Thursday, August 7, 2025

Microsoft Defender for Identity and My Blogging Experience


For this assignment, I learned about Microsoft Defender for Identity. It is a tool that helps big companies keep their computer systems safe. It watches how people log in and use the system. If something seems strange, like someone trying to get into places they should not, it sends an alert to let the company know. This helps catch hackers or bad behavior early. It also works with other Microsoft security tools to give a full picture of what is going on in the system. I liked how the instructions explained how to set it up and what each alert means.

Writing blogs during this assignment was actually something I enjoyed. At first, I was nervous, but the more I wrote, the better I felt. It helped me get more comfortable with writing about tech topics. I liked taking something hard to understand and turning it into something easy to explain. That made me feel more confident.

Writing the blogs also helped me at work. I feel like I explain things more clearly now. I’m better at writing notes and helping others understand what is going on with technical problems.

I think I will keep writing blogs in the future, even when it is not for a grade. It’s a great way to share what I know and practice my writing.

I also think companies would like that I can write clearly about tech stuff. It shows that I can explain things well and help others learn. That is a great skill to have when working on a team or helping customers.




References:

batamig. (2024). Microsoft Defender for Identity documentation - Microsoft Defender for Identity. Microsoft.com. https://learn.microsoft.com/en-us/defender-for-identity/


Sunday, August 3, 2025

Mastering Log Analysis with CloudWatch Logs Insights: A Beginner-Friendly Guide


If you’ve ever stared at logs and thought, "There has to be a better way to make sense of all this," you’re in luck. Amazon CloudWatch Logs Insights is your one-stop shop for searching, analyzing, and understanding your log data faster and smarter. Whether you're troubleshooting issues or keeping tabs on system health, Logs Insights helps you get to the root of the problem and verify your fix.

What Is CloudWatch Logs Insights?

Think of it as a superpowered magnifying glass for your logs. You can search, filter, and analyze logs interactively. No more endless scrolling or guesswork. If something breaks, Logs Insights helps you identify potential causes and confirm your fix worked.

Supported Query Languages

CloudWatch Logs Insights supports three ways to interact with your data:

  1. Logs Insights QL (Query Language)
    AWS’s own language with simple but powerful commands. It includes features like pattern detection, field indexing, and even natural language querying.

  2. OpenSearch PPL (Piped Processing Language)
    Uses a pipe symbol (|) to chain commands together. It’s great for step-by-step data transformation and includes built-in math, string, date, and filtering functions.

  3. OpenSearch SQL
    If you know SQL, this one’s familiar. Use SELECT, FROM, WHERE, GROUP BY, and other SQL functions to run complex queries, including JOINs and sub-queries.

Tip: If your field names include special characters like @ or ::, enclose them in backticks. For example, @message should be written as `@message`.

New Permission Requirements Starting July 31, 2025

To run queries in the CloudWatch Console, users must have both logs:StartQuery and logs:GetQueryResults permissions. Without both, query results will not be viewable in the console. This update makes the console experience consistent with CLI and SDK requirements.

Key Features to Know

  • Automatic Field Discovery
    Works with AWS services like Lambda, Route 53, CloudTrail, and any JSON-formatted custom logs.

  • Field Indexes
    Improve performance and reduce scan costs by indexing commonly used fields. Queries will skip over log events that don’t contain the indexed field. (Note: The filterIndex command is only available in Logs Insights QL.)

  • Pattern Analysis
    Automatically identifies recurring log structures to help you spot trends and issues faster.

  • Save and Reuse Queries
    Store your complex queries and re-run them whenever needed without rewriting.

  • Dashboards
    Add saved queries to CloudWatch dashboards for real-time monitoring and quick access.

  • Encryption
    All query results can be encrypted with AWS Key Management Service.

  • Natural Language Querying (Logs Insights QL only)
    Describe what you're looking for in plain English, and AWS will generate the query and explain how it works.

  • Cross-Account Queries
    If your account is set up as a monitoring account, you can query logs across multiple AWS accounts.

