<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[CyberGuide]]></title><description><![CDATA[Cybersecurity Resources]]></description><link>https://cyberguidesolutions.com/</link><image><url>https://cyberguidesolutions.com/favicon.png</url><title>CyberGuide</title><link>https://cyberguidesolutions.com/</link></image><generator>Ghost 5.85</generator><lastBuildDate>Wed, 29 Apr 2026 13:24:12 GMT</lastBuildDate><atom:link href="https://cyberguidesolutions.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[How a Single Application Update Took Down 8.5 Million Windows Machines All Over the World]]></title><description><![CDATA[<p></p><p>C-00000291*. sys&#x2014; This is the tiny 40 KB file, a driver file associated with CrowdStrike&apos;s Falcon endpoint security software sensor, that took down over 8.5 million Windows computers worldwide. This file, a crucial software component, caused a worldwide outage, affecting airlines, airports, banks, hotels, hospitals, manufacturing,</p>]]></description><link>https://cyberguidesolutions.com/crowd/</link><guid isPermaLink="false">66a1aace4a6a363d8eddbc3b</guid><category><![CDATA[Outages]]></category><category><![CDATA[Trends]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Sun, 04 Aug 2024 22:24:31 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/09/pikaso_embed_digital-painting-A-glowing-blue-padlock-icon-surro.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/09/pikaso_embed_digital-painting-A-glowing-blue-padlock-icon-surro.jpg" alt="How a Single Application Update Took Down 8.5 Million Windows Machines All Over the World"><p></p><p>C-00000291*. sys&#x2014; This is the tiny 40 KB file, a driver file associated with CrowdStrike&apos;s Falcon endpoint security software sensor, that took down over 8.5 million Windows computers worldwide. This file, a crucial software component, caused a worldwide outage, affecting airlines, airports, banks, hotels, hospitals, manufacturing, stock markets, broadcasting, gas stations, retail stores, governmental services, and Fortune 500 companies. So, hundreds of millions worldwide missed doctor&apos;s appointments, airline flights, and other critical services. This tiny file caused worldwide financial loss estimated at least USD 10 billion by multiple insurance firms, including cyber insurance firms. As I&apos;ve talked about in an <a href="https://cyberguidesolutions.com/cia-triad/" rel="noreferrer">earlier article</a> I wrote in February, compromising one of the three parts of the CIA triad, namely Confidentiality, Integrity, and Availability, can negatively affect human lives, health, jobs, businesses, and economies worldwide. Though not the result of or related to a cyberattack, the CrowdStrike outage significantly affected millions of people by compromising the availability of critical services. In the case of the recent CrowdStrike outage on Friday, July 19, 2024, the availability part of the CIA triad was broken.</p><p>So, how did this massive outage that affected over 8.5 Windows systems worldwide happen? To start, let&apos;s identify the problem&apos;s system, which, in this case, was the Blue Screen of Death (BSOD) on Windows machines running CrowdStrike&apos;s Falcon endpoint security platform, which is like anti-malware software on steroids. The BSOD is a critical system error in Windows operating systems that can cause the system to crash, leading to data loss and potential hardware damage. A computer generally has two areas: Ring 0, or kernel mode, and Ring 1, or user mode. Kernel mode is where an operating system and kernel-mode drivers, which have direct access to and control of the computer&apos;s hardware, run. On the other hand, user mode is where multiple applications, such as Microsoft Office or your favorite Windows-based game, run on top of the Windows operating system located in kernel mode. When an application crashes, its blast radius is isolated to Ring 1 and doesn&apos;t affect the underlying operating system running in Ring 0. However, when an issue occurs in Ring 0 or kernel mode, its blast radius of damage affects the entire system, bringing down all the applications running on top of it. The driver file associated with CrowdStrike&apos;s Falcon endpoint security software sensor, C-00000291*.sys, caused an &apos;out-of-bounds memory read&apos; and subsequent Blue Screen of Death (BSOD) on Windows machines running CrowdStrike&apos;s Falcon endpoint security software, which runs in Ring 0 or kernel mode.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/08/CrowdStrike_BSOD_at_LGA.jpg" class="kg-image" alt="How a Single Application Update Took Down 8.5 Million Windows Machines All Over the World" loading="lazy" width="2000" height="1500" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/08/CrowdStrike_BSOD_at_LGA.jpg 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/08/CrowdStrike_BSOD_at_LGA.jpg 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/08/CrowdStrike_BSOD_at_LGA.jpg 1600w, https://cyberguidesolutions.com/content/images/2024/08/CrowdStrike_BSOD_at_LGA.jpg 2000w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">By Smishra1 - Own work, CC BY-SA 4.0, </span><a href="https://commons.wikimedia.org/w/index.php?curid=150535443"><span style="white-space: pre-wrap;">https://commons.wikimedia.org/w/index.php?curid=150535443</span></a><span style="white-space: pre-wrap;">By Smishra1 - Own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=150535443 | LaGuardia Airport in New York City experienced severe computer issues in July 2024 due to a CrowdStrike outage. A faulty software update on the baggage carousels caused a series of blue screens of death (BSOD), impacting baggage availability to millions worldwide. This scenario exemplifies how compromising one of the three parts of the CIA triad related to cybersecurity can cause much difficulty in life.</span></figcaption></figure><p></p><p>As you can see, any issue occurring in the kernel mode will bring down the entire system. It wasn&apos;t the Falcon sensor content, one of two updates to CrowdStrike&apos;s Falcon endpoint security software, that caused the issue; it was the sensor configuration update meant to provide instructions for detecting malware that caused the problem. Isn&apos;t it fascinating that CrowdStrike&apos;s Falcon sensor earned Microsoft&apos;s Windows Hardware Quality Labs (WHQL) certification? This certification, a rigorous testing process conducted by Microsoft, demonstrates that the Falcon sensor successfully cleared demanding tests to meet Microsoft&apos;s strict compatibility and reliability standards for the Windows operating system. However, it&apos;s crucial to recognize that even with the &quot;WHQL&quot; certification, there is still potential for issues to arise and create chaos.</p><p>The breakdown in CrowdStrike&apos;s CI/CD pipeline may have occurred during the continuous integration phase, specifically in the software update&apos;s quality control process. The faulty update was not properly validated before deployment, resulting in the outage. Like many CI/CD pipelines, CrowdStrike&apos;s CI/CD pipeline involves several automated steps, including code commits, building and compiling code, running automated tests, and performing code quality checks. However, the defect in the software update went undetected during these validation checks. This issue highlighted a gap in the automated testing and quality assurance processes within the CI/CD pipeline.</p><p>While the problem may have been caused by something during the change management process, the specific issue may be isolated to a content validator, a software tool that verifies the accuracy, integrity, and security of the content being deployed. The content validator ensures that updates, configuration, or any changes pushed through the CI/CD pipeline don&apos;t contain vulnerabilities, errors, or other harmful elements that can disrupt the system. So, in the CrowdStrike incident, the content validator can be expected to check for errors to catch code defects, perform security verification to ensure updates are free from malicious code or vulnerabilities, perform compatibility checks to make sure that updates work smoothly with the existing system and other software components, and, finally, verify compliance with regulatory and compliance requirements specific to the organization and industry. Considering the various functions of the content validator, we can see how its failure to catch errors in the software update before it was deployed caused BSODs in Windows machines worldwide, highlighting the critical role of effective content validation in maintaining the security and stability of CI/CD pipelines. Also, this outage emphasizes how strong validation mechanisms can prevent many of the consequences I&apos;ve described earlier that were felt by millions worldwide.</p><p>CrowdStrike didn&apos;t reveal the specific name of the content validator tool they&apos;re using, but it&apos;s evident that it&apos;s a vital part of their internal validation and testing process. The recent failure showed the importance of strengthening validation mechanisms, improving testing procedures, and enhancing error-handling capabilities within CI/CD pipelines.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/08/Ngurah_Rai_Microsoft_Outage_2024.jpg" class="kg-image" alt="How a Single Application Update Took Down 8.5 Million Windows Machines All Over the World" loading="lazy" width="1573" height="1408" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/08/Ngurah_Rai_Microsoft_Outage_2024.jpg 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/08/Ngurah_Rai_Microsoft_Outage_2024.jpg 1000w, https://cyberguidesolutions.com/content/images/2024/08/Ngurah_Rai_Microsoft_Outage_2024.jpg 1573w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">By Juxlos - Own work, CC BY 4.0, </span><a href="https://commons.wikimedia.org/w/index.php?curid=150517284"><span style="white-space: pre-wrap;">https://commons.wikimedia.org/w/index.php?curid=150517284</span></a><span style="white-space: pre-wrap;">By Juxlos - Own work, CC BY 4.0, https://commons.wikimedia.org/w/index.php?curid=150517284 | People stood in line at I Gusti Ngurah Rai airport in Bali, Indonesia, waiting to board Air Asia flights. The airline&apos;s computer systems went down because of a Microsoft/CrowdStrike update, which meant passengers couldn&apos;t check in online. As a result, the staff had to use pen and paper for the check-ins.</span></figcaption></figure><p></p><p>In response to the incident, CrowdStrike has committed to enhancing its content update testing, improving error handling, and implementing staggered deployments to prevent future occurrences. These proactive measures, combined with their existing release process, including extensive automated testing and a canary deployment strategy, demonstrate their dedication to preventing similar incidents. A canary deployment strategy involves rolling out a new software update to a small subset of users or systems first, allowing for early detection of any issues before an entire deployment. However, this incident serves as a stark reminder of the potential vulnerabilities in cybersecurity systems and the high stakes involved for companies reliant on these protections. It emphasizes the urgent need for more rigorous safeguards, particularly in error handling and deployment strategies.</p>]]></content:encoded></item><item><title><![CDATA[Defense in Depth]]></title><description><![CDATA[<p></p><p>Let&apos;s explore the intricate Defense in Depth strategy. Imagine a futuristic fortress with a tower at its core, protecting a valuable resource or crown jewel. This fortress is fortified with multiple secure walls, meticulously arranged in concentric circles around the building. Each wall features a distinct security control,</p>]]></description><link>https://cyberguidesolutions.com/defense-in-depth/</link><guid isPermaLink="false">667591e04a6a363d8eddba61</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[CIA Triad]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:43:49 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/05/pikaso_texttoimage.png" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/05/pikaso_texttoimage.png" alt="Defense in Depth"><p></p><p>Let&apos;s explore the intricate Defense in Depth strategy. Imagine a futuristic fortress with a tower at its core, protecting a valuable resource or crown jewel. This fortress is fortified with multiple secure walls, meticulously arranged in concentric circles around the building. Each wall features a distinct security control, such as a biometric scanner, a firewall, or a security guard. These mechanisms are intricately designed to deter unauthorized intruders from reaching the crown jewel. Beyond preventing unauthorized access, the fortress has physical controls like reinforced doors or fire suppression systems to mitigate damage or loss from physical attacks or natural disasters. This analogy highlights the complexity and synergy of multiple security layers, each with unique security controls, working together to protect data, the crown jewel.