Well-Architected Framework
- Operational Excellence
- Operational Excellence Assessment Guidance 01 How Do You Foster a Fusion Development Team Culture
- Operational Excellence Assessment Guidance 02 How Do You Formalize Routine and Nonroutine Tasks
- Operational Excellence Assessment Guidance 03 How Do You Formalize Software Ideation and Planning Process
- Operational Excellence Assessment Guidance 04 How Do You Optimize Software Development and Quality Assurance Processes
- Operational Excellence Assessment Guidance 05 How Did You Build Your Workload Supply Chain
- Operational Excellence Assessment Guidance 06 How Did You Design Your Monitoring Platform
- Operational Excellence Assessment Guidance 07 What Is Your Emergency Operations Practice
- Operational Excellence Assessment Guidance 08 How Do You Automate Tasks That Don't Need Human Intervention
- Operational Excellence Assessment Guidance 09 What Is Your Approach to Design the Capability for Automation Into Your Workload
- Operational Excellence Assessment Guidance 10 What Safe Deployment Practices Do You Use
- Operational Excellence Assessment Guidance 11 How Do You Address Deployment Failures
- Readme
- Performance
- Reliability
- Establishing a Resiliency Plan
- Reliability Assessment Guidance Start Here
- Start Here
- Building an Asset Inventory
- Dataverse Code Review Guidance for Resilient Applications
- Monitoring Dataverse for Resiliency
- 01 How do you keep the workload simple and efficient?
- 02 How do you identify and rate the workload's flows?
- 03 How do you perform failure mode analysis?
- 04 How do you define reliability targets?
- 05 How do you strengthen the resiliency of your workload?
- 06 How do you implement background jobs?
- 07 How do you test your resiliency and availability strategies?
- 08 How do you plan for disaster scenarios?
- 09 How do you plan to monitor health?
- Power Automate Alerts
- Reliability Samples
- Readme
- UX Optimization
- Security
- Readme
- Security Assessment Guidance 01 Do You Have a Documented Security Baseline
- Security Assessment Guidance 02 How Do You Secure the Code, Development Environment, and Development Lifecycle
- Security Assessment Guidance 03 Have You Classified All Data Persisted by the Workload
- Security Assessment Guidance 04 How Do You Segment Your Workload as a Defense in Depth Measure
- Security Assessment Guidance 05 What Identity and Access Controls Do You Use to Secure Your Application
- Security Assessment Guidance 06 How Do You Secure Your Secrets and the Other Credentials That Your Workload Uses
- Security Assessment Guidance 07 How Do You Monitor the Workload
- Security Assessment Guidance 08 How Do You Test Your Workload Before and After It Reaches Production
Welcome to the Well-Architected Framework