Other Details to Keep in Mind

  • Queries time out after 60 minutes if they don’t complete.

  • Query results are available for 7 days.

  • CloudWatch Logs Insights works with logs from November 5, 2018 onward.

  • Charges apply based on how much data is scanned.

  • If your network blocks WebSockets, the CloudWatch Logs Insights console will not be accessible. You can still use the APIs to run your queries.

Why Use CloudWatch Logs Insights?

CloudWatch Logs Insights offers flexible ways to search and analyze your logs. Whether you prefer SQL, PPL, or AWS’s own QL, it gives you the tools to understand your systems, spot issues early, and improve performance. It's efficient, versatile, and designed to grow with your needs.




References:

Analyzing log data with CloudWatch Logs Insights - Amazon CloudWatch Logs. (n.d.). Docs.aws.amazon.com. https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AnalyzingLogData.html

Saturday, July 26, 2025

RTO vs. RPO: Why Every Business Needs to Know the Difference

 

RTO vs. RPO: Why Every Business Needs to Know the Difference

When it comes to protecting your business from disasters, whether it’s a cyberattack, hardware failure, or a natural event, downtime is the silent threat that can cripple operations. That’s where two essential metrics come in: Recovery Time Objective (RTO) and Recovery Point Objective (RPO).

Though they sound similar, RTO and RPO serve different purposes in your business continuity plan, and understanding them can make all the difference in how well you bounce back from a disaster.

What Is RTO?

Recovery Time Objective (RTO) is all about how fast you can get your business back up and running. It's the maximum amount of time your systems and processes can be down before your business begins to suffer serious consequences. For example, if your RTO is four hours, you’ve set a target to restore operations within that window to avoid revenue loss or damaged customer trust.

What Is RPO?

Recovery Point Objective (RPO) focuses on data loss tolerance. It defines how much data your business can afford to lose in the event of a disruption. It’s calculated based on the time between backups. If your RPO is one hour, your systems should back up data at least every hour so you never lose more than 60 minutes of information.

Why They Matter

RTO and RPO help you answer two key questions:

  • How long can we afford to be down?

  • How much data can we afford to lose?

Together, these metrics shape your data recovery strategy and influence the tools and processes you put in place, such as automated cloud backups, replication, and disaster recovery as a service (DRaaS).

Without clearly defined RTO and RPO, you risk falling behind competitors who can recover faster and keep serving customers when disaster strikes. According to industry research, more than half of businesses have experienced downtime exceeding eight hours. And only 2% managed to recover in under an hour.

The Cost of Ignoring Them

Failing to plan for RTO means you could struggle to resume operations after an incident. Ignoring RPO puts your data and your reputation at risk. Customers might not wait around if your services go offline or their information disappears.

A strong business continuity plan backed by realistic RTO and RPO targets doesn’t just protect your data. It builds customer confidence and helps ensure long-term success.

The Smart Move? Partner With Experts

Navigating disaster recovery planning isn’t something most companies can or should do alone. Working with a business continuity specialist ensures that your RTO and RPO goals are met using advanced solutions like cloud storage, data encryption, and automated failover systems. These tools provide a safety net when the unexpected happens.




References:

(2025). Wpenginepowered.com. https://getsynccom.wpenginepowered.com/wp-content/uploads/2022/10/RTO-vs-RPO-differences.png

Entech. (2018, October 11). The Difference Between RTO and RPO. Entechus.com; Entech. https://www.entechus.com/blogs/the-difference-between-rto-and-rpo



Sunday, July 20, 2025

Keeping Your Cloud Safe: How IAM Helps Protect Your Data

 When setting up a new cloud account, it might seem easiest to use the default root account to manage everything. However, this approach can lead to serious security risks. The root account has full access to all services and settings, so if it's compromised, everything in your cloud environment is at risk.

Instead, the best practice is to create individual, less-privileged user accounts for daily tasks. These accounts should have only the permissions they need to do their jobs. This is where Identity and Access Management (IAM) comes in.