</p><p> </p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/Cybersecurity-Defense-in-Depth-Diagram.png" class="kg-image" alt="Defense in Depth" loading="lazy" width="512" height="563"></figure><p></p><h3 id="physical-security">Physical Security</h3><p>As the first layer within the Defense in Depth strategy, the physical layer is pivotal in preventing intruders from accessing, compromising, or destroying the physical infrastructure containing the crown jewel&#x2014;data. While cyber-attacks are often directed at the logical layers, attacks on critical infrastructure, such as data centers, are rare. This rarity underscores the effectiveness and reliability of the physical layer in the Defense in Depth strategy. Examples of physical controls that help protect critical infrastructure are walls, CCTV cameras, RFID-locked doors, biometric and motion scanners, security guards, guard dogs, fire suppression systems, HVAC systems, and reinforced fences.</p><p></p><h3 id="network-security">Network Security</h3><p>The second layer within the concept of Defense in Depth is the network layer. A primary way to secure a network is through network traffic monitoring and analysis, and firewalls are one of the controls that help monitor network traffic, preventing unauthorized access. Additionally, firewalls can allow or block network traffic dictated by security or policy rules. Another set of controls within this layer are Intrusion detection systems (IDS) and Intrusion prevention systems (IPS), which work synergistically with infrastructure networks and endpoint firewalls as they help identify threats and respond accordingly. Other network controls include microsegmentation, endpoint security, VPN, and Zero Trust Architecture (ZTA), a security model that requires strict identity verification for every person and device trying to access resources on a network, regardless of whether they are inside or outside the network perimeter. This is exemplified by Google&apos;s BeyondCorp initiative, which redefines network security through continuous verification, a process that ensures the ongoing validity of a user&apos;s identity and device security posture, strict access controls, and comprehensive monitoring regarding network security.</p><p></p><h3 id="platform-security">Platform Security</h3><p>As the third layer within the Defense in Depth strategy, Platform Security focuses on the security architecture and its inherent tools and processes that work synergistically to secure various underlying systems that are the foundation on which applications and services run. These systems include endpoints, servers, virtual machines (VM), operating systems, firmware, and containers. System security controls in this layer refer to the tools and processes implemented to secure these underlying systems. Some examples of system security controls in this layer include the following:</p><ul><li><strong>Host-based Intrusion Detection Systems (HIDS) and Host-based Intrusion Prevention Systems (HIPS)</strong>: HIDS monitors a single host for suspicious activity and potential threats. At the same time, HIPS can actively block or prevent detected threats on the host.</li><li><strong>Host-based Firewalls</strong>&#xA0;are software firewalls installed on individual hosts that control incoming and outgoing network traffic based on security rules, protecting the host from unauthorized access.</li><li><strong>Endpoint Anti-Malware Software</strong>&#xA0;refers to programs installed on endpoints to detect, prevent, and remove malicious software. These programs protect endpoint devices from malware, a typical cyber threat.</li><li><strong>Server System Hardening through Ports and Services Restrictions</strong>: Configuring servers to turn off unnecessary ports and services, adhering to security configuration baselines to reduce the attack surface.</li><li><strong>Automated Patch Management</strong>: Using automated tools to regularly update software and systems with the latest security patches to protect against vulnerabilities.</li><li><strong>Access Controls such as Role-Based Access Controls (RBAC) and Multi-Factor Authentication (MFA)</strong>: RBAC assigns permissions based on user roles. MFA requires multiple forms of verification for access, enhancing security.</li><li><strong>Log Monitoring</strong>: Continuously reviewing logs from systems and applications to detect and respond to suspicious activities or security incidents.</li><li><strong>Using VMs to Isolate Applications, Services, and Processes</strong>: Running different applications in separate VMs to prevent a compromise or failure in one VM from affecting others, enhancing security and stability.</li><li><strong>Ensuring Container Security Using Minimal Base Images and Scanning for Vulnerabilities</strong>: Create container images with only essential components (i.e., base OS, application code, dependencies, configuration files, runtime environments, etc.) and regularly scan them for vulnerabilities to reduce the attack surface and ensure a secure container environment.</li></ul><p></p><h3 id="application-security">Application Security</h3><p>The Application Security layer involves developing, adding, and testing application security features to prevent vulnerabilities like unauthorized access and alteration. Application security also involves measures taken during application development and deployment to avoid threats such as data or code within an application being stolen or hijacked. Application Security controls include IDE security, which refers to the security measures implemented within the Integrated Development Environment (IDE) to ensure the code&apos;s security. Other controls include static code analysis, software composition analysis (SCA), dynamic application security testing, and API security.</p><ul><li><strong>Secure Coding Practices</strong>: Adherence to secure coding standards to prevent vulnerabilities like SQL injection, XSS, etc.</li><li><strong>Application Penetration Testing</strong>: Regular testing of applications to find vulnerabilities.</li><li><strong>Authentication and Authorization</strong>: Mechanisms like OAuth multifactor authentication ensure users are who they say they are and have appropriate access.</li><li><strong>Static Code Analysis</strong>: The process of examining source code for vulnerabilities and coding errors without executing the program. This process helps identify potential security issues early in the development cycle.</li><li><strong>Static Application Security Testing (SAST)</strong>: A subset of Static Code Analysis, this process focuses more on the application&apos;s security, meaning it identifies vulnerabilities that can be exploited be attackers. Some of the security vulnerabilities that SAST seeks to root out are SQL injection, cross-site scripting (XSS), buffer overflows, and similar potential security flaws.</li><li><strong>Software Composition Analysis (SCA)</strong>: The practice of identifying and managing open-source components or dependencies within software to ensure security and compliance with licensing requirements. It also helps detect known vulnerabilities in third-party libraries.</li><li><strong>Dynamic Application Security Testing (DAST)</strong>: A method of testing the running application to identify vulnerabilities by simulating attacks. It focuses on the application&apos;s operational state to find security flaws that may not be evident in the source code.</li><li><strong>API Security</strong>: The practice of securing Application Programming Interfaces (APIs) by implementing measures such as authentication, authorization, input validation, and rate limiting to protect against threats and ensure secure data exchange between applications.</li></ul><p></p><h3 id="data-security">Data Security</h3><p>The Data Security Layer is not just a part of the Defense in Depth&#xA0;strategy,&#xA0;but its heart and soul. Within this layer lies the crown jewel that the layers above aim to shield and protect through various intricate controls. The crown jewel is the data. This layer is not just a safeguard but a fortress at the center, protecting data from unauthorized access and alterations, regardless of location or transmission method. Various controls at this core layer include&#xA0;encryption, access controls, and data loss prevention, and the weight of our responsibility to ensure this invaluable resource&apos;s security.&#xA0;I&apos;ve concisely described some controls at this layer below:&#xA0;</p><ol><li><strong>Data Encryption</strong>&#xA0;protects data by converting it into a coded format that can only be read by someone with the correct decryption key, ensuring the confidentiality of data both at rest (stored data) and in transit (data being transmitted).</li><li><strong>Data Masking</strong>: This procedure obfuscates specific data within a database to protect sensitive information, showing fictitious data instead of actual data during non-production scenarios, such as testing and development.</li><li><strong>Access Controls</strong>: Implement policies like Role-Based Access Control (RBAC) to ensure only authorized users can access specific data. Limiting data access based on user roles and permissions minimizes the risk of data breaches.</li><li><strong>Data Loss Prevention (DLP)</strong>: Monitors and controls data transfer to prevent unauthorized sharing, leakage, or loss of sensitive data. DLP solutions can block or alert risky data movements.</li><li><strong>Tokenization</strong>: This process replaces sensitive data elements with non-sensitive equivalents (tokens) with no exploitable value outside a specific context. It is often used in payment processing to protect credit card information.</li><li><strong>Data Classification</strong>: This process assigns categories to data based on its sensitivity and criticality to the organization, which helps apply appropriate security controls and handling practices based on the classification level.</li><li><strong>Immutable Storage</strong>: Ensures that once data is written, it cannot be modified or deleted. This is often used for logs and backup data to protect against tampering and unauthorized changes.&#xA0;</li><li><strong>Database Activity Monitoring (DAM)</strong>&#xA0;continuously monitors and analyzes database activities to detect and respond to unauthorized or suspicious actions, which helps identify potential breaches and enforce security policies.</li><li><strong>Backup and Recovery</strong>: Regularly creates copies of data and stores them securely to ensure data can be recovered in case of accidental loss, corruption, or ransomware attacks, ensuring data availability and integrity.</li><li><strong>Auditing and Logging</strong>: Maintain detailed records of data access and modification activities.&#xA0;This&#xA0;helps track data usage, detect anomalies, and ensure compliance with regulatory requirements.</li><li><strong>Secure Deletion</strong>: This method ensures that when data is no longer needed, it is completely and securely erased, making it unrecoverable.&#xA0;This&#xA0;prevents unauthorized access to sensitive data that is no longer in use.</li><li><strong>Data Anonymization</strong>&#xA0;removes or alters personally identifiable information (PII) from data sets so&#xA0;individuals&#xA0;cannot&#xA0;be identified.&#xA0;This&#xA0;is crucial for complying with privacy regulations and protecting user privacy during data analysis.</li></ol><p></p><p>By implementing these controls, organizations can strengthen their data security layer, protecting sensitive information from unauthorized access, breaches, and data loss. Implementing a robust defense-in-depth strategy involves effectively integrating these layers to provide a holistic security posture that significantly mitigates risks. Each layer builds upon the last, creating a comprehensive shield against security threats. It&apos;s essential to note that not all cyberattacks target data. Some cyberattacks deny data availability through various means, such as overwhelming network and computing resources through DDoS (Distributed Denial of Service) attacks that use botnet endpoints orchestrated by command and control servers to generate overwhelming traffic, taking down data availability. When data availability is compromised, it affects the availability component of the CIA triad. For details about the CIA triad, please check out <a href="https://cyberguidesolutions.com/cia-triad/" rel="noreferrer">my article</a> that explains each component.