Cloud Computing
Project
Deploy a highly scalable and available application on AWS
Country
Nigeria
Challenge
Deploy a highly scalable and available application. Ensure HIPAA complaiance
The company has vendors in different part of the country, and was looking to launch a new robust online service platform for its customers and vendors. New to Cloud Computing, however the business wanted the new web app to take advantage of the scalability and availability that is offered by cloud computing.
Solution
Together with our team and the business IT, Development and Security teams we began designing a blueprint solution that would help it attain the required scalability, uptime and security goals.
-
Scalability
The new business app is expected to grow exponentially and the team designed the solution to scale up to meet peaks periods demand and ensure the service could load within milliseconds. To do so, the team implemented AWS Auto Scaling using AWS tool such as CloudWatch to actively monitor alerts and takes action when the business Amazon EC2 instances reach a certain utilization threshold. CloudWatch takes the automated action to use Auto Scaling to dynamically add Amazon EC2 instances to ensure service availability. And, when demand decreases, the inverse automatically occurs.
-
Availability
The Pharmaceutical company also has high uptime expectations, in addition to scalability requirement, the impact of downtime does not only affect the bottom line but also costly to its reputation. As a result, AWS CodeDeploy was chosen to automate new code deployments to any instance, helping avoid downtime during application deployment with the options of bit bucket and github for app version control.
-
Security
With customers and vendors depending on the app to track and monitor their requests and sales, a security breach would also be very expensive to this organization and there was a need for a layered security approach. In addition to security policies that meet both internal security and HIPAA requirements, the security team included monitoring, key management, patching and more into the technology framework and processes for the new service. One of such strategy used was the matrixed IAM roles and policies that ensure separation of duties and least privileged access.
