Chapter 5: Cloud Platform Architecture

Learning Objectives

After completing this chapter, you will be able to:

  • Evaluate cloud deployment models for different use cases
  • Design multi-cloud and hybrid cloud architectures
  • Apply the shared responsibility model appropriately
  • Select cloud services based on requirements
  • Implement cloud-native design principles
  • Apply the Well-Architected Framework to cloud solutions
  • Design landing zones and account structures
  • Implement cloud governance and compliance controls

Introduction

Cloud platforms have transformed infrastructure management, offering unprecedented flexibility, scalability, and innovation. However, cloud success requires thoughtful architecture that leverages cloud benefits while managing complexity, cost, and risk.

This chapter covers cloud platform architecture across public, private, hybrid, and multi-cloud environments. We’ll explore how to make strategic decisions about cloud adoption and design architectures that maximize cloud value while maintaining appropriate governance and control.


Cloud Deployment Models

Public Cloud

Infrastructure owned and operated by cloud providers, shared across customers with logical isolation.

CharacteristicDescriptionBusiness Impact
OwnershipProvider owns all infrastructureNo capital expenditure
TenancyMulti-tenant, logically isolatedShared security responsibility
EconomicsPay-as-you-go, consumption-basedOperational expenditure model
ScalabilityVirtually unlimitedHandle any growth
Geographic ReachGlobal infrastructureWorldwide deployment
InnovationContinuous new servicesAccess to latest technology

Major Public Cloud Providers:

ProviderStrengthsBest For
AWSBroadest services, largest market shareGeneral workloads, innovation
AzureEnterprise integration, Windows workloadsMicrosoft shops, hybrid
GCPData/ML, Kubernetes heritageAnalytics, modern apps
Oracle CloudDatabase workloadsOracle customers
IBM CloudEnterprise, mainframe integrationRegulated industries

When to Use Public Cloud:

  • Variable or unpredictable workloads
  • Rapid scaling requirements
  • Global deployment needs
  • Innovation and experimentation
  • Startup and development environments
  • Disaster recovery and backup

Private Cloud

Dedicated cloud infrastructure for a single organization, either on-premises or hosted.

CharacteristicDescriptionBusiness Impact
OwnershipOrganization or provider ownedCapital investment required
TenancySingle tenant, dedicatedFull control over security
EconomicsCapital or operationalMore predictable costs
ScalabilityLimited by capacityPlan for growth
ControlComplete infrastructure controlCustomization options
ComplianceEasier to meet strict requirementsRegulatory alignment

Private Cloud Technologies:

TechnologyDescriptionUse Case
VMware vSphereEnterprise virtualizationExisting VMware investment
OpenStackOpen-source cloud platformAvoid vendor lock-in
Azure StackAzure services on-premisesHybrid Azure
AWS OutpostsAWS services on-premisesHybrid AWS
NutanixHyper-converged infrastructureSimplified management

When to Use Private Cloud:

  • Strict compliance requirements (HIPAA, PCI, government)
  • Data sovereignty requirements
  • Predictable, steady-state workloads
  • Legacy applications with licensing constraints
  • Ultra-low latency requirements
  • High-security workloads

Hybrid Cloud

Combination of on-premises infrastructure (or private cloud) and public cloud resources, operating as a unified environment.

