AWS Security – Part 1- Securing Root Account with MFA

Task: Create AWS account and set up for below tasks What is the need to perform this: Securing an AWS root account is crucial because it has unrestricted access to all resources and services within your AWS environment. If compromised, an attacker could delete resources, steal data, or even lock you out of your ownContinue reading “AWS Security – Part 1- Securing Root Account with MFA”

DevSecOps – Secure Software Development

TryHackMe’s DevSecOps Learning Path focuses on securing pipelines and introducing Infrastructure as Code (IaC) and Containerisation security techniques. You’ll learn the tools and practices to ensure robust development processes and secure software deployment workflows. From fortifying pipelines to automating infrastructure management, you will gain practical insights into modern DevSecOps methodologies. Secure Software Development Lab: IntroductionContinue reading “DevSecOps – Secure Software Development”

Domain 1 – Cloud Computing Concepts & Architectures

Definition of Cloud Computing NIST (SP 800-145) Defines Cloud Computing : Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Abstraction &Continue reading “Domain 1 – Cloud Computing Concepts & Architectures”

Information Security Clauses for business contracts and agreements

In line with ISO 27001 and NIST. General Clauses Confidentiality and Data Protection: a. The Vendor shall treat all data and information provided by [Company Name], including but not limited to personal data, intellectual property, and confidential business information, as strictly confidential and shall not disclose, share, or use such data and information for anyContinue reading “Information Security Clauses for business contracts and agreements”

Lab 2:  Network Security Groups and Application Security Groups

Objective You have been asked to implement your organization’s virtual networking infrastructure and test to ensure it is working correctly. In particular: Exercise 1: Create the virtual networking infrastructure Step 1: Type Virtual networks and press the Enter key and click + Create. Step 2: Fill in the details On the IP addresses tab ofContinue reading “Lab 2:  Network Security Groups and Application Security Groups”

Lab 1: Role Based Access Control

Objective You have been asked to create a proof of concept showing how Azure users and groups are created. Also, how role-based access control is used to assign roles to groups. Specifically, you need to: Step 1: Login to the portal Step 2: Go to Microsoft Entra ID and click on add user Step 3:Continue reading “Lab 1: Role Based Access Control”

AWS Developer Service

Software developers use tools to accelerate the software development and release cycle. Services: Cloud9 Cloud9 allows you to write code within an integrated development environment (IDE) from within your web browser. Features: Integrated development environment (IDE). Write and debug code. Supports popular programming languages. Cloud9 preconfigures the development environment with the needed SDKs and libraries.Continue reading “AWS Developer Service”

Machine Learning Services

Artificial Intelligence(AI) teaches computers to do things that normally require human intelligence. Some services: Rekognition Rekognition allows you to automate your image and video analysis. Features: Image and video analysis. Identify custom labels in images and videos. Face to text detection in images and videos. Comprehend Comprehend is a natural-language processing (NLP) service that findsContinue reading “Machine Learning Services”

AWS Analytics Services

Data Warehouse A data warehouse is a data storage solution that aggregates massive amounts of historic data from disparate sources. Benefits: Data warehouses support querying, reporting, analytics. And business intelligence. They are not used for transaction processing. Amazon Redshift Redshift is a scalable data warehouse solution. Features: Data warehousing solution. Handles exabyte-scale data. Improves speedContinue reading “AWS Analytics Services”

AWS Migration Services

A lot of companies are migrating to the cloud, and they need inexpensive, fast, and secure ways to move their on-premises data to AWS. Data Migration Service (DMS) DMS helps you migrate databases to or within AWS. Features: Migrate on-premise databases to AWS. Supports homogeneous and heterogeneous migrations. Continuous data replication. Virtually no downtime. UseContinue reading “AWS Migration Services”