

Visibility: Cisco Tetration, Cisco Stealthwatch Cloud, Cisco AMP for Endpoint, Cisco Threat Response, and AWS VPC flow logs. This design brings together Cisco and AWS security controls to provide visibility, segmentation, and threat protection. All the components mentioned in this design have been verified and tested in the AWS cloud. Each tier can scale-in or scale-out independently, but Cisco recommends using proper security controls for visibility, segmentation, and threat protection.įigure 2: Key pillars of a successful security architecture Cisco recommends protecting workload and application in AWS using a Cisco Validated Design (CVD) shown in Figure 3.

The above three-tiered architecture offers scalable and highly available design. Figure 1: AWS three-tier architectureĪWS has a shared security model i.e., the customers are still responsible for protecting workloads, applications, and data.

The application requires scalability and availability the three-tier architecture makes scalability and availability for each tier independent. There is the flexibility to make changes to each tier independent of another tier. Multilayer architecture for web applications has a presentation layer (web tier), an application layer (app tier), and a database layer (database tier). These tiers are separated to perform various functions independently. AWS provides a flexible, reliable, secure, easy to use, scalable and high-performance environment for workloads and applications.ĪWS recommends three-tier architecture for web applications. More and more customers are deploying workloads and applications in Amazon Web Service (AWS).