┌─────────────────────────────────────────────────────────────────────────────┐
│                       HYBRID CLOUD ARCHITECTURE                              │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ON-PREMISES / PRIVATE CLOUD           PUBLIC CLOUD                          │
│  ┌───────────────────────────┐         ┌───────────────────────────┐        │
│  │                           │         │                           │        │
│  │  Core Systems:            │         │  Extended Capabilities:   │        │
│  │  ┌─────────────────────┐  │         │  ┌─────────────────────┐  │        │
│  │  │ Core Databases      │  │         │  │ Web Applications    │  │        │
│  │  │ (Customer Data)     │  │         │  │ (Customer-facing)   │  │        │
│  │  └─────────────────────┘  │         │  └─────────────────────┘  │        │
│  │  ┌─────────────────────┐  │         │  ┌─────────────────────┐  │        │
│  │  │ Legacy ERP/Finance  │  │◄───────►│  │ Dev/Test Envs       │  │        │
│  │  │ Systems             │  │   VPN   │  │ (Rapid provisioning)│  │        │
│  │  └─────────────────────┘  │   or    │  └─────────────────────┘  │        │
│  │  ┌─────────────────────┐  │ Direct  │  ┌─────────────────────┐  │        │
│  │  │ Regulated Workloads │  │ Connect │  │ Analytics/BigData   │  │        │
│  │  │ (Compliance)        │  │         │  │ (Scale computing)   │  │        │
│  │  └─────────────────────┘  │         │  └─────────────────────┘  │        │
│  │  ┌─────────────────────┐  │         │  ┌─────────────────────┐  │        │
│  │  │ Identity (AD/LDAP)  │  │         │  │ DR/Backup           │  │        │
│  │  │ Master              │  │         │  │ (Off-site copy)     │  │        │
│  │  └─────────────────────┘  │         │  └─────────────────────┘  │        │
│  │                           │         │                           │        │
│  └───────────────────────────┘         └───────────────────────────┘        │
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    UNIFIED MANAGEMENT LAYER                          │    │
│  │  Identity │ Networking │ Security │ Monitoring │ Governance          │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Hybrid Connectivity Options:

OptionBandwidthLatencyCostUse Case
Site-to-Site VPNLimitedVariableLowDevelopment, backup
Direct Connect/ExpressRouteHighLowMediumProduction workloads
SD-WANVariableOptimizedMediumMultiple locations
Dedicated FiberVery HighVery LowHighCritical workloads

Hybrid Use Cases:

  • Cloud bursting for peak capacity
  • Disaster recovery to cloud
  • Gradual cloud migration
  • Development in cloud, production on-premises
  • Compliance requiring on-premises data

Multi-Cloud

Using multiple public cloud providers strategically.

StrategyDescriptionBenefitsChallenges
Best of BreedDifferent clouds for different workloadsOptimal service selectionComplexity, multiple skills
RedundancySame workload across cloudsHigh availabilityCost, synchronization
Avoid Lock-inPreserve portabilityNegotiating leverageLowest common denominator
GeographicClouds for specific regionsData residencyCompliance management
Cost ArbitrageUse cheapest providerCost optimizationConstant comparison

Multi-Cloud Architecture Pattern:

┌─────────────────────────────────────────────────────────────────────────────┐
│                       MULTI-CLOUD ARCHITECTURE                               │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    ABSTRACTION LAYER                                 │    │
│  │  Kubernetes │ Terraform │ HashiCorp Vault │ Prometheus/Grafana      │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                              │                                               │
│           ┌──────────────────┼──────────────────┐                           │
│           │                  │                  │                           │
│           ▼                  ▼                  ▼                           │
│  ┌─────────────────┐ ┌─────────────────┐ ┌─────────────────┐               │
│  │       AWS       │ │      Azure      │ │       GCP       │               │
│  ├─────────────────┤ ├─────────────────┤ ├─────────────────┤               │
│  │ • EKS clusters  │ │ • AKS clusters  │ │ • GKE clusters  │               │
│  │ • Data lakes    │ │ • M365 workloads│ │ • ML workloads  │               │
│  │ • IoT workloads │ │ • AD integration│ │ • BigQuery      │               │
│  └─────────────────┘ └─────────────────┘ └─────────────────┘               │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Shared Responsibility Model

Understanding the shared responsibility model is critical for cloud security and operations.

Responsibility by Service Model

┌─────────────────────────────────────────────────────────────────────────────┐
│                    SHARED RESPONSIBILITY MODEL                               │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│                      IaaS          PaaS          SaaS                       │
│                                                                              │
│  Data              ██████████    ██████████    ██████████   Customer        │
│  Application       ██████████    ██████████    ░░░░░░░░░░   manages         │
│  Runtime           ██████████    ░░░░░░░░░░    ░░░░░░░░░░                   │
│  Middleware        ██████████    ░░░░░░░░░░    ░░░░░░░░░░                   │
│  Operating System  ██████████    ░░░░░░░░░░    ░░░░░░░░░░                   │
│  Virtualization    ░░░░░░░░░░    ░░░░░░░░░░    ░░░░░░░░░░   Provider        │
│  Servers           ░░░░░░░░░░    ░░░░░░░░░░    ░░░░░░░░░░   manages         │
│  Storage           ░░░░░░░░░░    ░░░░░░░░░░    ░░░░░░░░░░                   │
│  Networking        ░░░░░░░░░░    ░░░░░░░░░░    ░░░░░░░░░░                   │
│  Physical Security ░░░░░░░░░░    ░░░░░░░░░░    ░░░░░░░░░░                   │
│                                                                              │
│  ██████████ = Customer Responsibility                                        │
│  ░░░░░░░░░░ = Provider Responsibility                                        │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Detailed Responsibility Matrix