Most cloud platforms, like AWS, Azure, and Google Cloud, come with built-in IAM tools. These tools let administrators create users and assign roles and permissions to control what each account can access or do. Not only can users have identities, but resources like applications or virtual machines can too. This means roles and permissions can be assigned to both people and services.

Once an identity is created, authentication methods such as passwords, multi-factor authentication (MFA), or digital certificates help verify that the person or application trying to access the cloud is who they say they are.

In short, IAM is a crucial part of cloud security. It helps protect your environment by ensuring the right people and tools have the right access.

In this module, we’ll explore how IAM works in cloud computing, how to properly set it up, and why it is one of the most important steps in keeping your data safe.

Sunday, July 13, 2025

Why Cloud Security Matters

 

Why Cloud Security Matters

Cloud computing is amazing. It's where we store photos, run apps, and work online. But it also introduces new security risks. A cloud provider might protect servers really well, but they can’t guard everything at once. As more data and devices move into the cloud, it gets tricky to keep it all safe.


Top Cloud Security Risks

1. Data Breaches
Hackers love cloud servers because they contain tons of data in one place. If someone cracks your account or if settings aren’t properly locked down, sensitive information can leak out.

2. Attack Surface Growth
In the cloud, your network isn’t limited to one building. Every app, device, or connection you add gives hackers more chances to find a weakness.

3. Weak Identity and Access Controls
If passwords are easy to guess, if two-factor authentication isn’t used, or if people have too much access, attackers can get in and do damage.

4. Misconfigurations and Shadow IT
A single wrong setting, like making a file folder public by mistake, can open the door to data leaks. Plus, when employees use cloud apps without approval, IT teams can’t protect what they don’t know about.

5. Insecure APIs
Cloud services often talk to each other using APIs. If these aren’t properly secured, hackers might use them to break in.

6. Human Error and Insider Threats
People still make mistakes like clicking on phishing emails or sharing the wrong files. Sometimes, even someone on the inside may do harm on purpose.


Why These Risks Matter Now

More companies are moving quickly to the cloud, but they don’t always update their security to match. With more remote workers and personal devices being used, it's harder for IT to control access. On top of that, data privacy laws like HIPAA and GDPR require companies to protect personal information or face serious penalties.


How to Defend Your Cloud

  • Use strong login security like two-factor authentication

  • Encrypt all data in storage, transit, and use

  • Monitor activity logs and run regular audits

  • Lock down default settings and automate configurations

  • Teach your team safe cloud practices

  • Use tools like CASBs, CSPMs, and CWPPs to monitor cloud environments


Final Takeaway

Cloud technology has opened up amazing opportunities, but it also brings real risks. Between data leaks, misconfigurations, and everyday human mistakes, cloud security should never be ignored. The good news is that with the right tools, policies, and awareness, you can keep your data safe while taking full advantage of the cloud.







References:

Can The Cloud Be Secured from Threats? 33 Experts on Reducing Risk & Protecting Data. (2019). PhoenixNAP Global IT Services. https://phoenixnap.com/blog/cloud-security-threats-and-risks

(2025). Slideteam.net. https://www.slideteam.net/media/catalog/product/cache/1280x720/c/l/cloud_access_security_broker_life_cycle_protection_casb_cloud_security_slide01.jpg

Friday, July 4, 2025

Sticky Sessions in AWS: What They Are and Why Your Website Might Need Them

 

Sticky Sessions in AWS: What They Are and Why Your Website Might Need Them 🍪

Imagine you’re shopping online. You add a few things to your cart, click to check out, and suddenly your cart is empty. What happened?

Behind the scenes, the website might have sent your request to a different server, and that new server didn’t know what you were doing. This kind of issue is exactly what sticky sessions are meant to solve.

Let's walk through what they are and how they work in AWS.

What Are Sticky Sessions?

