Design Solutions for Organizational Complexity
Architect network connectivity, prescribe security controls, design resilient architectures, multi-account environments, and cost optimization strategies (~26% of exam).
Design Solutions for Organizational Complexity in AWS focuses on architecting systems that accommodate multi-account strategies, cross-account access, and enterprise-scale governance requirements. **Multi-Account Strategies:** AWS Organizations enables centralized management of multiple AWS accoun…
Concepts covered: AWS Global Infrastructure, Amazon VPC networking concepts, AWS Direct Connect, AWS Site-to-Site VPN, Transitive routing in AWS, AWS Transit Gateway, VPC peering connections, AWS container networking services, Hybrid DNS with Route 53 Resolver, On-premises DNS integration, Network segmentation and subnetting, IP addressing and CIDR blocks, Connectivity among multiple VPCs, Network traffic monitoring, VPC Flow Logs, AWS Network Firewall, Evaluating VPC connectivity options, On-premises to cloud integration, Co-location connectivity, AWS Region and Availability Zone selection, Network latency requirements, Troubleshooting traffic flows, VPC endpoints for service integrations, AWS PrivateLink, AWS IAM Identity Center, IAM users, groups, and roles, IAM policies and permissions, Route tables for security, Security groups, Network ACLs, AWS Key Management Service (KMS), KMS key policies and grants, AWS Certificate Manager (ACM), Certificate management best practices, AWS CloudTrail, IAM Access Analyzer, AWS Security Hub, Amazon Inspector, Cross-account access management, Third-party identity provider integration, Encryption strategies for data at rest, Encryption strategies for data in transit, Centralized security event notifications, Security auditing strategies, Recovery Time Objectives (RTO), Recovery Point Objectives (RPO), AWS Elastic Disaster Recovery, Pilot light disaster recovery, Warm standby disaster recovery, Multi-site disaster recovery, Data backup strategies, AWS Backup service, Designing DR solutions for RTO/RPO requirements, Automatic failure recovery architectures, Scale-up vs scale-out architectures, Effective backup and restoration strategies, AWS Organizations, AWS Control Tower, Service Control Policies (SCPs), Multi-account event notifications, AWS Resource Access Manager (RAM), Cross-account resource sharing, Account structure for organizational requirements, Centralized logging strategies, Multi-account governance models, Landing zone design, AWS Trusted Advisor, AWS Pricing Calculator, AWS Cost Explorer, AWS Budgets, Reserved Instances, AWS Savings Plans, Spot Instances, AWS Compute Optimizer, Amazon S3 Storage Lens, Monitoring cost and usage, Cost allocation tagging strategies, Purchasing options impact on cost and performance
SAP-C02 - Design Solutions for Organizational Complexity Example Questions
Test your knowledge of Design Solutions for Organizational Complexity
Question 1
A financial services company operates a trading platform across 4 AWS accounts with an Enterprise Support plan. Their infrastructure includes 156 EC2 instances, 32 RDS databases, and multiple NAT Gateways. The cloud operations team has been tasked with building an automated governance framework that responds to Trusted Advisor check status changes in real-time. When a check transitions from green to yellow or red status, the framework must automatically create a ServiceNow incident ticket, update a centralized DynamoDB tracking table, and send notifications to the appropriate engineering team based on the check category. The team has already configured an SNS topic for notifications but needs to determine how to trigger these automated responses when Trusted Advisor check statuses change. The senior engineer suggests polling the Support API every 5 minutes, while a junior engineer proposes using a native event-driven approach. The operations director requires a solution that minimizes latency between status changes and automated responses while reducing operational overhead. Which AWS service integration should the solutions architect configure to enable event-driven automation that triggers Lambda functions when AWS Trusted Advisor check statuses change?
Question 2
A global e-commerce company operates a distributed order management system across three VPCs in the same AWS Region: VPC-Orders (10.10.0.0/16) for order processing, VPC-Inventory (10.20.0.0/16) for inventory management, and VPC-Payments (10.30.0.0/16) for payment processing. All three VPCs are interconnected through a transit gateway with appropriate route table configurations. The order processing instances (SG-Orders) must communicate with inventory instances (SG-Inventory) on TCP port 8500 and with payment instances (SG-Payments) on TCP port 9500. The inventory instances must also communicate with payment instances on TCP port 9600 for reconciliation. Network ACLs in all VPCs allow all traffic. After deployment, the operations team reports the following symptoms: order-to-inventory communication on port 8500 works correctly, order-to-payment communication on port 9500 times out, and inventory-to-payment communication on port 9600 also times out. The team has verified that all services are running, DNS resolution works, and transit gateway attachments are active. SG-Orders has outbound rules for TCP 8500 to 10.20.0.0/16 and TCP 9500 to 10.30.0.0/16. SG-Inventory has an inbound rule for TCP 8500 from 10.10.0.0/16 and an outbound rule for TCP 9600 to 10.30.0.0/16. SG-Payments has an inbound rule for TCP 9500 from SG-Orders. What explains the selective connectivity failures?
Question 3
A multinational insurance company operates 94 AWS accounts organized into OUs for Claims-Processing, Underwriting, Customer-Portal, Actuarial-Services, and Corporate-IT. The organization has been using AWS Organizations for three years with all features enabled. The enterprise architecture team recently designed a complex SCP inheritance strategy where the root has an SCP allowing all services, the Claims-Processing OU has an SCP explicitly allowing only EC2, S3, RDS, and Lambda, and a child OU called Claims-Automation under Claims-Processing has an additional SCP that explicitly allows Step Functions and EventBridge. An account called automation-prod exists within the Claims-Automation OU. A developer in automation-prod with full IAM AdministratorAccess attempts to create an AWS Step Functions state machine but receives an access denied error. The developer also cannot access Amazon SNS, which they need for notification workflows. The cloud governance team needs to understand why the Step Functions access is being denied despite the Claims-Automation OU SCP explicitly allowing it. What explains the effective permissions issue preventing Step Functions access in the automation-prod account?