AWS Well-Architected Program

Optimize your architecture in the cloud

The Well-Architected Program allows us to work together with you to improve your deployed application on AWS, validating your needs and the current configuration. Its purpose: optimize your architecture in the cloud as well as the direct costs in AWS infrastructures and services and the indirect costs with possible automations that may positively affect your daily operations.

Syntax, officially certified with the AWS Well-Architected Partner Status, offers free custom architecture reviews with the guarantee of being able to provide proven specialized technical competence and success with clients to identify if workloads meet the five pillars of the Well-Architected Framework: operational excellence, safety, reliability in the event of failure, performance efficiency and cost optimization.

With this service and thanks to a team specialized in understanding, identifying and applying improvements to any application over AWS, Syntax can undertake the continuous improvement process in a scalable and flexible way, mitigating incidents and without any additional cost.

The 5 pillars of the AWS Well-Architected Framework

Operational Excellence

Ability to run and monitor systems to support business results and continually improve support processes and procedures.

Security

Ability to protect information, systems and assets while offering business value through risk assessment and mitigation strategies.

Cost Optimization

Ability to eliminate unnecessary costs and suboptimal resources while measuring system efficiency and ROI.

Reliability

Ability to recover from eventual infrastructure or service, as well as dynamically scale resources to meet demand and mitigate outages such as misconfigurations or temporary network problems.

Performance Efficiency

It makes efficient use of computing resources to meet requirements and always maintain efficiency as technology evolves.

How do we do it?

007 - BC_Blue

1. Book a meeting with us

Fill in the form below and we will contact you immediately.

001 - BM_Blue

2. We identify together the workloads to be analyzed as well as the necessary people to be involved

15-20 minute meeting maximum. Here we will select a productive workload on AWS. On this load, a session of about 2-3 hours will be held with our team of Solution Architects and one or more people from your team who know the architecture and infrastructure in which the workload to be reviewed has been implemented.

020 - BM_Blue

3. We schedule the analysis session

003 - BA_Blue

4. We execute the analysis session

The session is aimed at reviewing the 5 basic pillars of the platform: Operation, Security, Reliability, Performance and Cost Optimization, with a series of questions asked by our architects. The approximate duration of the session ranges from 2-4 hours. Once the session is done, our team performs an analysis based on the information obtained and prepares a report detailing the points of improvement and the weaknesses found.

013 - BA_Blue

5. Delivery of the report

Detailing the conclusions of the analysis and identifying mitigation tasks that we will carry out from Syntax as part of the project.

012 - BA_Blue

6. Remediation Actions

From all the improvement points highlighted in the report, we will select 45% and apply the necessary measures to solve them. These measures can range from creating or adapting a procedure, to performing activation or configuration of an AWS service, or to some cost improvement.

Frequently Asked Questions

What people or roles should participate in the WAR Session?

Roles in charge of the AWS platform, workloads/ applications, operations, infrastructure/solution architects, security/network specialists…This will ensure that all the points evaluated during Well-Architected sessions can be covered.

What is an “HRI” and what impact could they have on the platform?

High Risk Incidents (HRIs) are determined based on the general best practices recommended by AWS. Its impact on the workload will depend on the corresponding pillar and can include points such as: critical security incidents, DR not implemented, lack of root-cause-analysis procedures or not established evaluation metrics.

What does Syntax offer regarding the resolution of the HRIs?

Syntax, as an AWS certified partner, is committed to mitigating a minimum of 45% of HRIs detected within the WAR (well-architected reviews) program.

What about the rest of the Incidents (High and Medium) detected?

The organization can request from Syntax a statement-of-work with the effort and cost analysis of applying solutions to the agreed incidents.

Why is access to the AWS console required? And what are the required permissions?

To get maximum benefit from the session, it is recommended that we are be able to review the platform in advance. Viewing permissions are required on the components of the workload to be analyzed and permissions to generate the Well-Architected report.

Who decides which HRI’s should be mitigated?

Syntax will prepare a proposal with the recommended HRIs to be mitigated. This selection is made based on a criticality analysis and effort required to implement the solution. If necessary, an agreement can be reached with the organization to make changes to the selection.

What capabilities and qualifications do we have to conduct Well Architected Reviews (WAR)?

Syntax team in charge of carrying out WARs are all AWS certified. In addition, they have taken part as architects and technicians in multiple projects and managed services in solutions deployed on AWS.

How can we help you?

    Syntax is committed to protecting and respecting your privacy. We will only use your personal information to administer your account as you’ve requested. Occasionally, we would like to contact you about our products and services. If you consent to us contacting you, please tick the checkbox to enable email communication from Syntax. You can unsubscribe at any time. For more information, please review our Privacy Policy. By clicking submit, you consent to allow Syntax to store and process the personal information submitted to provide you the content requested.