williamzujkowski

AWS Multi-Service Architect

3
0
# Install this skill:
npx skills add williamzujkowski/cognitive-toolworks --skill "AWS Multi-Service Architect"

Install specific skill from multi-skill repository

# Description

Design AWS solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Well-Architected Framework alignment.

# SKILL.md


name: "AWS Multi-Service Architect"
slug: "cloud-aws-architect"
description: "Design AWS solutions across compute, storage, networking, and serverless with cost optimization, security hardening, and Well-Architected Framework alignment."
capabilities:
- AWS compute service selection (EC2, ECS, EKS, Lambda, Fargate, Batch)
- Storage architecture design (S3, EBS, EFS, FSx, Glacier, Storage Gateway)
- Network topology design (VPC, subnets, routing, NAT, VPN, Direct Connect, Transit Gateway)
- Serverless architecture patterns (Lambda, API Gateway, EventBridge, Step Functions, SQS/SNS)
- CloudFormation and CDK infrastructure-as-code generation
- Cost optimization with TCO analysis and reserved capacity recommendations
- Well-Architected Framework assessment (operational excellence, security, reliability, performance, cost)
- Multi-region and disaster recovery architecture
- IAM policy design with least-privilege principles
- Service integration and data flow design
inputs:
- requirements: "functional and non-functional requirements (object with performance, security, cost, compliance)"
- workload_type: "web-app, data-processing, real-time, batch, machine-learning, hybrid (string)"
- current_architecture: "description of existing AWS infrastructure if migration (string, optional)"
- deployment_tier: "T1 (quick recommendation) | T2 (detailed design with IaC) (string, default: T1)"
- regions: "primary and DR regions (array, default: single region)"
- budget_constraints: "monthly budget or cost sensitivity (string, optional)"
outputs:
- architecture_design: "AWS service selection with rationale and data flow diagram description"
- iac_templates: "CloudFormation or CDK code for infrastructure deployment (T2)"
- cost_estimate: "TCO analysis with monthly/annual projections and optimization recommendations"
- security_configuration: "IAM policies, security groups, encryption settings, and compliance mappings"
- well_architected_assessment: "alignment with AWS Well-Architected pillars and recommendations"
- migration_strategy: "phased migration plan if current_architecture provided (T2)"
keywords:
- aws
- cloud-architecture
- ec2
- s3
- lambda
- vpc
- cloudformation
- cdk
- well-architected
- serverless
- compute
- storage
- networking
- cost-optimization
- multi-region
version: "1.0.0"
owner: "cognitive-toolworks"
license: "MIT"
security: "Public; no secrets or PII; safe for open repositories"
links:
- https://aws.amazon.com/architecture/well-architected/
- https://docs.aws.amazon.com/
- https://aws.amazon.com/pricing/
- https://calculator.aws/
- https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
- https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html


Purpose & When-To-Use

Trigger conditions:
- AWS solution design spanning multiple services (compute + storage + networking)
- Well-Architected Framework assessment or optimization
- Cost optimization review for existing AWS infrastructure
- Multi-region or disaster recovery architecture planning
- Migration from on-premises or other clouds to AWS
- Serverless vs container vs EC2 architecture decision
- AWS service selection for new workload requirements
- CloudFormation or CDK template generation for infrastructure
- Compliance-driven architecture (HIPAA, PCI-DSS, FedRAMP on AWS)

Not for:
- Single AWS service deep-dive (use service-specific documentation)
- Application code development (focuses on infrastructure)
- Non-AWS multi-cloud strategy (use cloud-multicloud-advisor skill)
- Kubernetes-specific deployment patterns (use cloud-native-deployment-orchestrator)
- Detailed cost analysis without architecture context (use finops-cost-analyzer)


Pre-Checks

Time normalization:
- Compute NOW_ET using NIST/time.gov semantics (America/New_York, ISO-8601): 2025-10-25T21:30:36-04:00
- Use NOW_ET for all citation access dates