Responsibility AreaIaaS CustomerPaaS CustomerSaaS CustomerProvider
Data ClassificationYesYesYesNo
Data Encryption (at rest)ConfigureConfigureLimitedEnable option
Data Encryption (in transit)ConfigureConfigureLimitedEnable option
Identity ManagementConfigure IAMConfigure IAMConfigure SSOProvide service
Application SecurityFullPartialNoVaries
Network ConfigurationConfigureLimitedNoProvide/manage
OS PatchingFullNoNoFull
Physical SecurityNoNoNoFull
Compliance CertificationsLeverageLeverageLeverageObtain/maintain

Security Responsibility Details

Security DomainCustomer ResponsibilitiesProvider Responsibilities
Identity & AccessCreate/manage users, assign permissions, enable MFA, review accessProvide IAM services, secure authentication infrastructure
Data ProtectionClassify data, enable encryption, manage keys, implement DLPProvide encryption options, secure storage, HSM services
Network SecurityConfigure security groups, NACLs, WAF rulesSecure physical network, DDoS protection infrastructure
Compute SecurityHarden images, patch OS (IaaS), secure applicationsSecure hypervisors, physical hosts
Logging & MonitoringEnable logging, configure alerts, review logsProvide logging services, secure log infrastructure
Incident ResponseRespond to incidents in your systemsRespond to infrastructure incidents, notify customers

Cloud Service Selection

Compute Services

Service TypeDescriptionBest ForExamples
Virtual MachinesFull OS control, traditional appsLift-and-shift, custom requirementsEC2, Azure VMs, GCE
Containers (Managed)Kubernetes orchestrationMicroservices, portabilityEKS, AKS, GKE
Containers (Serverless)Containers without managing serversEvent-driven containersFargate, Container Instances
Serverless FunctionsEvent-driven code executionAPIs, automation, triggersLambda, Functions, Cloud Functions
Bare MetalDedicated physical serversHigh performance, complianceEC2 Metal, Bare Metal Solution

Compute Selection Decision Tree:

┌─────────────────────────────────────────────────────────────────────────────┐
│                    COMPUTE SERVICE SELECTION                                 │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  Start: What are your requirements?                                          │
│                                                                              │
│  Need full OS control? ──Yes──► Virtual Machines                            │
│         │                                                                    │
│         No                                                                   │
│         ▼                                                                    │
│  Container workload? ──Yes──► Need cluster management? ──Yes──► Managed K8s │
│         │                              │                                     │
│         │                              No                                    │
│         │                              ▼                                     │
│         │                      Serverless Containers                         │
│         No                                                                   │
│         ▼                                                                    │
│  Event-driven/Short-lived? ──Yes──► Serverless Functions                    │
│         │                                                                    │
│         No                                                                   │
│         ▼                                                                    │
│  Need bare metal performance? ──Yes──► Bare Metal                           │
│         │                                                                    │
│         No                                                                   │
│         ▼                                                                    │
│  Default: Virtual Machines or Containers                                     │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Storage Services

Service TypeCharacteristicsUse CasesExamples
Block StorageLow latency, high IOPSDatabases, boot volumesEBS, Azure Disk, Persistent Disk
File StorageShared access, POSIXLegacy apps, shared dataEFS, Azure Files, Filestore
Object StorageScalable, cheap, HTTP accessBackups, data lakes, static contentS3, Blob Storage, Cloud Storage

Storage Performance Tiers:

TierIOPSThroughputLatencyCostUse Case
Premium/Provisioned64,000+1,000+ MB/s<1ms$$$High-performance databases
General Purpose3,000-16,000125-1,000 MB/s1-10ms$$Most workloads
Throughput OptimizedLowerHigherVariable$$Big data, logs
Cold/ArchiveN/ALimitedMinutes-hours$Backup, archive