</p>]]></content:encoded></item><item><title><![CDATA[Identification, Authentication, Authorization, and Accountability]]></title><description><![CDATA[<p></p><h3 id="identification">Identification</h3><p>Identification, the crucial process of using various data and information to establish a person&apos;s or subject&apos;s identity, is the cornerstone of the access control process. It&apos;s the initial step where a user or system presents credentials or attributes that assert their identity. This</p>]]></description><link>https://cyberguidesolutions.com/identification-authentication-authorization-and-accountability/</link><guid isPermaLink="false">667591e04a6a363d8eddba5e</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[IAM]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:43:22 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/electronic-keycard-access-control.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/electronic-keycard-access-control.jpg" alt="Identification, Authentication, Authorization, and Accountability"><p></p><h3 id="identification">Identification</h3><p>Identification, the crucial process of using various data and information to establish a person&apos;s or subject&apos;s identity, is the cornerstone of the access control process. It&apos;s the initial step where a user or system presents credentials or attributes that assert their identity. This process is vital as it helps to recognize an individual using data such as their name, username, user IP address, employee number, social security number, tax ID, social media handle, and other relevant information.</p><p>When attackers gain access to personal identification, the consequences can be severe. They can impersonate legitimate users, leading to data breaches and unauthorized transactions. With compromised identification, attackers can elevate their access rights, potentially gaining administrator-level access and manipulating system settings, data, and access controls. They can also perpetrate fraud by stealing funds or services by impersonating the rightful owner of the identity. Knowing someone&apos;s identifier can allow attackers to craft targeted phishing or social engineering attacks, tricking victims into revealing more sensitive information or installing malicious software. Additionally, attackers might use stolen identification to disrupt services by overwhelming a system with requests as part of a Denial of Service attack or altering system configurations. The compromise of identification could undermine trust in a system&apos;s security, affecting user confidence and potentially causing reputational damage to the organization.</p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/09/9787.jpg" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1500" height="857" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/09/9787.jpg 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/09/9787.jpg 1000w, https://cyberguidesolutions.com/content/images/2024/09/9787.jpg 1500w" sizes="(min-width: 720px) 720px"></figure><p></p><h3 id="authentication">Authentication</h3><p>Authentication means proof that a subject (like a person) or an object (like an application) is who they claim to be through three methods. These authentication methods are the following:</p><ol><li>&quot;Something you know&quot; would be like a password, PIN, and the answers to security questions. Hackers typically attack knowledge factors since they are less challenging than the other authentication methods. Knowing this, we can ensure that knowledge-based authentication information is more difficult to crack. For instance, we can increase the complexity and number of characters of our passwords to prevent cyber criminals from breaking them and selling that information on the dark web, which is illegal.</li><li>&quot;Something you have&quot; is another authentication method that includes professional IDs, smart cards, hardware tokens (similar to thumb drives in appearance), and browser cookies. A person or subject uses a tangible or intangible item &quot;they have&quot; to authenticate their identity.</li><li>&quot;Something you are&quot; includes a person&apos;s physiological characteristics used to authenticate. Biometrics is an example of using physiological characteristics to authenticate. Unique fingerprint patterns and the complex pattern of ridges and furrows inside the human iris are examples of physiological characteristics used in biometrics. Behavioral characteristics are also used in the authentication process to establish a baseline to identify suspicious changes by studying a person&apos;s behavioral pattern. Voice pattern recognition is an example of a behavioral characteristic used in biometric authentication.</li></ol><p></p><h3 id="authorization">Authorization</h3><p>The <em>Principle of Least Privilege</em> is a security principle that focuses on granting access permissions to only those subjects who require them to perform their duties. By adhering to this principle, we can prevent subjects from intentionally or unintentionally compromising information that may negatively affect an organization&apos;s financial status and human lives. It is crucial to enforce this principle at all times, particularly when granting new hires access to resources or transitioning personnel to new roles.</p><p>The <em>Need-to-Know</em> principle requires that a person be granted access to information and data only if it is necessary to perform a specific duty, even if the individual already has access permissions.</p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/09/pikaso_1woman-with-long-blonde-hai.jpeg" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1344" height="768" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/09/pikaso_1woman-with-long-blonde-hai.jpeg 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/09/pikaso_1woman-with-long-blonde-hai.jpeg 1000w, https://cyberguidesolutions.com/content/images/2024/09/pikaso_1woman-with-long-blonde-hai.jpeg 1344w" sizes="(min-width: 720px) 720px"></figure><p></p><h3 id="discretionary-access-control-dac">Discretionary Access Control (DAC)</h3><p>Discretionary Access Control is used when availability is critical. Since this access control type is identity-based, the object owner or system decides to assign object access at their discretion to a specific subject. The resource owner can use this access control type to grant access to particular groups or users who need it to ensure access to resources that must be available to them when performing duties and responsibilities. While DAC is a distributed model that is useful when no central authority has sufficient information to perform access control decisions, its flexibility and decentralized nature can pose a security risk. For instance, a centralized IT department may not know who needs access to a specific file or folder on Google Drive, but the file or folder&apos;s owner knows whom to grant access to collaborate. However, enforcing consistency becomes more complicated when a large group of data owners make access control decisions, including the ability to make permission changes, which insider threats can exploit. </p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/DAC.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1366" height="1053" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/DAC.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/DAC.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/DAC.png 1366w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">In Discretionary Access Control (DAC), the owner can provide specific users and groups object access.</span></figcaption></figure><p></p><h3 id="mandatory-access-control-mac">Mandatory Access Control (MAC)</h3><p>Often used in the government and military, critical infrastructure (e.g., power plants, financial institutions, and healthcare systems), and corporate environments where sensitive data needs to be tightly controlled, Mandatory Access Control is used when confidentiality is vital. This type of access control is rules-based and policy-driven, ensuring only administrators can change rules and policies. Under MAC, access permissions are pre-determined for all users and are centrally managed for ease of administration, meaning access control is not at the discretion of data owners. Still, it is enforced systematically where the data owner is responsible for assigning the appropriate security label to an object (e.g., files, databases, or devices) and a subject, such as users or processes, is assigned a security clearance so when a subject attempts to access an object, the system checks the subject&apos;s clearance against the object&apos;s classification label to determine access permissions.</p><p>One standard MAC model is the <em>Bell-LaPadula</em> Model, which focuses on maintaining data confidentiality and enforces rules to prevent information flow from higher to lower security levels. Another standard MAC model is the <em>Biba</em> Model, which focuses on data integrity and enforces rules to prevent information flow from lower to higher integrity levels.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/MAC.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1265" height="974" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/MAC.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/MAC.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/MAC.png 1265w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">In Mandatory Access Control (MAC), object access is pre-determined by security clearance and confidentiality levels while centrally managed and tightly controlled by the administrator. MAC is used when confidentiality is critical to an organization.</span></figcaption></figure><p></p><h3 id="role-based-access-control-rbac">Role-Based Access Control (RBAC)</h3><p>Role-Based Access Control is used when data integrity preservation is critical or most important. It&apos;s a policy-neutral access control mechanism defined based on roles and privileges. RBAC is the most effective access control to help prevent any change to data and information, which could cause significant financial loss and negatively impact people&apos;s lives. RBAC must be used when there needs to be a clear separation between organizational departments, teams, roles, and the corresponding data and information each is authorized to access. In RBAC, roles are first identified within an organization. For instance, &quot;Finance,&quot; &quot;HR,&quot; and &quot;Sales&quot; are roles defined by a company. Each of these roles is assigned permissions, such as &quot;read,&quot; &quot;write,&quot; &quot;execute,&quot; and other access rights required to perform specific duties and access particular resources (objects). These roles are then assigned to users based on their job functions and responsibilities. When a user (subject) attempts to access a resource, the system checks the user&apos;s roles and the permissions associated with those roles to determine if access should be granted.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/RBAC-2.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1398" height="1092" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/RBAC-2.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/RBAC-2.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/RBAC-2.png 1398w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">This image is an example of a role-based access control (RBAC) system implemented in a company.</span></figcaption></figure><p></p><h3 id="attribute-based-access-control-abac">Attribute-Based Access Control (ABAC)</h3><p>Being more flexible, dynamic, and risk-based than other access control models, the Attribute-Based Access control has a mechanism where access to an object or resource is granted or denied to a subject based on the subject, object, and environment&apos;s attributes when evaluated against a policy. For instance, a stateful multi-layer firewall can allow incoming traffic from the internet, granting it access to a specific endpoint if it meets the policy specifying that incoming internet traffic that corresponds to a previously established communication session by one particular endpoint will be allowed entry into the private network. Another example would be a finance manager attempting to access sensitive files on the company&apos;s private network outside of regular working hours from an unrecognized device in a foreign country will be denied access since object and environmental attributes do not meet policy specifics, even though the subject&apos;s attributes, which in this case are his user credentials and multi-factor authentication, meets some of a policy&apos;s requirements. </p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/ABAC.