Skip to content

Commit cacc604

Browse files
committed
update and add image
1 parent d8f44bc commit cacc604

3 files changed

Lines changed: 4 additions & 1 deletion

File tree

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/6-introduction-well-architected-framework.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ The framework consists of five pillars:
2222
| **Operational Excellence** | Holistic observability and DevOps practices | Integrate security into deployment pipelines |
2323
| **Performance Efficiency** | Scalability and load testing | Ensure security controls don't become bottlenecks |
2424

25+
:::image type="content" source="../media/waf-diagram-revised.png" alt-text="Diagram showing the five pillars of the Azure Well Architected framework." lightbox="../media/waf-diagram-revised.png":::
26+
27+
2528
## Why security architects need the Well-Architected Framework
2629

2730
Security isn't a standalone concern. Every architectural decision involves tradeoffs between pillars. For example, adding encryption at rest improves security but might affect performance. Implementing redundant security controls improves reliability but increases costs. The Well-Architected Framework helps you make these tradeoffs deliberately rather than accidentally.

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/7-well-architected-framework-security-pillar.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Cloud providers must be compliant with the same IT regulatory requirements as th
3232

3333
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections are built into the particular service, while addressing others remains the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
3434

35-
![Diagram showing shared responsibility and key strategies.](../media/shared-resp-color.png)
35+
:::image type="content" source="../media/shared-responsibility-model.png" alt-text="Diagram showing shared responsibility and key strategies." lightbox="../media/shared-responsibility-model.png":::
3636

3737
**Shared Responsibility and Key Strategies:**
3838

763 KB
Loading

0 commit comments

Comments
 (0)