The AWS Cloud Development Kit (AWS CDK) is an open source software development framework to define your cloud application resources using familiar programming languages. AWS CDK provisions your resources in a safe, repeatable manner through AWS CloudFormation. For customers who prefer Terraform, cdk tf provides the CDK constructs for defining Terraform HCL state files in TypeScript and Python.
Designing Technology for People
Scalability & Agility
AWS Cloud Development Kit (CDK)
Terraform - Infrastructure-as-Code Design and Deployment
Keep humans away from your data, and your environment more secure, by implementing Infrastructure-as-Code. Make frequent, small and reversible changes. Configure, deploy, un-deploy and shut down infrastructure. Enable traceability and help annotate your documentation.
Cloud Architecture Design
We will design a system for you that matches your maturity level and optimizes for cost. We'll provide you with various options, including Serverless, that take advantage of AWS' unique research and development efforts to integrate services.
We offer a methodical migration process, including application portfolio discovery, application analysis, design, migration, integration, validation, operation, and optimization.
Cloud Security Design and Automation
We're able to design and implement AWS data protection mechanisms and AWS data encryption mechanisms. We're able to leverage AWS security services and features of services to provide a secure production environment. And, we're able to make tradeoff decisions with regard to cost, security, and deployment complexity given a set of application requirements.
Cloud Cost Control Strategies
We explain how to set up a master paying account so that you have access to all of the billing of isolated accounts, how to set up a tagging strategy for resources for a particular cost center, and how to set up billing alarms. Most importantly, we recommend services and products based upon your budget and resource limitations.
We evaluate the security of your cloud environment or IT infrastructure by identifying vulnerabilities and then attempt to exploit weaknesses. We identify issues, their potential impact, steps to reduce risks, and mitigation techniques.
Forensic and Log Analysis/SIEM & SOC Design
We help analyze logs and conduct forensic analysis to determine the point of entry into the network, how lateral movement may have occurred, and how and what data could have been exfiltrated. We work with your team to develop a Security Information and Event Management Solution. Or, we help you design a Security Operations Center.