Database Services

CategoryService TypeBest ForExamples
RelationalManaged RDBMSOLTP, structured dataRDS, Azure SQL, Cloud SQL
NoSQL DocumentDocument storesFlexible schema, contentDocumentDB, Cosmos DB, Firestore
NoSQL Key-ValueKey-value storesCaching, sessionsDynamoDB, Table Storage
In-MemoryIn-memory databasesCaching, real-timeElastiCache, Memorystore
Time SeriesTime-series dataIoT, metricsTimestream, Influx
GraphGraph databasesRelationshipsNeptune, Cosmos DB (Gremlin)
Data WarehouseOLAP, analyticsBI, reportingRedshift, Synapse, BigQuery

Networking Services

Service CategoryServicesUse Cases
Virtual NetworksVPC, VNetNetwork isolation, segmentation
Load BalancingALB, NLB, Azure LBTraffic distribution, HA
DNSRoute 53, Azure DNSName resolution, routing
CDNCloudFront, Azure CDNContent delivery, edge caching
ConnectivityDirect Connect, ExpressRouteHybrid connectivity
API GatewayAPI GatewayAPI management, authentication

Cloud Landing Zone Design

A landing zone is a pre-configured, secure, multi-account cloud environment.

Landing Zone Components

┌─────────────────────────────────────────────────────────────────────────────┐
│                       CLOUD LANDING ZONE                                     │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  ┌─────────────────────────────────────────────────────────────────────┐    │
│  │                    MANAGEMENT ACCOUNT/SUBSCRIPTION                   │    │
│  │   Identity │ Billing │ Organizations │ SSO │ Control Tower          │    │
│  └─────────────────────────────────────────────────────────────────────┘    │
│                                                                              │
│  ┌──────────────────────┐  ┌──────────────────────┐                        │
│  │    SECURITY OU       │  │     SHARED OU        │                        │
│  │  ┌────────────────┐  │  │  ┌────────────────┐  │                        │
│  │  │ Security       │  │  │  │ Shared Services│  │                        │
│  │  │ Account        │  │  │  │ Account        │  │                        │
│  │  │ - GuardDuty    │  │  │  │ - Transit GW   │  │                        │
│  │  │ - Security Hub │  │  │  │ - DNS          │  │                        │
│  │  │ - Config       │  │  │  │ - Directory    │  │                        │
│  │  └────────────────┘  │  │  └────────────────┘  │                        │
│  │  ┌────────────────┐  │  │  ┌────────────────┐  │                        │
│  │  │ Log Archive    │  │  │  │ Network Hub    │  │                        │
│  │  │ Account        │  │  │  │ Account        │  │                        │
│  │  │ - CloudTrail   │  │  │  │ - Transit GW   │  │                        │
│  │  │ - Centralized  │  │  │  │ - Inspection   │  │                        │
│  │  └────────────────┘  │  │  └────────────────┘  │                        │
│  └──────────────────────┘  └──────────────────────┘                        │
│                                                                              │
│  ┌──────────────────────────────────────────────────────────────────────┐   │
│  │                        WORKLOAD OUs                                   │   │
│  │                                                                       │   │
│  │  ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ ┌─────────────┐  │   │
│  │  │ Production   │ │ Non-Prod     │ │ Sandbox      │ │ Restricted  │  │   │
│  │  │ OU           │ │ OU           │ │ OU           │ │ OU          │  │   │
│  │  │ ┌──────────┐ │ │ ┌──────────┐ │ │ ┌──────────┐ │ │ ┌─────────┐ │  │   │
│  │  │ │ Prod-App1│ │ │ │ Dev-App1 │ │ │ │ Sandbox1 │ │ │ │ PCI-Env │ │  │   │
│  │  │ │ Account  │ │ │ │ Account  │ │ │ │ Account  │ │ │ │ Account │ │  │   │
│  │  │ └──────────┘ │ │ └──────────┘ │ │ └──────────┘ │ │ └─────────┘ │  │   │
│  │  │ ┌──────────┐ │ │ ┌──────────┐ │ │ ┌──────────┐ │ │ ┌─────────┐ │  │   │
│  │  │ │ Prod-App2│ │ │ │ Staging  │ │ │ │ Sandbox2 │ │ │ │ HIPAA   │ │  │   │
│  │  │ │ Account  │ │ │ │ Account  │ │ │ │ Account  │ │ │ │ Account │ │  │   │
│  │  │ └──────────┘ │ │ └──────────┘ │ │ └──────────┘ │ │ └─────────┘ │  │   │
│  │  └──────────────┘ └──────────────┘ └──────────────┘ └─────────────┘  │   │
│  │                                                                       │   │
│  └──────────────────────────────────────────────────────────────────────┘   │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Account/Subscription Strategy