Input validation:
- requirements must include at least one of: performance, security, cost, compliance
- workload_type must be one of: web-app, data-processing, real-time, batch, machine-learning, hybrid
- deployment_tier must be: T1 or T2
- regions if specified must be valid AWS region codes (e.g., us-east-1, eu-west-1)
- budget_constraints if provided must specify monthly or annual budget

Source freshness:
- AWS Well-Architected Framework (accessed 2025-10-25T21:30:36-04:00): https://aws.amazon.com/architecture/well-architected/ - verify 2024+ whitepaper versions
- AWS Compute Services (accessed 2025-10-25T21:30:36-04:00): https://aws.amazon.com/products/compute/ - EC2, Lambda, ECS, EKS, Fargate feature matrix
- AWS Storage Services (accessed 2025-10-25T21:30:36-04:00): https://aws.amazon.com/products/storage/ - S3, EBS, EFS durability and performance SLAs
- AWS Networking (accessed 2025-10-25T21:30:36-04:00): https://docs.aws.amazon.com/vpc/latest/userguide/ - VPC design patterns and limits
- AWS Pricing Calculator (accessed 2025-10-25T21:30:36-04:00): https://calculator.aws/ - cost estimation methodology
- AWS IAM Best Practices (accessed 2025-10-25T21:30:36-04:00): https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html - least-privilege policies

Decision thresholds:
- Lambda recommended if: stateless, event-driven, <15min execution, variable load
- ECS/Fargate recommended if: containerized, moderate complexity, managed orchestration preferred
- EKS recommended if: Kubernetes-native, complex orchestration, multi-cloud portability
- EC2 recommended if: specialized instance types, full OS control, legacy dependencies
- S3 recommended for: object storage, static assets, data lakes, archival (11 9s durability)
- EBS recommended for: block storage, database volumes, low-latency (<1ms)
- EFS recommended for: shared file systems, NFS compatibility, auto-scaling storage


Procedure

T1: Quick Architecture Recommendation (โ‰ค2k tokens)

Fast path for 80% of AWS architecture decisions:

  1. Workload classification:
  2. Web application: API Gateway + Lambda OR ALB + ECS Fargate
  3. Data processing: Lambda + S3 + Glue OR EMR for big data
  4. Real-time: Kinesis + Lambda + DynamoDB OR ECS with streaming
  5. Batch: Batch + S3 OR Step Functions + Lambda
  6. Machine learning: SageMaker + S3 + Lambda for inference

  7. Core service selection:

  8. Compute: Choose based on decision thresholds (see Pre-Checks)
  9. Storage: S3 for objects, RDS/DynamoDB for databases, EBS for block
  10. Networking: VPC with public/private subnets, NAT Gateway, Internet Gateway
  11. Integration: API Gateway for APIs, EventBridge for events, SQS/SNS for messaging

  12. Quick cost estimate:

  13. Compute: instance hours x hourly rate OR Lambda invocations x GB-seconds
  14. Storage: GB stored x storage rate + data transfer costs
  15. Networking: data transfer out + NAT Gateway hours
  16. Database: instance hours + I/O + storage (RDS) OR read/write units (DynamoDB)

  17. Security baseline:

  18. VPC with private subnets for compute, public subnets for load balancers
  19. Security groups with least-privilege ingress rules
  20. IAM roles with managed policies (AmazonS3ReadOnlyAccess, etc.)
  21. Encryption at rest (S3 default encryption, EBS encryption, RDS encryption)
  22. Encryption in transit (TLS/HTTPS required)

  23. Output (T1):

  24. AWS service architecture diagram (textual description with service names)
  25. Core services with justification (compute, storage, database, networking)
  26. Rough monthly cost estimate (ยฑ30% accuracy)
  27. Well-Architected pillar alignment summary
  28. Recommended next steps for T2 detailed design

Abort conditions:
- Workload requirements unclear or conflicting (e.g., "real-time + batch")
- Compliance requirements (HIPAA, PCI-DSS) needing legal review (note for T2)
- Budget constraints conflict with availability requirements


