title description author
Well-Architected Framework
Well-Architected Framework describes five pillars of cost optimization, operational excellence, performance efficiency, reliability, and security, that result in a high quality and scalable cloud architecture.
Matthew Romero, Technical Product Marketing Manager

Get started with the Skytap Well-Architected Framework

The Skytap Well-Architected Framework helps you get started with several different guides. This article groups the guides to help you find the one that best aligns with the current state of your workloads and goals in moving to Skytap on Azure.

The following section details questions that are typically asked when an organization is trying to accomplish one or many goals during its cloud adoption journey.

Skytap Well-Architected Framework

As your cloud adoption journey progresses, a solid operating model can help ensure that wise decisions are made. The Skytap Well-Architected Framework is a set of guiding tenets that can be used to improve the quality of a workload. The framework consists of five pillars of architecture excellence: Cost Optimization, Operational Excellence, Performance Efficiency, Reliability, and Security. Incorporating these pillars helps produce high quality, stable, and efficient cloud architectures.

Phase Question Pillar Description
01 How do we deliver operational excellence during cloud transformation? Operational Excellence Operational best practices and processes that keep a system running in production. The steps in this guide can help the strategy team lead the organizational change management required to consistently ensure operational excellence.
02 How do we apply the right controls to improve reliability? Resiliency - HA\DR\Migration This guide can help minimize disruptions related to inconsistencies in configuration, resource organization, security baselines, or resource protection policies. The ability of a system to recover from failures and continue to function.
03 How do we consistently secure the enterprise cloud environment? Security This guide can help ensure that the security requirements are applied across the enterprise to minimize risk of breach, and to accelerate recovery when a breach occurs. Protecting applications and data from threats.