Account TypePurposeGovernance
ManagementOrganization root, billing, SSOMost restrictive
SecuritySecurity services, GuardDuty, Security HubSecurity team only
Log ArchiveCentralized logging, audit logsRead-only, immutable
Shared ServicesTransit networking, directory, DNSInfrastructure team
ProductionProduction workloadsChange-controlled
Non-ProductionDev, test, stagingLess restrictive
SandboxExperimentation, learningSelf-service with limits

Guardrails and Policies

Guardrail TypeDescriptionExamples
PreventiveStop non-compliant actionsSCP blocking public S3
DetectiveAlert on non-complianceConfig rules
ProactiveValidate before deploymentCloudFormation hooks

Common Guardrails:

CategoryGuardrails
IdentityRequire MFA, no root access, federated identity
DataEncrypt by default, no public storage, DLP
NetworkNo public access, approved CIDRs only, flow logs
ComputeApproved AMIs only, no public instances, patching
LoggingCloudTrail enabled, logs centralized, immutable

Cloud-Native Design Principles

Twelve-Factor App Principles for Infrastructure

FactorTraditionalCloud-Native
CodebaseManual changes, undocumentedIaC in version control
DependenciesImplicit, manual installsExplicitly declared, automated
ConfigurationEmbedded in codeEnvironment variables, external
Backing ServicesTightly coupledAttached resources, loosely coupled
Build, Release, RunManual deploymentsCI/CD pipelines
ProcessesStateful serversStateless, externalized state
Port BindingFixed ports, manual configSelf-contained, dynamic
ConcurrencyVertical scalingHorizontal scaling
DisposabilityLong-running, hard to replaceFast start, graceful shutdown
Dev/Prod ParitySignificant differencesMaximum similarity
LogsLocal filesEvent streams, centralized
Admin ProcessesManual operationsOne-off containers, automation

Well-Architected Framework

PillarDescriptionKey Practices
Operational ExcellenceRun and monitor systems effectivelyIaC, monitoring, runbooks, automation
SecurityProtect information and systemsIAM, encryption, detection, response
ReliabilityRecover from failures, meet demandMulti-AZ, backups, testing, scaling
Performance EfficiencyUse resources efficientlyRight-sizing, caching, CDN
Cost OptimizationAvoid unnecessary costsReserved, right-size, cleanup
SustainabilityMinimize environmental impactEfficient resources, right region

Cloud-Native Architecture Patterns

PatternDescriptionBenefits
MicroservicesSmall, independently deployable servicesAgility, scalability, resilience
Event-DrivenAsynchronous, loosely coupledScalability, decoupling
Serverless-FirstFunctions and managed servicesReduced operations, pay-per-use
Container-BasedContainerized workloadsPortability, consistency
API-FirstDesign APIs before implementationIntegration, reuse

Cloud Cost Management

FinOps Practices

PracticeDescriptionImplementation
VisibilitySee all cloud spendingCost Explorer, Kubecost
AllocationAttribute costs to ownersTagging, chargeback
OptimizationReduce waste, improve efficiencyRight-sizing, reserved capacity
GovernanceControl spendingBudgets, alerts, approval workflows

Cost Optimization Strategies

StrategySavings PotentialEffortRisk
Shut Down Unused20-40%LowLow
Right-Size15-35%MediumLow
Reserved Instances30-72%MediumMedium
Spot/Preemptible60-90%HighHigher
Modern Architecture20-50%HighMedium