T2: Detailed Architecture Design with IaC (โ‰ค6k tokens)

For production-ready AWS architectures with infrastructure-as-code:

  1. All T1 steps plus:

  2. Comprehensive service integration:

Compute tier:
- EC2: instance family selection (compute-optimized c6i, memory-optimized r6i, general t3/t4g)
- Auto Scaling Groups with target tracking policies (CPU, ALB requests, custom metrics)
- Launch Templates with user data for bootstrapping
- Spot instances for fault-tolerant workloads (up to 90% cost savings)
- Lambda: runtime selection (Python 3.12, Node.js 20), memory optimization, reserved concurrency
- ECS Fargate: task definitions with resource limits, task placement strategies
- EKS: managed node groups with mixed instance types, cluster autoscaler

Storage tier:
- S3: bucket policies with encryption (SSE-S3, SSE-KMS), versioning, lifecycle policies
- S3 Intelligent-Tiering for automatic cost optimization
- S3 Transfer Acceleration for global uploads
- S3 Glacier for archival (Deep Archive for long-term retention)
- EBS: volume types (gp3 for general, io2 Block Express for high IOPS, st1 for throughput)
- EFS: performance modes (General Purpose, Max I/O), throughput modes (Elastic, Provisioned)
- FSx: file system choice (Lustre for HPC, Windows File Server, NetApp ONTAP)

Networking tier:
- VPC design: CIDR planning (/16 VPC, /24 subnets), multi-AZ for high availability
- Public subnets (0.0.0.0/0 route to IGW) for ALB, NAT Gateway
- Private subnets for compute with route to NAT Gateway OR VPC Endpoints
- VPC Endpoints (Gateway for S3/DynamoDB, Interface for other services) to reduce NAT costs
- Network ACLs for subnet-level security (stateless), Security Groups for instance-level (stateful)
- Transit Gateway for multi-VPC or hybrid connectivity
- Route 53 for DNS with health checks and routing policies (weighted, latency, geolocation)

Serverless integration:
- API Gateway REST/HTTP APIs with custom domains, usage plans, API keys
- Lambda integration with EventBridge rules, S3 events, DynamoDB Streams
- Step Functions state machines for orchestration with error handling and retries
- SQS for decoupling (standard for throughput, FIFO for ordering), dead-letter queues
- SNS for fan-out messaging patterns, email/SMS notifications

Database selection:
- RDS: engine choice (PostgreSQL, MySQL, Aurora for performance), Multi-AZ for HA
- Aurora Serverless v2 for variable workloads with auto-scaling
- DynamoDB: on-demand vs provisioned capacity, global tables for multi-region
- ElastiCache: Redis for caching with cluster mode, Memcached for simple caching
- Redshift for data warehousing with Spectrum for S3 queries

  1. Well-Architected Framework deep-dive:

Operational Excellence:
- CloudFormation/CDK for IaC with stack drift detection
- CloudWatch Logs centralization, Log Insights queries
- CloudWatch Alarms with SNS notifications
- Systems Manager for parameter store, patch management, session manager
- AWS Config for compliance monitoring and resource inventory

Security:
- IAM roles for EC2/Lambda (no access keys), cross-account roles with external ID
- IAM policies with least privilege, service control policies (SCPs) for organization
- Secrets Manager for database credentials with automatic rotation
- GuardDuty for threat detection, Security Hub for compliance dashboards
- AWS WAF for application firewall (API Gateway, ALB), Shield Standard/Advanced for DDoS
- VPC Flow Logs for network traffic analysis
- KMS customer-managed keys for encryption with key rotation

Reliability:
- Multi-AZ deployments (at least 2 AZs, 3 for critical workloads)
- Multi-region for disaster recovery (pilot light, warm standby, or active-active)
- Route 53 health checks with failover routing
- RDS automated backups (point-in-time recovery), cross-region snapshots
- S3 Cross-Region Replication (CRR) for critical data
- CloudFormation StackSets for multi-region deployment