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1397" height="1094" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/ABAC.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/ABAC.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/ABAC.png 1397w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">In an Attribute-Based Access Control (ABAC), the policy dictates how the subject can access the object based on subject, object, and environmental attributes.</span></figcaption></figure><p></p><h3 id="context-based-access-control">Context-Based Access Control</h3><p>Context-Based Access Control (CBAC) is a security mechanism that determines access permissions based on the context in which access requests are made. Unlike Attribute-Based Access Control (ABAC), which evaluates a wide array of attributes, CBAC focuses on situational factors such as the user&apos;s location, the time of access, the sequence of prior actions, and the access history. This approach allows for dynamic adjustments to access permissions, enhancing security by considering real-time conditions.</p><p>For example, if users access Amazon.com from India, they are redirected to Amazon.in, providing a localized shopping experience. Similarly, a company might implement CBAC to restrict access to sensitive resources outside of business hours, mitigating the risk of unauthorized access during off-hours. In another example, a user&apos;s access might be granted or denied based on the sequence of steps they have previously taken in the system, ensuring that they follow the correct workflow. By leveraging contextual information, CBAC can provide more adaptive and responsive security measures tailored to the specific circumstances of each access attempt. This not only enhances security but also empowers the organization with the ability to control access in a more nuanced and effective manner.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/CBAC1.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1265" height="974" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/CBAC1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/CBAC1.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/CBAC1.png 1265w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">In Context-based Access Control (CBAC), object access permissions are determined by real-time situational variables, which dynamically enhances security. </span></figcaption></figure><h3 id></h3><h3 id="content-based-access-control">Content-Based Access Control</h3><p>Content-Based Access Control (CBAC) regulates access based on the attributes or content of the accessed data. This approach is beneficial when access needs to be finely tuned to specific information within a larger dataset. For example, within a payroll system, a manager may have access to the payroll database but is restricted to viewing records only of their direct reports, ensuring the confidentiality of other employees&apos; salary information.</p><p>In a document management system, access can be controlled at a granular level, allowing users to view or edit only certain parts of a document based on its content. For instance, general employees might have access to read a policy document, but only HR personnel can view sections containing sensitive employee data. As another example, doctors might have full access to a patient&apos;s medical history in a healthcare system. At the same time, administrative staff can only see non-medical information such as patient contact details. Specific medical data, like mental health records, might only be accessible to authorized mental health professionals. This level of control is achieved by analyzing the content of the data and applying rules that dictate who can access what information. Content-Based Access Control enhances security by ensuring users interact only with data relevant to their role and authorization level, thus protecting sensitive information from unauthorized access.</p><p></p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://cyberguidesolutions.com/content/images/2024/05/CBAC2.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="1265" height="974" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/05/CBAC2.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/05/CBAC2.png 1000w, https://cyberguidesolutions.com/content/images/2024/05/CBAC2.png 1265w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">In this Content-based Access Control (CBAC), object access permissions are determined by the data&apos;s attributes or contents. </span></figcaption></figure><h3 id="-1"></h3><h3 id="accountability">Accountability</h3><p>Accountability in information security is the ability to trace actions within a system back to the responsible party. This involves maintaining comprehensive audit logs that record who acted, what action was taken when it occurred, and what resources were involved. These logs are crucial for detecting security incidents, conducting audits, ensuring regulatory compliance, and maintaining system integrity. In other words, accountability ensures that every action within a system can be attributed to a specific user, application, or process, making it easier to identify and address any security issues that may arise.</p><p>Non-repudiation, a critical accountability component, ensures that individuals cannot deny their actions. This is often achieved through digital signatures, secure logging, and other cryptographic methods that provide irrefutable evidence of user activities. In simpler terms, non-repudiation means that once a user has acted within a system, they cannot later deny doing so. This is important for maintaining the system&apos;s integrity and ensuring all actions can be reviewed and verified.</p><p>For example, in a financial system, accountability mechanisms ensure that every transaction can be traced back to the user who initiated it. This traceability is essential for internal controls and external audits, helping to detect and prevent fraudulent activities. Accountability measures uphold information systems&apos; security, reliability, and trustworthiness by maintaining detailed and tamper-proof logs, ensuring that all actions can be reviewed and verified.</p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/09/Screen-Shot-2024-09-11-at-7.53.49-PM.png" class="kg-image" alt="Identification, Authentication, Authorization, and Accountability" loading="lazy" width="739" height="729" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/09/Screen-Shot-2024-09-11-at-7.53.49-PM.png 600w, https://cyberguidesolutions.com/content/images/2024/09/Screen-Shot-2024-09-11-at-7.53.49-PM.png 739w" sizes="(min-width: 720px) 720px"></figure>]]></content:encoded></item><item><title><![CDATA[Creating an Application Load Balancer]]></title><description><![CDATA[<p></p><p>An Application Load Balancer (ALB) is a powerful tool that evenly distributes incoming traffic across multiple EC2 instances, preventing any one instance from becoming overwhelmed. This not only improves the application&apos;s availability and uptime but also enhances its security and scalability, making it a key component in addressing</p>]]></description><link>https://cyberguidesolutions.com/creating-an-application-load-balancer/</link><guid isPermaLink="false">667591e04a6a363d8eddba62</guid><category><![CDATA[CIA Triad]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[Virtual Servers]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:43:09 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/06/server-racks-data-center-1.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/06/server-racks-data-center-1.jpg" alt="Creating an Application Load Balancer"><p></p><p>An Application Load Balancer (ALB) is a powerful tool that evenly distributes incoming traffic across multiple EC2 instances, preventing any one instance from becoming overwhelmed. This not only improves the application&apos;s availability and uptime but also enhances its security and scalability, making it a key component in addressing the availability aspect of the CIA triad.</p><p>Application Load Balancers can also automatically adjust traffic distribution based on the application&apos;s load, allowing it to scale horizontally as computing demand fluctuates. Additionally, ALBs can reroute traffic to healthy instances if one or more EC2 instances fail, ensuring fault tolerance and continuous normal operations through redundant virtual servers. By balancing the load across multiple instances, ALBs can improve application performance by reducing response time and preventing overload on any single instance, thereby enhancing performance, reliability, and scalability.</p><p>ALBs play a crucial role in enhancing security by reducing the attack surface and number of entry points. They achieve this by centralizing access, integrating with security services, offloading SSL/TLS termination, and providing tight control over network access. A standout security feature is the ability to conduct health checks on specific groups of EC2 instances, ensuring that only healthy instances receive traffic. These features work together to minimize potential vulnerabilities and entry points that attackers can exploit, thereby significantly improving an application&apos;s overall security.</p><p></p><ol><li>I navigated to <em>EC2/Instances</em> and launched and configured a few instances, giving each one a name. From the available image options, I selected &quot;Amazon Linux AWS&quot; as my AMI for this demonstration. Under Architecture, I chose 64-bit (x86), and for the instance type, I selected t2.micro.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/1-Launch-and-Configure-ALB-Instances.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1363" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/1-Launch-and-Configure-ALB-Instances.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/1-Launch-and-Configure-ALB-Instances.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/1-Launch-and-Configure-ALB-Instances.png 1363w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li>While I don&apos;t recommend it for security purposes, I selected &quot;Proceed without a key pair&quot; under the Key pair (login) option for this time. A key pair allows secure SSH access to EC2 instances by authenticating users with the private key corresponding to the instance&apos;s public key.  </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/2-Keypair-Security-Group.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1359" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/2-Keypair-Security-Group.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/2-Keypair-Security-Group.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/2-Keypair-Security-Group.png 1359w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="3"><li>Using a test code block, I configured the User Data option. I then launched the instance before I could view all instances.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/3-User-Data-Launch-Instance-View-All-Instances.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1359" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/3-User-Data-Launch-Instance-View-All-Instances.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/3-User-Data-Launch-Instance-View-All-Instances.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/3-User-Data-Launch-Instance-View-All-Instances.png 1359w" sizes="(min-width: 720px) 720px"></figure><p></p><p><strong>Code Block</strong></p><div class="kg-card kg-callout-card kg-callout-card-white"><div class="kg-callout-emoji">&#x1F4A1;</div><div class="kg-callout-text">#!/bin/bash<br># Use this for your user data (script from top to bottom)<br># install httpd (Linux 2 version)<br>yum update -y<br>yum install -y httpd<br>systemctl start httpd<br>systemctl enable httpd<br><code spellcheck="false" style="white-space: pre-wrap;">echo &quot;&lt;h1&gt;Hello World from $(hostname -f)&lt;/h1&gt;&quot; &gt; /var/www/html/index.html</code></div></div><p></p><p>4. I renamed one of my endpoint instances to help distinguish each instance. Under the selected endpoint&apos;s details section, I copied its public IP address to test on a browser.