Sticky sessions, also called session affinity, are a way to make sure that a user keeps getting sent to the same backend server during their visit to a website. Normally, a load balancer sends each request to any available server. But with sticky sessions turned on, it remembers who you are and keeps sending you to the same server.

This is useful for things like login sessions, shopping carts, or any personalized experience.

How Sticky Sessions Work in AWS

If you're using an AWS Classic Load Balancer, you can enable sticky sessions by using duration-based cookies.

There are two cookie options:

  • ELB cookie (AWSELB): This is a built-in cookie that AWS uses to track your session.

  • Application cookie: If your application already creates its own session cookie, AWS can use that instead to keep the session sticky.

Think of cookies as name tags that help AWS recognize you and keep you connected to the same server you started with.

When to Use Sticky Sessions

Sticky sessions are especially helpful when:

  • Users need to stay logged in

  • Your application uses a shopping cart

  • The site delivers personalized content

  • You want a consistent user experience throughout a session

Things to Watch Out For

Sticky sessions can sometimes cause problems if too many users get attached to the same server. This can lead to an unbalanced workload where one server is doing most of the work while others sit idle.

To avoid this, developers often:

  • Replicate session data across all servers

  • Design the application to be stateless, meaning it does not rely on remembering individual users between requests

Final Thoughts

Sticky sessions help keep users on the same server, so their experience stays smooth and consistent. They are especially useful in web applications that rely on memory, such as keeping a user logged in or tracking items in a cart.

If you're working with AWS and want your site to feel more reliable and personal for each visitor, sticky sessions are a simple and effective option to explore.






References: 

Configure sticky sessions for your Classic Load Balancer - Elastic Load Balancing. (2017). Amazon.com. https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-sticky-sessions.html

Sunday, June 29, 2025

Understanding the Cloud: From Layers to Virtual Networks


 

Cloud computing can seem overwhelming at first, but once you understand the basics, it starts to make a lot more sense. Behind every file you save or video you stream is a network of systems working together to move data securely and efficiently. This post breaks down some key concepts to help you get a clearer picture of how it all works.

What the Cloud Really Is

At its core, cloud computing is about using remote servers to store and process data instead of relying on your local device. John Strickland’s article explains that companies like Amazon, Microsoft, and Google offer cloud services through massive data centers. When you upload a document to Google Drive or use a cloud-based app, you’re using these remote resources.

How Information Travels

Data moves through the internet using structured models that define how it should be handled. The OSI model and the TCP/IP model are two common ways to understand this process.

The OSI model breaks communication into seven layers, which helps people pinpoint where issues might occur. The TCP/IP model, which is used more often in real-world networks, simplifies this into four layers and focuses on how data is actually transmitted. Both models help explain how your device connects to others and how your data gets from one place to another.

What Is Data Encapsulation?

Data encapsulation is the process of wrapping data with the necessary information it needs to move across a network. Each layer adds something to the original message, such as destination info or error-checking instructions. Oracle’s explanation compares it to preparing a package for delivery, where each layer adds protection and guidance.

Browsers and Servers: How They Communicate

Bradley Mitchell’s article outlines how browsers and servers talk to each other. When you click a link, your browser sends a request to a server. The server processes that request and sends the right information back. It’s a constant back-and-forth that happens in seconds.

Tools for the Cloud: CloudStack, VPCs, and More

Managing cloud environments involves tools and structures that keep everything organized and secure.

  • Apache CloudStack is a platform that helps manage cloud resources like virtual machines and storage.

  • CIDR notation, explained by Susan Adams, is a way to label ranges of IP addresses for more efficient routing.

  • Subnets divide larger networks into smaller sections, which helps manage traffic and improve performance.

  • Virtual Private Clouds (VPCs), available through providers like AWS, Google Cloud, and Microsoft Azure, give users a secure and customizable section of the cloud. It’s like creating your own private network in a shared space.

