The Validation Engine
We analyze your Blueprint against the Well-Architected Framework, scoring it across five pillars:Security
PII detection, tenant isolation, access controls
Reliability
Backups, recovery, fault tolerance
Performance
Indexing, caching, query optimization
Cost
Resource sizing, usage estimates
Operations
Logging, metrics, health checks
Validation Report
After running validation, you’ll see a detailed report:PII Detection
Backdrift automatically detects Personally Identifiable Information:| Field Pattern | Detection |
|---|---|
email, email_address | Email PII |
phone, phone_number | Phone PII |
ssn, social_security | SSN PII (Critical) |
address, street | Address PII |
dob, birth_date | Date of Birth PII |
- Encryption at rest
- Access logging
- Data retention policies
Auto-Fixes
Backdrift doesn’t just complain—it fixes.Safe Fixes (Low Risk)
Applied automatically or with one click:- Adding
created_atandupdated_attimestamps - Enabling structured logging
- Adding missing indexes
- Setting default retention policies
Medium Risk Fixes
Require confirmation:- Enabling encryption on existing fields
- Adding audit logging
- Changing field types
High Risk Fixes
Require explicit acknowledgment:- Removing fields (data loss potential)
- Changing primary keys
- Modifying tenant isolation
One-Click Fix All
For issues classified as Safe, you can apply all fixes at once:Cost Estimation
Before deploying, we estimate your monthly costs at two tiers:| Tier | Users | Estimated Cost |
|---|---|---|
| Starter | 0-100 users | 25/month |
| Production | 100k+ users | 500/month |
- Database storage and read/write operations
- API Gateway requests
- Lambda invocations
- Authentication operations
- File storage (if configured)
Estimates are based on typical usage patterns. Actual costs depend on your specific traffic and data volumes.
Non-Technical Summary
For stakeholders who don’t speak “infrastructure”, we generate plain-English summaries:Deployment
Ready to deploy? Learn about safe deployments and rollbacks.