</p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/4-Rename-EP-Copy-and-Launch-Public-IP-to-test.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1511" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/4-Rename-EP-Copy-and-Launch-Public-IP-to-test.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/4-Rename-EP-Copy-and-Launch-Public-IP-to-test.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/4-Rename-EP-Copy-and-Launch-Public-IP-to-test.png 1511w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="5"><li>After pasting the public IP address into a browser, Endpoint-2&apos;s user data is returned, as expected, signifying the instance&apos;s accessibility.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/5-Paste-on-Browser-to-test-Public-IP.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1381" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/5-Paste-on-Browser-to-test-Public-IP.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/5-Paste-on-Browser-to-test-Public-IP.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/5-Paste-on-Browser-to-test-Public-IP.png 1381w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="6"><li>I then navigated to the Load Balancers option before selecting &quot;Create load balancer.&quot;</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/6-Navigate-to-Load-Balancers-Create-ALB.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="2000" height="1047" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/6-Navigate-to-Load-Balancers-Create-ALB.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/6-Navigate-to-Load-Balancers-Create-ALB.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/06/6-Navigate-to-Load-Balancers-Create-ALB.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/06/6-Navigate-to-Load-Balancers-Create-ALB.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="7"><li>Selecting the Application Load Balancer: The ALB allows clients to make requests to your application. The listeners in the load balancer receive requests based on the chosen protocol and port settings. The receiving listener checks the incoming request against the defined rules and, if necessary, directs the request to the appropriate target group. Using an HTTPS listener makes it possible to delegate the task of TLS encryption and decryption to a load balancer. Healthy targets in one or more target groups receive traffic according to the load-balancing algorithm and the routing rules specified by the listener. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/7-Select-ALB.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1354" height="1265" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/7-Select-ALB.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/7-Select-ALB.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/7-Select-ALB.png 1354w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="8"><li>Navigating to EC2/Load balancer, I configured the ALB&apos;s basic configurations by naming it, specifying Internet facing under the Scheme option, selecting IPv4-IP under the IP address type option, and choosing Default under VPC.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/8-Basic-Config-Internet-facing-IP-Add-Type-VPC.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1350" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/8-Basic-Config-Internet-facing-IP-Add-Type-VPC.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/8-Basic-Config-Internet-facing-IP-Add-Type-VPC.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/8-Basic-Config-Internet-facing-IP-Add-Type-VPC.png 1350w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="9"><li>Under the Network mapping section, I enabled all Availability Zones (AZ) to increase redundancy and fault tolerance. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/9-Select-All-Availability-Zones-Under-Network-Mappings.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1350" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/9-Select-All-Availability-Zones-Under-Network-Mappings.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/9-Select-All-Availability-Zones-Under-Network-Mappings.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/9-Select-All-Availability-Zones-Under-Network-Mappings.png 1350w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="10"><li>For this step, I selected <em>Create a new security group</em> to configure the ALB&apos;s virtual firewall to manage inbound and outbound traffic at the network layer.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/10-Select--22create-a-new-security-group-22.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1350" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/10-Select--22create-a-new-security-group-22.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/10-Select--22create-a-new-security-group-22.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/10-Select--22create-a-new-security-group-22.png 1350w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="11"><li>Under EC2/Security Groups, I specified the inbound rules with the <em>HTTP</em> protocol and <em>Anywhere IPv4</em> as the source. Since this ALB will be public-facing, configuring SSH under inbound rules is unnecessary. Once I verified the configurations, I selected the <em>Create Security Group</em> Button at the bottom right side of the page. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/11-Create-Security-Group-Inbound-Rules-HTTP-Anwhere-IPV4-Create-Security-Group-Button.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="2000" height="1140" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/11-Create-Security-Group-Inbound-Rules-HTTP-Anwhere-IPV4-Create-Security-Group-Button.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/11-Create-Security-Group-Inbound-Rules-HTTP-Anwhere-IPV4-Create-Security-Group-Button.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/06/11-Create-Security-Group-Inbound-Rules-HTTP-Anwhere-IPV4-Create-Security-Group-Button.png 1600w, https://cyberguidesolutions.com/content/images/2024/06/11-Create-Security-Group-Inbound-Rules-HTTP-Anwhere-IPV4-Create-Security-Group-Button.png 2222w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="12"><li>After selecting the <em>Created ALB</em> option under the Listeners and Routing section, I selected <em>Create Target Group</em>. Specifying the target type, group name, transport protocol and port, and IP address type are some of the necessary configurations to get ALB to function. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/13-Basic-Config.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1375" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/13-Basic-Config.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/13-Basic-Config.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/13-Basic-Config.png 1375w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="13"><li>Next, I then specified the VPC and protocol version. While HTTP2 and gRPC protocols are more advanced and efficient and can be used in more complex situations, I selected HTTP1 since it offers more compatibility with existing web infrastructure (including legacy systems) and applications. For Health checks, I configured &quot;<em>/</em>&quot; to perform health checks at the root before proceeding to the next step by selecting the <em>Next</em> button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/14-IP-Type-Protocol-health-check-Click-next.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1375" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/14-IP-Type-Protocol-health-check-Click-next.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/14-IP-Type-Protocol-health-check-Click-next.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/14-IP-Type-Protocol-health-check-Click-next.png 1375w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="14"><li>I then added the instances to my target group by selecting the &quot;<em>include as pending review</em>&quot; button. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/14-Add-instances-to-target-group-by-clicking-include-as-pending-review.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="2000" height="1049" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/14-Add-instances-to-target-group-by-clicking-include-as-pending-review.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/14-Add-instances-to-target-group-by-clicking-include-as-pending-review.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/06/14-Add-instances-to-target-group-by-clicking-include-as-pending-review.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/06/14-Add-instances-to-target-group-by-clicking-include-as-pending-review.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="15"><li>Under Listeners and Routing, I selected the target group I created. I bypassed the <em>Optimize with service integrations</em> options because they are unnecessary for what I need to accomplish.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/15-Add-newly-created-target-group.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1367" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/15-Add-newly-created-target-group.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/15-Add-newly-created-target-group.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/15-Add-newly-created-target-group.png 1367w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="16"><li>To finally create the ALB, I selected the <em>Create load balancer </em>button at the bottom right of the page.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/16-Create-ALB.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1367" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/16-Create-ALB.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/16-Create-ALB.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/16-Create-ALB.png 1367w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="17"><li>Once my application load balancer transitioned to an active state, I copied its public IP address to verify its functionality later with a browser. Selecting the ALB and navigating under the <em>Details</em> tab exposes more information, including the ALB&apos;s public IP address.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/17-Once-LB-is-active-in-state-copy-public-IP-.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1513" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/17-Once-LB-is-active-in-state-copy-public-IP-.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/17-Once-LB-is-active-in-state-copy-public-IP-.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/17-Once-LB-is-active-in-state-copy-public-IP-.png 1513w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="18"><li>After pasting the public IP address of my application load balancer into a browser, I tested refreshing the browser multiple times to verify that the ALB switches between virtual servers under the target group, and it successfully did so. This proved that the ALB works by evenly distributing incoming network traffic.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/18-Refreshing-browser-toggles-between-instances-in-the-target-group-proving-the-LB-works.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1053" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/18-Refreshing-browser-toggles-between-instances-in-the-target-group-proving-the-LB-works.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/18-Refreshing-browser-toggles-between-instances-in-the-target-group-proving-the-LB-works.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/18-Refreshing-browser-toggles-between-instances-in-the-target-group-proving-the-LB-works.png 1053w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="19"><li>Under EC2/Target groups, I checked and verified that the instances under the target group are healthy. As a test, I stopped one virtual server from operating, causing the application load balancer to load only the healthy instance in the target group. This showed that the ALB demonstrated fault tolerance through instance redundancy, which concludes this test.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/06/19-Check-and-verify-instances-in-target-group-are-healthy.-Stopping-one-instance-will-cause-the-LB-to-only-load-the-healthy-instance-under-the-target-group.png" class="kg-image" alt="Creating an Application Load Balancer" loading="lazy" width="1458" height="1267" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/06/19-Check-and-verify-instances-in-target-group-are-healthy.