Final Thoughts

Cloud computing involves a lot of moving parts, but each one has a purpose. Whether it’s organizing data into packets, dividing networks into subnets, or customizing your own VPC, the goal is to make data accessible, secure, and easy to manage. Learning how these elements work together gives you a stronger foundation to understand today’s digital world.

Sunday, June 22, 2025

Choosing the Right Agile Certification for Cloud Migration Success

Choosing the Right Agile Certification for Cloud Migration Success

Thinking about cloud migration? You’ll need more than storage and servers. You’ll need skills. Good news: Agile certifications can level up your project game and make cloud moves smoother than a well-oiled pipeline.

Let’s break down three popular Agile certifications and how they help with cloud projects.

1. PMI-ACP: The All-Rounder

Who is it for? Project managers and team leaders working with multiple Agile methods like Scrum, Kanban, or XP
Cost: Around $435 to $495
Time to earn: A few weeks or months
Renewal: Every 3 years with continuing education
Cloud Connection: Great for long-term planning and managing stakeholders during the assessment and planning phases of cloud migration

2. PSM I: The Scrum Purist

Who is it for? Anyone who wants a solid understanding of Scrum and how to lead a Scrum team
Cost: About $150
Time to earn: Quick, with self-study
Renewal: None required
Cloud Connection: Helps organize migration tasks into sprints and keeps the team aligned throughout the process

3. SAFe POPM: The Big-Picture Boss

Who is it for? Product owners and managers working in larger or scaled Agile environments
Cost: Around $600, includes training
Time to earn: About a month
Renewal: Every year with a small fee and continued learning
Cloud Connection: Ideal for managing priorities and coordinating multiple teams during large-scale cloud projects

How This Connects to Cloud Migration

Cloud migration involves five phases:

  1. Assess

  2. Plan

  3. Migrate

  4. Validate

  5. Manage

These Agile certifications help you break complex work into smaller steps, communicate effectively across teams, and adapt quickly when things change.

Your Turn

Which certification fits your goals best? Comment below or share your thoughts with your team. If you're leading or supporting a cloud migration, having the right Agile mindset can make all the difference.

Sunday, June 15, 2025

Cloud Computing for Dummies: What It Is, How It Works, and Why It’s Like Growing Flowers-Week 2

Cloud computing is the reason you can stream, store, and share without blowing up your hard drive. Whether you’re planting your own digital seeds with IaaS, nurturing pre-grown apps with PaaS, or simply enjoying the bouquet with SaaS, there’s a flower for every level of tech comfort.

Next time someone brings up the cloud, you’ll know it’s less mystery, more marigolds.

⛅ So, What Is Cloud Computing?

Imagine you need space to store files or run software, but you don't want to buy a fancy new computer. Instead, you rent a little corner of someone else's super-powerful machine over the internet. That’s cloud computing in a nutshell.

Instead of doing everything on your device, cloud computing lets you access storage, apps, and even entire operating systems online. Think Google Drive, Netflix, or Zoom — all powered by the cloud!

🌺 Cloud Flower Analogy: The 3 Cloud Models

Let’s explain the 3 main types of cloud services using everyone's favorite garden delight: flowers.

1. IaaS – Infrastructure as a Service (Planting from Seeds)

You prepare the soil, plant the seeds, water them, and take care of everything yourself.

Real-world version: Amazon EC2, Microsoft Azure. You manage your apps, data, and configurations, but don’t worry about the physical machines (garden plot).

2. PaaS – Platform as a Service (Buying a Young Plant)

Someone gives you a sprouting plant. You just have to water it and place it in sunlight.

Real-world version: Heroku, Google App Engine. You focus on your app’s code. No need to manage servers or software updates (you don’t dig or build the garden bed).

3. SaaS – Software as a Service (Bouquet Delivery)

You get a beautiful bouquet delivered to your door. No growing, no maintenance, just enjoy!

Real-world version: Gmail, Microsoft 365, Dropbox. You use ready-to-go apps online. Zero setup, zero maintenance.

