Advertisement · 728 × 90

Posts by C.Ellyson-tech career blueprint

Then I mapped CloudTrail logs using an external table.
Why?

Because Athena doesn’t store data — it reads directly from S3.
That’s serverless analytics done right.

2 days ago 0 0 0 0

Security insight:
Not all threats are loud.
Some are slow, quiet, and repetitive.
That’s why I grouped activity by IP:
SQL
SELECT sourceIPAddress, COUNT(*)
FROM cloudtrail_logs
GROUP BY sourceIPAddress

2 days ago 0 0 0 0

you're serious about cloud security:
Build projects.

Not just certifications.

Because in interviews, nobody cares what you know…
They care what you’ve done.

3 days ago 0 0 0 0

This project is free-tier friendly.
No excuse.

You can build real cloud security experience without spending money.

3 days ago 0 0 0 0

One mistake I hit hard:

Queries failing after first run.
Root cause?
No query result location set in S3.
Always configure this first.

4 days ago 0 0 0 0

Athena is underrated.
You can literally run SQL on terabytes of logs without managing infrastructure.
That’s insane leverage.

4 days ago 0 0 0 0

How is cloud job market

5 days ago 0 0 0 0

True

5 days ago 1 0 0 0

Most people think insider threats = hackers.

Wrong.

The biggest risk is often someone already inside your system.

5 days ago 2 0 0 0

If you're not logging activity in your cloud environment, you're blind.

I used AWS CloudTrail to capture every API call made in my environment.

Every login. Every action. Every mistake.

5 days ago 0 0 0 0
Advertisement

Cloud security isn’t just about prevention.
It’s about visibility.

Logs = truth.

That’s why I stored all CloudTrail logs in Amazon S3 for analysis.

6 days ago 1 0 0 0

Here’s where it gets interesting

Raw logs are useless if you can’t query them.

So I used Amazon Athena to run SQL queries directly on S3.

No servers. No setup. Just data → insights.

6 days ago 0 0 0 0

created a database in Athena with ONE command:
SQL
CREATE DATABASE insider_threat_logs;
Simple step.

Massive impact.

1 week ago 0 0 0 0

What is privilege creep, and how does it happen in enterprise environments?

1 week ago 0 0 0 0

Why can an EC2 instance in a public subnet still be unreachable from the internet?

1 week ago 0 0 0 0

Beginner mistake:

Setting up cloud resources without monitoring.

It’s like locking your door but refusing to install cameras.

Security ≠ prevention only.
Security = detection + response.

1 week ago 0 0 0 0

My setup only alerts on severity ≥ 5.

Why?

Because:
Low severity = noise

Medium/High = action

Security is about prioritization.

1 week ago 0 0 0 0

Here’s a mindset shift:

Manual response = minutes
Automated response = seconds

Attackers don’t wait.

Why should your defenses?

1 week ago 0 0 0 0
Advertisement

CLOUD KNOWLEDGE CHECKPOINT

What is Elastic Load Balancing, and what problem does it solve?

1 week ago 0 0 0 0

Describe the flow of SSO authentication when accessing AWS through an IdP.

1 week ago 0 0 0 0

I built a simple AWS threat detection system and here’s the truth:

You don’t need expensive tools to start securing the cloud.

You need:

GuardDuty (detection)
CloudWatch (monitoring)
SNS (alerts)
Lambda (automation)

That’s it.

1 week ago 0 0 0 0

Not all alerts matter.

That’s why filtering by severity is critical.
If you alert on everything → you’ll ignore everything.

Focus on:

Medium (suspicious)
High (dangerous)
Signal > noise.

1 week ago 1 0 0 0

Think of Lambda as your incident response engine.

It reacts instantly to events like:

Compromised EC2
Suspicious API calls
Unauthorized access

Speed is everything in security.

1 week ago 0 0 0 0

Real-world mindset:

A threat is detected → what happens next?
If your answer is “I’ll check it later”…
You already lost.

Automation is not optional in cloud security.

1 week ago 0 0 0 0

Cloud security is not about tools.

It’s about designing systems that react to threats automatically.

Tools are just building blocks.

Architecture is everything.

1 week ago 0 0 0 0
Advertisement

The biggest upgrade in your security journey will be this:

Stop thinking like a builder.
Start thinking like an attacker.

Ask yourself: “How would I break this system?”

Then defend it.

1 week ago 0 0 0 0

One underrated skill in cloud security:

Event-driven thinking.
“When X happens → trigger Y”

That’s how you build scalable, automated security systems.

2 weeks ago 0 0 0 0

GuardDuty is basically your cloud security analyst that never sleeps.

It analyzes:

VPC Flow Logs
DNS logs
CloudTrail
And tells you: “Something is wrong here.”

2 weeks ago 0 0 0 0

Most people think cloud security starts with firewalls.

It doesn’t.
It starts with visibility.
If you can’t see what’s happening in your cloud, you can’t secure it.

That’s where GuardDuty comes in.

2 weeks ago 0 0 0 0

SNS is simple, but powerful.

It turns detection into actionable awareness.

Without alerts, your detection system is useless.
If no one knows → no one responds.

2 weeks ago 0 0 0 0