. This approach also reduces the risk of human error in the deployment process.
  7. Regularly assess security properties of the pipelines (SEC11-BP07): Regularly evaluating and assessing the security properties of CI/CD pipelines helps identify potential vulnerabilities and areas for improvement. By continuously monitoring and improving the security of the pipeline, organizations can maintain a high level of application security.
  8. Build a program that embeds security ownership in workload teams (SEC11-BP08): Establishing a culture of security ownership within workload teams helps ensure that security is considered throughout the entire application lifecycle. By making security a shared responsibility among all team members, organizations can more effectively manage and mitigate security risks.

The addition of these best practices for Application Security in the AWS Well-Architected Framework emphasizes the importance of ensuring that applications are secure throughout their lifecycle. By following these guidelines, organizations can build and deploy applications that are not only secure but also maintain performance, reliability, and cost-effectiveness.

--

--