-Stopping-one-instance-will-cause-the-LB-to-only-load-the-healthy-instance-under-the-target-group.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/06/19-Check-and-verify-instances-in-target-group-are-healthy.-Stopping-one-instance-will-cause-the-LB-to-only-load-the-healthy-instance-under-the-target-group.png 1000w, https://cyberguidesolutions.com/content/images/2024/06/19-Check-and-verify-instances-in-target-group-are-healthy.-Stopping-one-instance-will-cause-the-LB-to-only-load-the-healthy-instance-under-the-target-group.png 1458w" sizes="(min-width: 720px) 720px"></figure>]]></content:encoded></item><item><title><![CDATA[Creating an IAM Role]]></title><description><![CDATA[<p></p><ol><li>On the IAM Dashboard, select the role.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/1-IAM-Dashboard-Select-Role-1.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/1-IAM-Dashboard-Select-Role-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/1-IAM-Dashboard-Select-Role-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/1-IAM-Dashboard-Select-Role-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/1-IAM-Dashboard-Select-Role-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li>Select the &quot;Create Role&quot; button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/2-Select-Create-Role-Button-1.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/2-Select-Create-Role-Button-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/2-Select-Create-Role-Button-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/2-Select-Create-Role-Button-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/2-Select-Create-Role-Button-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="3"><li>Select the &quot;Trusted Entity Type.&quot;</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/3-Select-Trusted-Entity-Type-1.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/3-Select-Trusted-Entity-Type-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/3-Select-Trusted-Entity-Type-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/3-Select-Trusted-Entity-Type-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/3-Select-Trusted-Entity-Type-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="4"><li>Select the Service or Use Case.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/4-Select-Service-or-Use-Case-1.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/4-Select-Service-or-Use-Case-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/4-Select-Service-or-Use-Case-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/4-Select-Service-or-Use-Case-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/4-Select-Service-or-Use-Case-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="5"><li>Select EC2. Then, hit the Next button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/5-Select-EC2-Hit-Next.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/5-Select-EC2-Hit-Next.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/5-Select-EC2-Hit-Next.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/5-Select-EC2-Hit-Next.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/5-Select-EC2-Hit-Next.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="6"><li>Type in &quot;s3read&quot; to select its Policy.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/6-Select-S3Read-JSON.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/6-Select-S3Read-JSON.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/6-Select-S3Read-JSON.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/6-Select-S3Read-JSON.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/6-Select-S3Read-JSON.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="7"><li>Name the IAM role.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/7-Name-IAM-Role.png" class="kg-image" alt loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/7-Name-IAM-Role.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/7-Name-IAM-Role.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/7-Name-IAM-Role.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/7-Name-IAM-Role.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="8"><li>Hit the &quot;</li></ol>]]></description><link>https://cyberguidesolutions.com/creating-an-iam-role-2/</link><guid isPermaLink="false">667592394a6a363d8eddbad2</guid><category><![CDATA[IAM]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:42:42 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/04/cyber-security-iot-with-technology-team-meeting-programming-working-generative-ai.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/04/cyber-security-iot-with-technology-team-meeting-programming-working-generative-ai.jpg" alt="Creating an IAM Role"><p></p><ol><li>On the IAM Dashboard, select the role.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/1-IAM-Dashboard-Select-Role-1.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/1-IAM-Dashboard-Select-Role-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/1-IAM-Dashboard-Select-Role-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/1-IAM-Dashboard-Select-Role-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/1-IAM-Dashboard-Select-Role-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li>Select the &quot;Create Role&quot; button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/2-Select-Create-Role-Button-1.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/2-Select-Create-Role-Button-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/2-Select-Create-Role-Button-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/2-Select-Create-Role-Button-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/2-Select-Create-Role-Button-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="3"><li>Select the &quot;Trusted Entity Type.&quot;</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/3-Select-Trusted-Entity-Type-1.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/3-Select-Trusted-Entity-Type-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/3-Select-Trusted-Entity-Type-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/3-Select-Trusted-Entity-Type-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/3-Select-Trusted-Entity-Type-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="4"><li>Select the Service or Use Case.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/4-Select-Service-or-Use-Case-1.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/4-Select-Service-or-Use-Case-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/4-Select-Service-or-Use-Case-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/4-Select-Service-or-Use-Case-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/4-Select-Service-or-Use-Case-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="5"><li>Select EC2. Then, hit the Next button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/5-Select-EC2-Hit-Next.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/5-Select-EC2-Hit-Next.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/5-Select-EC2-Hit-Next.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/5-Select-EC2-Hit-Next.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/5-Select-EC2-Hit-Next.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="6"><li>Type in &quot;s3read&quot; to select its Policy.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/6-Select-S3Read-JSON.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/6-Select-S3Read-JSON.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/6-Select-S3Read-JSON.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/6-Select-S3Read-JSON.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/6-Select-S3Read-JSON.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="7"><li>Name the IAM role.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/7-Name-IAM-Role.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="946" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/7-Name-IAM-Role.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/7-Name-IAM-Role.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/7-Name-IAM-Role.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/7-Name-IAM-Role.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="8"><li>Hit the &quot;Create Role&quot; button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/8-Create-Role.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="966" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/8-Create-Role.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/8-Create-Role.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/8-Create-Role.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/8-Create-Role.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="9"><li>You can now view the newly created IAM role.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/9-View-New-Role.png" class="kg-image" alt="Creating an IAM Role" loading="lazy" width="2000" height="966" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/9-View-New-Role.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/9-View-New-Role.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/9-View-New-Role.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/9-View-New-Role.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Accessing the EC2 Instance Connect Linux Terminal]]></title><description><![CDATA[<p></p><p>The AWS EC2 Instance Connect feature allows you to run commands on your EC2 instance remotely as if you were physically present at the server. Using the SSH protocol, you can securely transfer files between your local machine and the EC2 instance using the SCP (Secure Copy Protocol) or SFTP</p>]]></description><link>https://cyberguidesolutions.com/accessing-the-ec2-instance-connect/</link><guid isPermaLink="false">667591e04a6a363d8eddba5f</guid><category><![CDATA[Linux]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:41:40 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/04/pikaso_enhance_pikaso.jpeg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/04/pikaso_enhance_pikaso.jpeg" alt="Accessing the EC2 Instance Connect Linux Terminal"><p></p><p>The AWS EC2 Instance Connect feature allows you to run commands on your EC2 instance remotely as if you were physically present at the server. Using the SSH protocol, you can securely transfer files between your local machine and the EC2 instance using the SCP (Secure Copy Protocol) or SFTP (SSH File Transfer Protocol) options.</p><p></p><ol><li>Select and start a server. If you haven&apos;t created a server, please refer to my article explaining the steps for launching and configuring an EC2 instance.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/1-Start-Server-1.png" class="kg-image" alt="Accessing the EC2 Instance Connect Linux Terminal" loading="lazy" width="2000" height="891" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/1-Start-Server-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/1-Start-Server-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/1-Start-Server-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/1-Start-Server-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li>Add the SSH protocol as an inbound rule under the server&apos;s security group under the server&apos;s security tab. Adding and configuring SSH as an inbound security group rule creates a secure, encrypted channel over an unsecured network like the Internet. This encryption ensures that malicious actors cannot intercept or eavesdrop on any data transmitted between the client (your local computer) and the server (in this case, the EC2 instance). This level of security means that sensitive information, such as passwords and commands, is kept safe from prying eyes.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/2-Add-SSH-to-Inbound-rules-1.png" class="kg-image" alt="Accessing the EC2 Instance Connect Linux Terminal" loading="lazy" width="2000" height="419" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/2-Add-SSH-to-Inbound-rules-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/2-Add-SSH-to-Inbound-rules-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/2-Add-SSH-to-Inbound-rules-1.png 1600w, https://cyberguidesolutions.com/content/images/2024/04/2-Add-SSH-to-Inbound-rules-1.png 2300w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="3"><li>When the server is selected, click the &quot;Connect&quot; button on the upper right-hand side.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/3-Connect-Button.png" class="kg-image" alt="Accessing the EC2 Instance Connect Linux Terminal" loading="lazy" width="2000" height="968" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/3-Connect-Button.