Cloud Cost Model

┌─────────────────────────────────────────────────────────────────────────────┐
│                       CLOUD COST COMPONENTS                                  │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                              │
│  Total Cost = Compute + Storage + Network + Services + Support              │
│                                                                              │
│  ┌────────────┐ ┌────────────┐ ┌────────────┐ ┌────────────┐ ┌──────────┐  │
│  │  COMPUTE   │ │  STORAGE   │ │  NETWORK   │ │  SERVICES  │ │ SUPPORT  │  │
│  │            │ │            │ │            │ │            │ │          │  │
│  │ • VM hours │ │ • Capacity │ │ • Egress   │ │ • Database │ │ • Plans  │  │
│  │ • vCPU     │ │ • IOPS     │ │ • Data     │ │ • Analytics│ │ • TAM    │  │
│  │ • Memory   │ │ • Requests │ │   transfer │ │ • Security │ │          │  │
│  │ • GPU      │ │ • Retrieval│ │ • Load     │ │ • AI/ML    │ │          │  │
│  │            │ │            │ │   balancers│ │            │ │          │  │
│  └────────────┘ └────────────┘ └────────────┘ └────────────┘ └──────────┘  │
│                                                                              │
│  Optimization Levers:                                                        │
│  • Reserved capacity (committed spend)                                       │
│  • Right-sizing (match to actual usage)                                      │
│  • Spot/preemptible (spare capacity)                                         │
│  • Storage tiering (lifecycle policies)                                      │
│  • Architecture optimization (reduce data movement)                          │
│                                                                              │
└─────────────────────────────────────────────────────────────────────────────┘

Cloud Migration Strategies

The 7 Rs of Migration

StrategyDescriptionWhen to Use
RetireDecommission, no longer neededUnused applications
RetainKeep in current locationNot ready, compliance
RelocateMove with minimal changesVMware to VMware Cloud
Rehost“Lift and shift” to cloudQuick migration, legacy
ReplatformMinor modificationsDatabase to RDS
RefactorRe-architect for cloud-nativeStrategic applications
RepurchaseMove to SaaSReplace with cloud service

Migration Phases

PhaseActivitiesOutputs
AssessDiscover, analyze, planMigration strategy, wave plan
MobilizeSet up landing zone, train teamsReady environment
MigrateMove workloads in wavesMigrated applications
ModernizeOptimize for cloudCloud-native applications

Review Questions

  1. Deployment Model Selection: A healthcare organization needs to deploy a patient portal. They have strict HIPAA requirements but want cloud scalability. Which deployment model would you recommend and why?

  2. Shared Responsibility: A company using AWS Lambda had a data breach because their function logged sensitive data to CloudWatch. Was this AWS’s responsibility or the customer’s? Explain using the shared responsibility model.

  3. Service Selection: You need to choose a database for a new application with the following requirements: ACID transactions, scale to 1M reads/second, global distribution. Which cloud database service would you recommend?

  4. Landing Zone Design: Design an account structure for a company with 5 business units, each with dev/test/prod environments, plus shared services. How many accounts would you create?

  5. Cost Optimization: Your cloud bill shows 40% of costs are from EC2, with average utilization of 15%. What optimization strategies would you recommend?

  6. Migration Strategy: You have a legacy monolithic application on VMware. It has complex database dependencies and custom middleware. Which migration strategy would you recommend?


Key Takeaways

  • Deployment models (public, private, hybrid, multi-cloud) each serve different needs
  • Shared responsibility clearly defines security boundaries between customer and provider
  • Service selection should align with workload requirements, not vendor preference
  • Landing zones provide the foundation for secure, scalable cloud environments
  • Cloud-native principles maximize cloud benefits and reduce operational burden
  • Cost management requires visibility, allocation, optimization, and governance
  • Migration strategies vary based on application characteristics and business goals

Summary

Cloud platform architecture requires understanding deployment models, the shared responsibility model, service options, and cloud-native design principles. Success in the cloud depends on making informed decisions about where and how to deploy workloads, establishing proper governance through landing zones and guardrails, and continuously optimizing for cost and performance.

This chapter provided the foundation for cloud architecture decisions. The following chapters will dive deeper into specific aspects of infrastructure architecture, starting with network and security architecture.


Chapter Navigation


Back to top

Infrastructure and Platform Management Handbook - MIT License