Welcome to Woman In Cyber Security

How to harden AWS Architecture? Security Recommendations and Personal Experience

by Magda CHELLY November 07, 2017

The current interest about cloud comes from the fact that businesses are going digital and mobile. This, therefore leads to a transformation, and mainly cloud adoption.

Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.

Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements. Amazon’s shared security model outlines the security responsibility under the customer’s obligations, but does not provide detailed guidance on building secure systems.

The popular cloud service providers are Microsoft and Amazon. Recently, I have been working on AWS and would like to have your feedback and comments on the hardening recommendations that I have been advising and putting in place.

 

Read the whole article on Peerlyst: https://www.peerlyst.com/posts/how-to-harden-aws-architecture-security-recommendations-and-personal-experience-magda-chelly-ph-d




Magda CHELLY
Magda CHELLY

Author

Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night.


Leave a comment


Also in Peerlyst

How to Become A Chief Information Security Officer ?

by Magda CHELLY December 04, 2017 1 Comment

Chief Information Security Officer Guide has an objective of giving you some practical advice about the current situation of a CISO role and corporate perception and expectations.

This is designed as a support to allow you to evolve in your career and climb the corporate ladder.

The CISO role has been previously characterized as a technical/IT related role. This has drastically evolved and nowadays, the CISO/CSO role has much wider responsibilities. This guide is structured as a high level, through main considerations and feedback from my own personal experience.

Continue Reading

How to Make a Career Change from IT to Cyber Security?
How to Make a Career Change from IT to Cyber Security?

by Magda CHELLY November 12, 2017

In this article, I am guiding toward a career change into cyber security, through the below points:

  1.  How is the cyber security workforce landscape?
  2. Why change to cyber security?
  3. How to change to cyber security?
  4. What are the future jobs in cyber security?
  5. What are the career change mistakes to avoid?

The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.

Continue Reading

The white hat hackers guide to hacking & pentesting for the common good

by Magda CHELLY November 11, 2017

‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.

 

ebook hacking

Continue Reading