Network Architecture Reviewer

PRO
Advanced 45 min Verified 4.8/5

Review network architecture for security, performance, and scalability. Covers VPC design, firewall rules, load balancing, DNS, hybrid connectivity, and multi-cloud networking patterns.

Example Usage

I’m a senior infrastructure engineer at a fintech company. We’re running a payment processing platform on AWS with the following setup: a single VPC in us-east-1 with 3 public subnets hosting ALBs and NAT gateways, 3 private subnets for ECS Fargate services, and 3 isolated subnets for RDS Aurora PostgreSQL. We also have a site-to-site VPN to our on-premises data center for legacy system integration. We’re planning to expand to eu-west-1 for GDPR compliance and need to review our entire network architecture before the expansion. Our traffic is about 50K requests/minute during peak with seasonal spikes of 3x. We need PCI-DSS compliance and are considering adding a WAF layer.
Skill Prompt

Pro Skill

Unlock this skill template and 1226+ more with Pro

This skill works best when copied from findskill.ai — it includes variables and formatting that may not transfer correctly elsewhere.

Build Real AI Skills

Step-by-step courses with quizzes and certificates for your resume

How to Use This Skill

1

Copy the skill using the button above

2

Paste into your AI assistant (Claude, ChatGPT, etc.)

3

Fill in your inputs below (optional) and copy to include with your prompt

4

Send and start chatting with your AI

Suggested Customization

DescriptionDefaultYour Value
Description of your current network architecture or diagramAWS VPC with public and private subnets across 2 AZs
Primary cloud provider for the network reviewAWS
Specific network requirements or constraintsHigh availability, low latency, PCI-DSS compliant
Compliance frameworks that affect network designPCI-DSS
Expected traffic patterns and volumesWeb application with 10K concurrent users, API traffic, batch data processing

Overview

The Network Architecture Reviewer skill transforms any AI assistant into a senior network architect who can systematically review your cloud network design. It evaluates VPC/VNet configurations, subnet layouts, firewall rules, load balancing, DNS architecture, hybrid connectivity, and multi-cloud networking for security vulnerabilities, performance bottlenecks, redundancy gaps, scalability limits, and cost waste.

Whether you are designing a greenfield architecture, expanding to new regions, preparing for a compliance audit, or troubleshooting network performance, this skill provides a structured review framework with specific CLI commands, IaC templates, and actionable remediation steps for AWS, Azure, and GCP.

Step 1: Copy the Skill

Click the Copy Skill button above to copy the network architecture reviewer prompt to your clipboard.

Step 2: Open Your AI Assistant

Open Claude, ChatGPT, Gemini, or your preferred AI assistant.

Step 3: Paste and Describe Your Architecture

Paste the skill and then describe your network architecture. Include:

  • {{architecture_description}} - Your VPC/VNet layout, CIDR ranges, and subnet tiers
  • {{cloud_provider}} - Your primary cloud provider (AWS, Azure, GCP)
  • {{network_requirements}} - Availability, latency, compliance requirements
  • {{compliance_needs}} - PCI-DSS, HIPAA, SOC 2, FedRAMP, or other frameworks
  • {{traffic_patterns}} - Expected traffic volumes and patterns

Example Output

NETWORK ARCHITECTURE REVIEW REPORT
====================================
Organization: Acme Fintech
Date: 2026-02-23
Scope: AWS us-east-1, us-west-2 (Production)
Frameworks: PCI-DSS 4.0, SOC 2

EXECUTIVE SUMMARY
-----------------
Total findings: 14
Critical: 2 | High: 4 | Medium: 5 | Low: 3

CRITICAL FINDINGS:
1. [SEC] RDS Aurora cluster is publicly accessible (port 5432 open to 0.0.0.0/0)
2. [SEC] Single NAT Gateway serves all 3 AZs (single point of failure)

HIGH FINDINGS:
3. [PERF] No VPC endpoints for S3/ECR — NAT Gateway processing 2TB/month ($90/mo waste)
4. [REL] No multi-region failover configured despite 99.99% SLA requirement
5. [SEC] No WAF in front of public-facing ALB
6. [SEC] Outbound security groups allow all traffic to 0.0.0.0/0

RECOMMENDED ARCHITECTURE:
┌─────────────────────────────┐
│        CloudFront + WAF     │
└──────────┬──────────────────┘
┌──────────┴──────────────────┐
│    ALB (3 AZs, internal)    │
└──────────┬──────────────────┘
┌──────────┴──────────────────┐
│  ECS Fargate (Private Tier) │
│  3 AZs, Security Group: app │
└──────────┬──────────────────┘
┌──────────┴──────────────────┐
│  Aurora PostgreSQL (Isolated)│
│  3 AZs, No internet access  │
└─────────────────────────────┘

Customization Tips

  • Single cloud focus: Specify your cloud provider to get provider-specific commands and services
  • Compliance-driven review: Mention your compliance framework (PCI-DSS, HIPAA) for targeted checks
  • Cost optimization focus: Ask specifically about cost optimization to get detailed savings calculations
  • Architecture diagram review: Paste ASCII diagrams, Terraform code, or describe your topology for targeted feedback

Best Practices

  1. Run this review before deploying to production or expanding to new regions
  2. Combine with the Cloud Security Auditor skill for a comprehensive security assessment
  3. Re-run the review quarterly or after major architecture changes
  4. Use the provided CLI commands to validate findings in your actual environment
  5. Share the review report with your team for collaborative remediation planning

Research Sources

This skill was built using research from these authoritative sources: