Have You Seen These Korean AWS whitepaper (Photo)

 
Korean AWS whitepaper listAWS whitepaper covers a variety of topics such as architecture, security, economy comprehensively. AWS team, is created by an independent analyst or AWS community (customers or partners), and also provides technical white papers in Korean.
1. Amazon Web Services OverviewDecember 2014This paper introduces the AWS cloud computing platform. This paper discusses the fundamental principles of the benefits of cloud computing and AWS and AWS provides an overview of the services.
2. The economic comparison of the holding company's own IT infrastructure and the AWS CloudDecember 2009This article provides a comparison of the hardware cost and asset utilization, data redundancy, security, supply chain management, power and cooling efficiency, as well as a comparative analysis of direct ownership costs such as labor costs for Amazon Web Services with existing IT infrastructure alternatives .
3. Web applications in the AWS cloud hosting best practicesSeptember 2012This paper examines in detail the web application hosting solutions, will guide you how to build a highly available and scalable Web applications using each service.
4. AWS AWS resources migrate to new regionsJanuary 2013Customers may want to migrate to AWS resources from one area to another for various reasons. In particular, the new area, you can leave if you want closer to the user base, users various services geographically closer proximity. This technical white paper is intended for experienced AWS customers who want to migrate existing resources to new AWS Region. Therefore, it provides technical guidance and best practices for migrating each AWS resources such as AMI, key pairs to a different area.5. Expand IT infrastructure to AWS VPCDecember 2013This paper discusses the scenario for the Amazon VPC.6. Introduction to the AWS cloud security processesNovember 2014This article was written to answer the question, "Can you give any help to the AWS protect my data?" In particular, the description in terms of network infrastructure and the AWS AWS management of physical security and operational processes under discusses the service-specific security implementations.7. AWS Best Practices for DDoS responseJune, 2015This white paper is intended for customers who want to prepare for DDoS (Distributed Denial of Service) attacks increase the resilience of the applications running on Amazon Web Services (AWS). This white paper with a description of the outline technologies that help to maintain the availability, see the architecture of DDoS (Distributed Denial of Service) attack provides architectural guidance for improving resilience.8. AWS DevOps (DevOps) Principles and PracticesDecember 2014Business will raise the agility to respond to customer needs rapidly evolving and accelerated innovation. Time to market is critical. As a result, IT departments must be able to respond swiftly to achieve its overall business goals. The DevOps jinhwan more offers support this agility. This white paper covers to focus on cases that are supported by AWS platform and DevOps principles.9. AWS Risk and Compliance InformationApril 2014This document is intended to provide AWS customers to help integrate AWS in existing control framework to support IT environments that might info. This document contains the basic approach to evaluating the AWS control and provides information to help customers integrate the control environment. It also covers the AWS cloud computing-related information for common compliance issues.10. Disaster recovery via the AWS (Disaster Recovery)
 
October 2014,The disaster excused Amazon Web Services (AWS) resources can quickly start to maintain the continuity of the business. This paper describes the AWS features and services available in the disaster recovery process and shows how a disaster recovery scenario as an example. It might do to improve the disaster recovery plan and guidance you need to do to take advantage of all the benefits of AWS for disaster recovery process various instructions.11. Through AWS backup and recovery methods.

December 2014This white paper provides a high-level concepts on how to simplify the current backup and recovery environment in the enterprise. How to take advantage of the on-demand nature of cloud reduces the complexity and maintenance is facilitated so that details how to automate the backup and recovery process.12. Security by Size: AWS-based governanceThis paper is often overlooked advantage when migrating workloads to the AWS is the ability to take advantage of the many features that provide active governance to achieve a higher level of security for the scale. This article uses the AWS describes how you can achieve a higher level of governance for IT resources.13. Size of Security: How to log in AWS.

This paper uses the AWS CloudTrail overview of the requirements relating to compliance with the general provisions logging explains how to meet these requirements. AWS CloudTrail consists of a very useful common logging in the security domain and operational perspective.14. Storage in the cloud data encryptionThis white paper explains these options in terms of location and access control method for encryption key and the encryption key is stored outlines the options that you can safely encrypt the data in AWS services. Server-side and client-side encryption method, encryption method is described for example, through individual to perform this encryption in various AWS services.15. Security Audit Checklist for AWS useThis white paper is intended for personnel to evaluate or audit the use AWS for external auditors and internal or external review team and the audit of such internal compliance team at AWS customers. It also designed the security assessment on the use of AWS to demand from industry or regulatory standards, the organization provides a useful checklist to run. This paper has been prepared on the basis of operating checklists white paper provides useful operational and architectural guidance on operational readiness assessment of the application.16. AWS Security by Design Introduction.

This paper is a security approach ensures that customers are designed to formalize an AWS account and automated security controls, streamline the audit. This paper describes the concept of Security by Design, introduces the four-step approach for maintaining a large amount of security and compliance across multiple industries, AWS customers to learn about the resources available to enforce security on AWS environment it introduces how to verify that controls are working.17. AWS Well-Architected frameworkThis white paper will be through cooperation with AWS Solutions Architect for thousands of customers so that you can design (Well-Architected) with great structure in the cloud introduces best practices and key strategies for cloud system design. Compare architecture based on best practices, you can learn how to solve the downside. AWS Well-Architected is based on the four, including security, reliability and performance, efficiency and cost optimization
Have You Seen These Korean AWS whitepaper (Photo) Have You Seen These Korean AWS whitepaper (Photo) Reviewed by Unknown on 07:57 Rating: 5

No comments:

Powered by Blogger.