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/3-Connect-Button.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/3-Connect-Button.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/04/3-Connect-Button.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="4"><li>You can now select the &quot;Connect&quot; button on the lower left-hand side to access the server&apos;s Linux terminal. To connect your instance, you&apos;ll choose the &quot;EC2 Instance Connect&quot; option for now.  </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/4-Connect-to-Instance.png" class="kg-image" alt="Accessing the EC2 Instance Connect Linux Terminal" loading="lazy" width="1041" height="885" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/4-Connect-to-Instance.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/4-Connect-to-Instance.png 1000w, https://cyberguidesolutions.com/content/images/2024/04/4-Connect-to-Instance.png 1041w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="5"><li>Accessing the AWS Linux terminal through the EC2 Instance Connect function is a convenient alternative to using OpenSSH for Windows or SSH for MacOS and Linux. As you can see below, you can now execute commands after being granted remote access to the server.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/04/5-Amazon-Linux-Terminal.png" class="kg-image" alt="Accessing the EC2 Instance Connect Linux Terminal" loading="lazy" width="1741" height="911" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/04/5-Amazon-Linux-Terminal.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/04/5-Amazon-Linux-Terminal.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/04/5-Amazon-Linux-Terminal.png 1600w, https://cyberguidesolutions.com/content/images/2024/04/5-Amazon-Linux-Terminal.png 1741w" sizes="(min-width: 720px) 720px"></figure>]]></content:encoded></item><item><title><![CDATA[Security Groups]]></title><description><![CDATA[<p></p><p>This resource shows how cloud firewalls work. In AWS, you can customize an EC2 instance&apos;s firewall to meet an organization&apos;s security requirements.</p><ol><li>Launch an existing EC2 instance by navigating to Instance State, then select Start Instance.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/1.png" class="kg-image" alt loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li> Once the selected EC2 instance runs, you can access its</li></ol>]]></description><link>https://cyberguidesolutions.com/creating-security-groups/</link><guid isPermaLink="false">667591e04a6a363d8eddba5d</guid><category><![CDATA[ACL]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 08 Jul 2024 03:41:25 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/cyber-security-data-protection-cyberattacks-concept-blue-background.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/cyber-security-data-protection-cyberattacks-concept-blue-background.jpg" alt="Security Groups"><p></p><p>This resource shows how cloud firewalls work. In AWS, you can customize an EC2 instance&apos;s firewall to meet an organization&apos;s security requirements.</p><ol><li>Launch an existing EC2 instance by navigating to Instance State, then select Start Instance.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/1.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="2"><li> Once the selected EC2 instance runs, you can access its public IP to verify that the server works.  You can access the instance&apos;s public IP under the Details tab.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/2.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/2.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/2.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/2.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/2.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="3"><li> If the EC2 instance was configured with a script under its user data, its output will be displayed on a browser page. You can refer to my &quot;Creating an EC2 Instance&quot; article for the steps in configuring a script for the instance&apos;s user data. As you can see, the way this particular instance&apos;s inbound rules are configured makes it publicly accessible to any sources through the Internet, which is not secure and is a serious security issue. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/3.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/3.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/3.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/3.png 1600w, https://cyberguidesolutions.com/content/images/2024/03/3.png 2000w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="4"><li> Selecting the &quot;Security&quot; tab lets you ascertain the various inbound and outbound rules under a specific security group assigned to the EC2 instance.  In this case, you can see that the server allows for any IP source, which is indicated by an IP address and subnet of 0.0.0.0/0 under the &quot;Source&quot; tab, to access the server on port 80, as it is configured under the instance&apos;s &quot;Port Range&quot; tab.  To reconfigure the selected instance&apos;s inbound rules, select its specific security group by clicking the &quot;Security groups&quot; link under the Security tab.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/4.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/4.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/4.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/4.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/4.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="5"><li>After selecting the instance&apos;s security group, navigate to the &quot;Inbound rules&quot; tab to view how the server&apos;s inbound rules are configured.  You can see that any IP address and subnet source, signified by how 0.0.0.0/0 was configured under &quot;Source,&quot; can access the instance from the internet, which is unsecured and prone to attacks.    </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/5.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="993" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/5.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/5.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/5.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/5.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="6"><li> You can address an instance&apos;s unsecured inbound rules by selecting &quot;Edit inbound rules,&quot; either by selecting &quot;Actions&quot; from the drop-down menu on the upper right-hand side of the selected security group or by selecting the &quot;Inbound Rules&quot; tab and clicking on the &quot;Edit Inbound Rules&quot; button located on the lower right-hand side that corresponds to the security group that needs to be reconfigured.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/6.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="991" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/6.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/6.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/6.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/6.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="7"><li> Since the current EC2 instance&apos;s inbound rules are unsecured, we will delete it, removing the configured 0.0.0.0/0 IP source.  An EC2 instance&apos;s inbound rules configuration functions similarly to a hardware network firewall; however, unlike a hardware network firewall, it&apos;s based in the cloud, which is impressive.  </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/7.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="991" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/7.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/7.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/7.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/7.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="8"><li>We just removed the instance&apos;s unsecured inbound rule, which blocks anyone from accessing it over the public internet. To implement the change in the inbound rules, click the &quot;Save&quot; button. Although we made the instance more secure, we also made it unavailable to the public, which is not cool. We need to make sure that we balance security and convenience. So, let&apos;s not stop here and keep working on it. Now that we&apos;ve deleted the instance&apos;s unsecured inbound rule, access to the instance is prevented over the public internet. While we&apos;ve secured the instance, we also prevented access from the public internet, making the third aspect of the CIA triad, &quot;Availability,&quot; non-existent. This is not where we should stop since cybersecurity must balance security and convenience.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/8.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="991" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/8.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/8.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/8.png 1600w, https://cyberguidesolutions.com/content/images/2024/03/8.png 2000w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="9"><li> As we can see, there are no rules under the instance&apos;s Inbound rules.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/9-1.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="991" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/9-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/9-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/9-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/9-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="10"><li>To verify that we indeed cannot access the EC2 instance using its public IP address, we copy and paste its public IP into a browser&apos;s address bar.  Now, you can see that the cloud server fails to load, confirming that we no longer have access to it.  </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/10-1.png" class="kg-image" alt="Security Groups" loading="lazy" width="2000" height="991" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/10-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/10-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/10-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/10-1.png 2400w" sizes="(min-width: 720px) 720px"></figure>]]></content:encoded></item><item><title><![CDATA[Creating an EC2 Instance]]></title><description><![CDATA[<p></p><h3 id="to-launch-an-instance-on-aws-follow-these-steps">To launch an instance on AWS, follow these steps:</h3><p></p><p>1. Navigate to the Services menu on the top left of the dashboard.</p><p>2. Choose Compute, then EC2, and then Instances.</p><p>3. Click on Launch Instances on the top right.</p><p>4. Name your server and select an Amazon Machine Image (AMI)</p>]]></description><link>https://cyberguidesolutions.com/creating-an-ec2-instance/</link><guid isPermaLink="false">667591e04a6a363d8eddba5b</guid><category><![CDATA[Virtual Servers]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Fri, 01 Mar 2024 06:13:52 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/server-rack-inside-data-center.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/server-rack-inside-data-center.jpg" alt="Creating an EC2 Instance"><p></p><h3 id="to-launch-an-instance-on-aws-follow-these-steps">To launch an instance on AWS, follow these steps:</h3><p></p><p>1. Navigate to the Services menu on the top left of the dashboard.</p><p>2. Choose Compute, then EC2, and then Instances.</p><p>3. Click on Launch Instances on the top right.</p><p>4. Name your server and select an Amazon Machine Image (AMI).</p><p>5. You can select an operating system (OS) type before choosing an AMI specific to your chosen OS.</p><p>6. Once you&apos;ve selected an AMI, you can choose either an Intel-based CPU architecture, which is commonly used and offers a wide range of software compatibility, or an Advanced RISC Machines (Arm)-based CPU architecture, which is known for its energy efficiency and is licensed to companies like Apple.</p><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-1-2.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="1278" height="1131" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/EC2-Step-1-2.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/EC2-Step-1-2.png 1000w, https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-1-2.png 1278w" sizes="(min-width: 720px) 720px"></figure><ol start="7"><li>Choose an instance type that matches your computing, memory, networking, or storage needs. Your instance type will determine the server&apos;s hardware capacity and resources. It&apos;s a crucial decision that impacts the performance and cost of running your instance. If you need assistance making this decision, click the &quot;Get advice&quot; hyperlink next to &quot;Info.