Performance Efficiency:
- CloudFront CDN for static content and API caching
- ElastiCache for database query caching
- RDS Read Replicas for read-heavy workloads
- DynamoDB DAX for microsecond latency
- Lambda Provisioned Concurrency to eliminate cold starts
- EBS provisioned IOPS (io2) for latency-sensitive databases

Cost Optimization:
- Savings Plans (Compute Savings Plans for EC2/Fargate/Lambda flexibility)
- Reserved Instances for predictable workloads (1-year or 3-year commitment)
- S3 Intelligent-Tiering and lifecycle policies (Standard โ†’ IA โ†’ Glacier)
- Spot Instances for fault-tolerant batch/analytics (Spot Fleet with price limits)
- Auto Scaling to match capacity with demand
- Cost Allocation Tags for cost attribution by team/project
- AWS Cost Explorer and Budgets with alerts

  1. Infrastructure-as-Code generation:

CloudFormation approach:
- Modular templates with nested stacks (network, compute, database, storage)
- Parameters for environment-specific values (CIDR ranges, instance types)
- Mappings for region-specific AMIs and availability zones
- Outputs for cross-stack references (VPC ID, subnet IDs, security group IDs)
- Stack policies to prevent accidental deletion of critical resources

CDK approach:
- Construct reuse with higher-level abstractions
- Type safety and IDE autocomplete (TypeScript/Python)
- Built-in best practices (default encryption, least-privilege IAM)
- Aspects for cross-cutting concerns (tagging, logging)
- CDK Pipelines for CI/CD deployment

  1. Security hardening:
  2. IMDSv2 enforcement for EC2 instance metadata
  3. S3 Block Public Access at account level
  4. EBS default encryption enabled
  5. RDS/Aurora encryption at rest with KMS
  6. Certificate Manager for TLS certificates with auto-renewal
  7. Macie for S3 sensitive data discovery
  8. Inspector for EC2 vulnerability scanning
  9. CloudTrail for API audit logging with log file validation

  10. Cost estimation (detailed):

  11. Compute: instance family, hours/month, Savings Plan discount
  12. Storage: S3 storage classes (Standard, IA, Glacier), requests, data transfer
  13. Database: RDS instance hours, I/O operations, backup storage
  14. Networking: data transfer out (inter-region, internet), NAT Gateway hours
  15. Total Cost of Ownership (TCO): 1-year and 3-year projections
  16. Cost optimization opportunities: reserved capacity, rightsizing, lifecycle policies

  17. Migration strategy (if current_architecture provided):

  18. Discovery phase: Application Discovery Service, Migration Hub
  19. Planning: AWS Migration Evaluator for TCO, Database Migration Service (DMS) for schema conversion
  20. Migration waves:
    • Wave 1: Stateless web tier (rehost with EC2 or refactor to containers/Lambda)
    • Wave 2: Database tier (DMS with minimal downtime, or snapshot restore)
    • Wave 3: Integration points (message queues, caching, file storage)
  21. Cutover strategy: DNS-based with Route 53 weighted routing (10% โ†’ 50% โ†’ 100%)
  22. Validation: smoke tests, performance benchmarks, rollback procedures

  23. Output (T2):

  24. Complete architecture diagram with all AWS services and data flows
  25. CloudFormation templates OR CDK code (modular, production-ready)
  26. Detailed cost estimate with 1-year/3-year TCO and optimization recommendations
  27. IAM policies and security group rules (least-privilege)
  28. Well-Architected Framework assessment with pillar scores and recommendations
  29. Deployment guide with prerequisites and step-by-step instructions
  30. Migration plan with timeline, risks, and rollback procedures (if applicable)
  31. Monitoring and alerting configuration (CloudWatch dashboards, alarms)

Abort conditions:
- Specialized GPU/FPGA requirements needing EC2 instance family expertise
- Highly regulated workloads (FedRAMP High, IL5) requiring compliance specialist review
- Complex hybrid connectivity (multiple Direct Connect, VPN mesh) needing network architect
- Custom AMI creation or OS hardening outside of AWS managed services


T3: Not Implemented

Note: This skill implements T1 (quick recommendations) and T2 (detailed design with IaC) tiers only. T2 provides production-ready AWS architectures with comprehensive Well-Architected Framework assessment, security hardening, cost optimization, and migration planning. For specialized scenarios requiring deeper analysis (custom compliance frameworks, complex hybrid architectures, or organization-wide AWS Landing Zone design), consult AWS Solutions Architects or AWS Professional Services.

