Develop the foundation to prevent and recover from service and infrastructure disruption.
Automate response to changes in demand by defining KPIs and putting in monitoring in place to detect and respond to any deviations.
Setup regular “game-days” to thoroughly test your system-recovery process and leverage automation to provide immediate to response to failures.
Implement strategies to enable visibility of expenditure and ensure resources are utilised at minimal cost.
Anticipate changes in demand by gathering
metrics and automate your resource provisioning
to match your workload needs.
Integrate the most cost-effective resources by adapting your architecture with innovative cost saving services.
Use data-driven approach to select the most optimal compute, storage, database and network resources.
Continually monitor your workload to detect and remediate performance issues.
Evolve your architecture by making use of new innovation that could improve performance.
Build robust identity foundation by implementing the principle of least privilege and role-based access controls.
Implement controls to detect security threat or incident and define processes to respond to and mitigate potential impacts of security incidents.
Encrypt data in transit and at rest, and further ensure the underlying systems and service are protected from security breach.
Understand the business and customer needs of your workload and define the metrics to monitor and measure your business outcomes.
Gain insights into the operational health of your workload and develop efficient operations to respond to events.
Setup continuous improvement plan to evolve operations through learning from experience and adopting new technologies.