🌿 Cloud Types: Public, Private, and Hybrid

  • Public Cloud: Like a public park garden. Everyone can admire and use it. (Ex: Google Cloud, AWS)

  • Private Cloud: A fenced-in garden in your backyard. Only you can enjoy it.

  • Hybrid Cloud: Some flowers in your yard, others in the park. A mix of private and public benefits.

 Why Should You Care?

  • Saves money – No need for expensive computers.

  • More flexibility – Work from anywhere.

  • Scalable – Start small, grow big (just like a single plant becoming a blooming garden).

 In a Nutshell

Cloud computing is the reason you can stream, store, and share without blowing up your hard drive. Whether you’re planting your own digital seeds with IaaS, nurturing pre-grown apps with PaaS, or simply enjoying the bouquet with SaaS, there’s a flower for every level of tech comfort.




References:

The Three Ways to Cloud Compute. (n.d.). Www.youtube.com. https://www.youtube.com/watch?v=SgujaIzkwrE

Kevin Eaton. (2015, June 25). Cloud Deployment Models. YouTube. https://www.youtube.com/watch?v=JhLfhq8JAEo

Sunday, June 8, 2025

Week 1 Posting

 Welcome to My Tech Corner: Exploring the Cloud and Beyond

Hi everyone, and welcome to my very first blog post! I'm excited to join the IT blogging world and start sharing what I’m learning and discovering along the way. My name is Kelsey, and I’m currently studying Information Technology with a growing interest in how cloud computing is shaping the future of business and development.

One of the first major topics we’re diving into is cloud service models, specifically SaaS, PaaS, and IaaS. I’ve come to learn that while these may sound technical at first, they’re actually key pieces of how many of the tools we use every day operate behind the scenes.

Software as a Service (SaaS) is probably the most familiar. It’s what we use when we check email on Gmail or store files in Dropbox. No downloads, no updates, just sign in and go.

Platform as a Service (PaaS) offers a full environment for developers to build and run applications without managing the servers or networks. It’s a huge time-saver and allows for creativity without the heavy lifting of infrastructure setup.

Infrastructure as a Service (IaaS) gives businesses access to servers, storage, and networking on demand. Think of it like renting a virtual data center. It’s flexible and powerful for companies that need control without owning physical hardware.

As I continue this blog, I’ll be exploring how these technologies are used, their real-world impact, and how they connect to broader topics like cybersecurity, automation, and innovation.

Thanks for stopping by. I’m looking forward to growing in this space and sharing insights along the way.

Wednesday, June 12, 2024

Week 2 Posting - The Magic of Virtualization in Cloud Computing

This week, we dove into the fascinating world of virtualization and its pivotal role in cloud computing. At its core, virtualization is like creating a digital twin of something physical, whether hardware, storage, or networks. Imagine running multiple virtual machines (VMs) on a single computer, each acting like a standalone device. This is made possible by a hypervisor, which acts as a traffic cop, managing communication between these virtual and physical entities.

The virtual Network Interface Card (vNIC) is a standout feature in this setup. Just like a regular network card, a vNIC allows VMs to connect and talk to each other. It's like giving each VM its own phone line. Another important aspect is the virtual CPU (vCPU). The number of vCPUs a physical machine can support depends on its CPU power, ensuring that each VM gets enough processing power to function smoothly.

One of the coolest aspects of virtualization is the ability to move VMs around easily. This is especially handy when moving to the cloud. Think of it as packing up your digital house and moving it to a new neighborhood without interruption. Various tools help smooth this migration process, supporting business continuity and ensuring critical applications stay up and running even during hardware upgrades or maintenance.

In short, virtualization is the backbone of modern cloud computing, offering cost savings, better resource use, and incredible flexibility. Understanding how virtualization works will be key to building and managing efficient cloud environments as we continue exploring cloud technologies.







Microsoft Defender for Identity and My Blogging Experience

For this assignment, I learned about Microsoft Defender for Identity. It is a tool that helps big companies keep their computer systems saf...