Future T3 considerations:
- Organization-wide AWS Landing Zone design with AWS Control Tower
- Multi-account strategy with AWS Organizations and consolidated billing
- Complex hybrid architectures with Direct Connect, Transit Gateway mesh, and SD-WAN
- Custom compliance frameworks beyond standard AWS Config rules
- AWS Outposts and hybrid edge deployment patterns
- Large-scale migration program management (Application Portfolio Assessment)


Decision Rules

Compute service selection:
- Lambda if all of:
- Stateless or state in DynamoDB/S3
- <15min execution time (<900 seconds)
- Event-driven (API Gateway, S3, EventBridge, SQS)
- Variable/unpredictable load (auto-scales to zero)
- Cost-sensitive for low/moderate traffic

  • ECS Fargate if:
  • Containerized application
  • Don't want to manage EC2 instances
  • Moderate complexity (1-20 containers)
  • Predictable resource requirements

  • EKS if:

  • Kubernetes-native (existing K8s apps or team expertise)
  • Complex orchestration (>20 microservices)
  • Multi-cloud portability required
  • Advanced networking (Istio, service mesh)

  • EC2 if:

  • Specialized instance types (GPU, high memory, burstable credits)
  • Full OS control (custom kernel, drivers)
  • Legacy applications not containerizable
  • Bring Your Own License (BYOL)

Storage service selection:
- S3 for: object storage, static assets (images, videos), data lakes, backups, archival
- EBS for: EC2 block storage, databases (PostgreSQL, MySQL), low-latency (<1ms)
- EFS for: shared file storage across multiple EC2/ECS, NFS workloads, auto-scaling
- FSx for: Windows file server (SMB), Lustre (HPC), NetApp ONTAP (enterprise NAS)

Database service selection:
- RDS Aurora if: relational database, high performance (5x MySQL, 3x PostgreSQL), Multi-AZ HA
- RDS (PostgreSQL/MySQL) if: managed relational database, compatibility with open-source engines
- DynamoDB if: NoSQL key-value or document store, single-digit millisecond latency, global tables
- ElastiCache Redis if: in-memory caching, session store, pub/sub messaging
- Redshift if: data warehouse, OLAP analytics, petabyte-scale

Networking design:
- Single VPC if: small footprint (<100 resources), single application
- Multi-VPC if: isolation required (dev/staging/prod), different teams/applications
- Transit Gateway if: >3 VPCs or hybrid connectivity (on-premises)
- VPC Peering if: 2-3 VPCs within same region needing connectivity
- NAT Gateway vs VPC Endpoints: use VPC Endpoints for S3/DynamoDB to save NAT costs

Multi-region strategy:
- Single region if: latency requirements met, no DR requirements, cost-sensitive
- Multi-region active-passive if: disaster recovery (RTO <1 hour, RPO <1 hour)
- Multi-region active-active if: global user base, <100ms latency requirement, highest availability

Ambiguity handling:
- If workload type unclear โ†’ request architecture diagram or user journey map
- If performance requirements unknown โ†’ recommend T1 baseline with monitoring, iterate
- If budget constraints conflict with availability โ†’ present trade-off matrix with RTO/RPO vs cost

Stop conditions:
- Conflicting requirements (e.g., "lowest cost + highest availability + multi-region")
- Regulatory requirements without defined compliance framework
- No clear application architecture or data flow documentation (T2 requires this)


Output Contract

Required fields (all tiers):

