Welcome to Woman In Cyber Security

How to harden AWS Architecture? Security Recommendations and Personal Experience

by Magda CHELLY November 07, 2017

The current interest about cloud comes from the fact that businesses are going digital and mobile. This, therefore leads to a transformation, and mainly cloud adoption.

Implementing cloud MUST be aligned with security measures to tackle the associated cyber risks.

Security is an advantage, and a competitive value. I believe that the responsibilities of the security professional handling cloud transformation include architecture review and hardening the configuration of the cloud architecture and subsequent security requirements. Amazon’s shared security model outlines the security responsibility under the customer’s obligations, but does not provide detailed guidance on building secure systems.

The popular cloud service providers are Microsoft and Amazon. Recently, I have been working on AWS and would like to have your feedback and comments on the hardening recommendations that I have been advising and putting in place.


Read the whole article on Peerlyst: https://www.peerlyst.com/posts/how-to-harden-aws-architecture-security-recommendations-and-personal-experience-magda-chelly-ph-d



Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night. Magda is the brand ambassador of Peerlyst, one of the strongest InfoSec online communities. She spends most of her time supporting chief information security officers in their cyber security strategy and roadmap. She reviews technical architectures, cloud migrations, and digital transformations. She is continuously raising cyber security awareness & diversity at a global scale. She is currently based in Singapore, with a global reach through her company in 19 locations worldwide. She speaks five languages fluently, and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally.

Leave a comment

Also in Peerlyst

How to Become A Chief Information Security Officer ?

by Magda CHELLY December 04, 2017 1 Comment

Chief Information Security Officer Guide has an objective of giving you some practical advice about the current situation of a CISO role and corporate perception and expectations.

This is designed as a support to allow you to evolve in your career and climb the corporate ladder.

The CISO role has been previously characterized as a technical/IT related role. This has drastically evolved and nowadays, the CISO/CSO role has much wider responsibilities. This guide is structured as a high level, through main considerations and feedback from my own personal experience.

Continue Reading

How to Make a Career Change from IT to Cyber Security?
How to Make a Career Change from IT to Cyber Security?

by Magda CHELLY November 12, 2017

In this article, I am guiding toward a career change into cyber security, through the below points:

  1.  How is the cyber security workforce landscape?
  2. Why change to cyber security?
  3. How to change to cyber security?
  4. What are the future jobs in cyber security?
  5. What are the career change mistakes to avoid?

The Impact of the cyber security boom is undeniably important and brings on many additional questions from the InfoSec community.

Continue Reading

The white hat hackers guide to hacking & pentesting for the common good

by Magda CHELLY November 11, 2017

‘’The white hat hackers guide to hacking & pentesting for the common good’’ will be broadly educating on hacking techniques across cloud, mobile and web applications, as each of these topics requires books on their own to dig into the topics in depth. The book on Amazon costs $0.99. The proceeds of this book will be donated by Peerlyst to http://withoutmyconsent.org, an organization fighting online harassment.


ebook hacking

Continue Reading