{
  "architecture": {
    "workload_type": "web-app | data-processing | real-time | batch | ml | hybrid",
    "services": [
      {
        "category": "compute | storage | database | networking | integration | security",
        "service_name": "AWS service name (e.g., EC2, S3, Lambda)",
        "rationale": "why this service was selected",
        "configuration_summary": "key configuration details"
      }
    ],
    "data_flow": "textual description of data flow between services"
  },
  "cost_estimate": {
    "monthly_usd": "number (approximate for T1, detailed for T2)",
    "breakdown": {
      "compute": "number",
      "storage": "number",
      "database": "number",
      "networking": "number",
      "other": "number"
    },
    "optimization_opportunities": ["array of cost reduction recommendations"]
  },
  "well_architected_alignment": {
    "operational_excellence": "high | medium | low with justification",
    "security": "high | medium | low with justification",
    "reliability": "high | medium | low with justification",
    "performance_efficiency": "high | medium | low with justification",
    "cost_optimization": "high | medium | low with justification"
  },
  "next_steps": ["array of actionable recommendations"]
}

Additional T2 fields:

{
  "iac_code": {
    "type": "cloudformation | cdk",
    "language": "yaml | typescript | python (for CDK)",
    "files": [
      {
        "filename": "string",
        "content": "string (CloudFormation YAML or CDK code)",
        "description": "purpose of this template/stack"
      }
    ]
  },
  "security_configuration": {
    "iam_policies": [
      {
        "role_name": "string",
        "policy_document": "JSON IAM policy with least privilege"
      }
    ],
    "security_groups": [
      {
        "name": "string",
        "ingress_rules": ["array of allowed inbound traffic"],
        "egress_rules": ["array of allowed outbound traffic"]
      }
    ],
    "encryption": {
      "at_rest": "services and encryption methods (KMS keys)",
      "in_transit": "TLS configuration and certificate management"
    }
  },
  "monitoring": {
    "cloudwatch_dashboards": "description of key metrics to monitor",
    "alarms": [
      {
        "metric": "string (e.g., CPUUtilization, 5XXError)",
        "threshold": "number",
        "action": "SNS notification or Auto Scaling action"
      }
    ],
    "logs": "centralized logging strategy (CloudWatch Logs, Log Groups)"
  },
  "migration_plan": {
    "phases": [
      {
        "phase_number": "integer",
        "description": "string",
        "services_migrated": ["array of AWS services deployed"],
        "duration": "string (e.g., 2 weeks)",
        "success_criteria": ["array of validation steps"],
        "rollback_procedure": "string"
      }
    ]
  }
}

Examples

# T1 Example: Serverless Web Application Architecture
# API Gateway + Lambda + DynamoDB + S3 + CloudFront

Services:
  Compute: Lambda (Python 3.12, 512MB memory, on-demand)
  Database: DynamoDB (on-demand capacity, single table design)
  Storage: S3 (Standard, static assets + user uploads)
  CDN: CloudFront (distribution for S3 + API Gateway)
  API: API Gateway (HTTP API, JWT authorizer)
  Auth: Cognito User Pools (user management)

Estimated Monthly Cost (10K users, 1M requests):
  Lambda: $20 (1M invocations, 512MB, 200ms avg)
  DynamoDB: $10 (1GB storage, 1M read/write units)
  S3: $5 (10GB storage, 100K requests)
  CloudFront: $15 (100GB transfer)
  API Gateway: $10 (1M requests)
  Total: ~$60/month

(Full T2 CloudFormation example: /resources/cloudformation-serverless-webapp.yaml)
(Full T2 CDK example: /resources/cdk-webapp-stack.ts)


Quality Gates

Token budgets (enforced):
- T1: โ‰ค2,000 tokens - service selection + cost estimate + Well-Architected summary
- T2: โ‰ค6,000 tokens - detailed design + IaC templates + security + migration plan

Safety checks:
- No hardcoded credentials in IaC templates (use Secrets Manager references)
- IAM policies use least-privilege principles (deny by default, explicit allows)
- Security groups have no 0.0.0.0/0 SSH access (use Systems Manager Session Manager)
- S3 buckets have Block Public Access enabled unless explicitly public
- Encryption enabled for all data stores (S3, EBS, RDS, DynamoDB)

Auditability:
- All AWS service recommendations cite official documentation with access date (NOW_ET)
- Cost estimates include calculation methodology (instance hours, GB-months, requests)
- Well-Architected pillars mapped to specific AWS services and configurations
- Compliance controls (if applicable) mapped to AWS Config rules or Security Hub standards

Determinism:
- Given same inputs, produce identical service selection recommendations
- Cost estimates use AWS Pricing Calculator methodology (consistent rates)
- IaC templates follow AWS CloudFormation best practices or CDK constructs

Validation requirements:
- T2 CloudFormation templates must pass aws cloudformation validate-template
- T2 CDK code must pass cdk synth without errors
- IAM policies must be valid JSON and comply with IAM policy grammar
- Security group rules must have valid CIDR blocks and port ranges


Resources

Official AWS Documentation (accessed 2025-10-25T21:30:36-04:00):
- AWS Well-Architected Framework: https://docs.aws.amazon.com/wellarchitected/latest/framework/welcome.html
- AWS Well-Architected Tool: https://aws.amazon.com/well-architected-tool/
- AWS Architecture Center: https://aws.amazon.com/architecture/
- AWS Compute Services: https://docs.aws.amazon.com/whitepapers/latest/aws-overview/compute-services.html
- AWS Storage Services: https://docs.aws.amazon.com/whitepapers/latest/aws-overview/storage-services.html
- AWS Networking: https://docs.aws.amazon.com/whitepapers/latest/aws-overview/networking-services.html

AWS Service Documentation:
- Amazon EC2: https://docs.aws.amazon.com/ec2/
- AWS Lambda: https://docs.aws.amazon.com/lambda/latest/dg/welcome.html
- Amazon S3: https://docs.aws.amazon.com/s3/
- Amazon VPC: https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html
- Amazon RDS: https://docs.aws.amazon.com/rds/
- Amazon DynamoDB: https://docs.aws.amazon.com/dynamodb/

Infrastructure-as-Code:
- AWS CloudFormation: https://docs.aws.amazon.com/cloudformation/
- AWS CDK: https://docs.aws.amazon.com/cdk/v2/guide/home.html
- CDK Patterns: https://cdkpatterns.com/
- CloudFormation Best Practices: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/best-practices.html

Cost Optimization:
- AWS Pricing Calculator: https://calculator.aws/
- AWS Cost Management: https://aws.amazon.com/aws-cost-management/
- AWS Cost Optimization Pillar: https://docs.aws.amazon.com/wellarchitected/latest/cost-optimization-pillar/welcome.html
- Savings Plans: https://aws.amazon.com/savingsplans/
- Reserved Instances: https://aws.amazon.com/ec2/pricing/reserved-instances/

Security Best Practices:
- IAM Best Practices: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
- Security Pillar: https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html
- AWS Security Hub: https://docs.aws.amazon.com/securityhub/
- AWS Secrets Manager: https://docs.aws.amazon.com/secretsmanager/

Example Templates:
- /resources/cloudformation-serverless-webapp.yaml - Complete serverless web app stack
- /resources/cloudformation-ecs-fargate.yaml - ECS Fargate with ALB and RDS
- /resources/cdk-webapp-stack.ts - CDK TypeScript example for web application
- /resources/iam-least-privilege-policies.json - Example least-privilege IAM policies
- /resources/vpc-reference-architecture.yaml - Multi-AZ VPC with public/private subnets

Migration Resources:
- AWS Migration Hub: https://aws.amazon.com/migration-hub/
- AWS Database Migration Service: https://aws.amazon.com/dms/
- AWS Application Discovery Service: https://aws.amazon.com/application-discovery/
- 6 R's Migration Strategies: https://docs.aws.amazon.com/prescriptive-guidance/latest/migration-strategies/welcome.html

# Supported AI Coding Agents

This skill is compatible with the SKILL.md standard and works with all major AI coding agents:

Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.