&quot;</li><li>Choose a key pair once you have selected your instance type. A key pair is a set of cryptographic keys AWS uses to authenticate and secure your connection to your instance. It consists of a public key that AWS stores and a private key that you store. The private key is required to connect to your instance securely. Remember, you&apos;re in control of your security, so store your key pair in a safe and easily accessible location before launching your instance. If you are not using Windows instances, I recommend selecting RSA. For the private key format, you can use .pem unless you are using older operating systems such as Windows 7 or 8.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-3-1.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="600" height="628" srcset="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-3-1.png 600w"></figure><ol start="9"><li>After selecting your key pair, it&apos;s time to choose a security group under Network settings. A security group is a virtual firewall that controls inbound and outbound traffic for your instance. It acts as a barrier that allows or blocks traffic based on the rules you define. Inbound rules control incoming traffic to your instance, while outbound rules control outgoing traffic from your instance. You can assign one or more security groups to your instance. If you assign multiple security groups, all rules will be evaluated to regulate inbound and outbound traffic. If no value is specified, the value of the source template will be used. If the template value is not specified, the default API value will be used. I recommend selecting the &quot;Allow SSH traffic from&quot; option and specifying an IP address to connect to your instance securely for remote configuration.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-2.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="1278" height="1148" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/EC2-Step-2.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/EC2-Step-2.png 1000w, https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-2.png 1278w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="10"><li>You now have the option to specify the storage preferences for the instance.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/Screen-Shot-2024-03-02-at-9.05.51-PM.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="810" height="441" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/Screen-Shot-2024-03-02-at-9.05.51-PM.png 600w, https://cyberguidesolutions.com/content/images/2024/03/Screen-Shot-2024-03-02-at-9.05.51-PM.png 810w" sizes="(min-width: 720px) 720px"></figure><p></p><p>11. Navigate to User Data under Advanced Details and paste the script below, which will deploy an Apache Web Server with a basic web page.</p><pre><code class="language-shellscript">#!/bin/bash
# Use this for your user data (script from top to bottom)
# install httpd (Linux 2 version)
yum update -y
yum install -y httpd
systemctl start httpd
systemctl enable httpd
echo &quot;&lt;h1&gt;Creating an EC2 $(hostname -f)&lt;/h1&gt;&quot; &gt; /var/www/html/index.html</code></pre><p></p><ol start="12"><li>Enter the number of instances you want to launch. You can specify more than one instance for launch, but all will use the same configuration. It&apos;s best to break up large requests into smaller batches to launch instances faster. An example would be creating five separate launch requests for 100 instances each instead of one for 500 instances. Once you&apos;ve verified everything, select the &quot;Launch Instance&quot; button.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-4.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="366" height="792"></figure><ol start="11"><li>You can select the specific instance you&apos;ve launched to view networking and other details.</li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-5-2-1.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="2000" height="945" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/EC2-Step-5-2-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/EC2-Step-5-2-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/EC2-Step-5-2-1.png 1600w, https://cyberguidesolutions.com/content/images/size/w2400/2024/03/EC2-Step-5-2-1.png 2400w" sizes="(min-width: 720px) 720px"></figure><p></p><ol start="12"><li> Copy and paste the instance&apos;s public IP onto a new tab to test.  You should now see your Apache Web Server with a basic web page. </li></ol><figure class="kg-card kg-image-card"><img src="https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-6-1.png" class="kg-image" alt="Creating an EC2 Instance" loading="lazy" width="2000" height="945" srcset="https://cyberguidesolutions.com/content/images/size/w600/2024/03/EC2-Step-6-1.png 600w, https://cyberguidesolutions.com/content/images/size/w1000/2024/03/EC2-Step-6-1.png 1000w, https://cyberguidesolutions.com/content/images/size/w1600/2024/03/EC2-Step-6-1.png 1600w, https://cyberguidesolutions.com/content/images/2024/03/EC2-Step-6-1.png 2000w" sizes="(min-width: 720px) 720px"></figure><p></p>]]></content:encoded></item><item><title><![CDATA[High Availability and Scalability]]></title><description><![CDATA[<p></p><p>Understanding scalability in cloud computing is crucial since it allows an application or system to expand its resources to meet critical needs through vertical and horizontal scaling, the latter of which affects high availability.</p><p></p><h3 id="high-availability">High Availability</h3><p></p><p>Horizontal scaling, unlike vertical scalability, directly contributes to high availability. As the number of</p>]]></description><link>https://cyberguidesolutions.com/high/</link><guid isPermaLink="false">667591e04a6a363d8eddba5c</guid><category><![CDATA[CIA Triad]]></category><category><![CDATA[Cybersecurity]]></category><category><![CDATA[AWS]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Fri, 01 Mar 2024 06:13:31 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/growth-strategy-business-graph-analysis-concept-ai-generation.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/growth-strategy-business-graph-analysis-concept-ai-generation.jpg" alt="High Availability and Scalability"><p></p><p>Understanding scalability in cloud computing is crucial since it allows an application or system to expand its resources to meet critical needs through vertical and horizontal scaling, the latter of which affects high availability.</p><p></p><h3 id="high-availability">High Availability</h3><p></p><p>Horizontal scaling, unlike vertical scalability, directly contributes to high availability. As the number of servers increases, so does availability, reducing latency and increasing redundancy. Operating an application or system in multiple Availability Zones is an effective way to achieve high availability, as it mitigates the risk of data center loss due to natural or man-made disasters, aligning with business continuity and disaster recovery plans.&#xA0;&#xA0;</p><p></p><h3 id="vertical-scalability">Vertical Scalability&#xA0;</h3><p></p><p>Vertical scalability, also known as scaling up, can meet an increased demand for application or system resources by increasing the size of a cloud instance. For instance, upgrading from a t2.micro instance with 1 vCPU and 1 GiB RAM to a t2.xlarge EC2 instance with 4 vCPU and 16 GiB RAM to accommodate a demand increase is an example of vertical scalability. This type of scalability is commonly used in non-distributed systems like databases.</p><p></p><h3 id="horizon-scalability">Horizon Scalability&#xA0;</h3><p></p><p>Horizontal scalability can address availability requirements by scaling in (decreasing the number of instances) or scaling out (increasing the number of instances. A situation with a sudden increased demand for application, system, or compute resources benefits from automatically increasing the number of instances quickly. Conversely, a decrease in server demand will cause a reduction in the number of instances automatically. Scaling in or out is critical to optimizing availability and adapting to the ever-changing needs of cloud resources. Setting up an Auto Scaling Group configured to maintain a specific number of instances at all times, automatically scaling in or out from the set number of instances, makes horizontal scalability possible. To prevent overtaxing any particular instance from incoming requests, configuring a load balancer to optimally route incoming traffic for cloud resources across EC2 instances inside an Auto Scaling Group makes horizontal scalability more efficient and effective.</p><p></p><h3 id="scalability-vs-elasticity-vs-agility">Scalability vs. Elasticity vs. Agility</h3><p></p><p>Scalability can be achieved by adding more servers to the existing infrastructure (scale out) or upgrading the hardware of the existing servers (scale up) to meet the growing demands of the users. The ultimate goal of scalability is to ensure that the system remains efficient and effective even as the user demand changes.</p><p>Elasticity is a critical feature that allows your infrastructure to adapt to changing demand by quickly acquiring or releasing resources once scalability is achieved. With this auto-scaling capability, your cloud-based resources can quickly scale in and out, optimizing costs and efficiency. This feature enables cost savings by allowing for pay-per-use and match-demand models, ensuring that you only pay for what you need and when needed.</p><p>Agility allows to quickly and efficiently provide new IT resources to developers, which is a crucial aspect of modern software development. Companies can ensure that new resources are only a click away, reducing the time it takes to make them available from weeks to mere minutes. This results in faster and more efficient software development processes that can keep pace with the demands of today&apos;s rapidly changing business landscape.</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[CIA Triad]]></title><description><![CDATA[<p></p><h3 id="confidentiality">Confidentiality</h3><p></p><p>Confidentiality ensures that sensitive information is only accessible to authorized individuals. For instance, in a hospital setting, patient records are confidential and can only be accessed by authorized healthcare professionals. Unauthorized individuals, such as other patients or visitors, must not access these sensitive records.</p><h3 id="integrity">Integrity</h3><p></p><p>Data integrity is the</p>]]></description><link>https://cyberguidesolutions.com/cia-triad/</link><guid isPermaLink="false">667591e04a6a363d8eddba5a</guid><category><![CDATA[Cybersecurity]]></category><category><![CDATA[CIA Triad]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Tue, 27 Feb 2024 06:21:24 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/cyber-security-privacy-concept-data-protection.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/cyber-security-privacy-concept-data-protection.jpg" alt="CIA Triad"><p></p><h3 id="confidentiality">Confidentiality</h3><p></p><p>Confidentiality ensures that sensitive information is only accessible to authorized individuals. For instance, in a hospital setting, patient records are confidential and can only be accessed by authorized healthcare professionals. Unauthorized individuals, such as other patients or visitors, must not access these sensitive records.</p><h3 id="integrity">Integrity</h3><p></p><p>Data integrity is the practice of protecting data and information from unauthorized modification. It ensures that data remains unaltered both while at rest and during transit. For instance, if test scores were to be changed in a math exam, it could lead to unfair outcomes and loss of trust in the examination system. We can ensure data integrity using various tools, such as hashes or checksums, data validation, digital signatures, access controls, and logs. For example, the hashes or checksums before and after transit must match to ensure that the data&apos;s integrity is not compromised. Another example is how digital signatures offer a secure way to verify the authenticity and integrity of digital documents or messages.</p><h3 id="availability">Availability</h3><p></p><p>Cybersecurity is not only about protecting data but also ensuring that it is always available. This fact is known as availability, and it involves guaranteeing data and information through the accessibility of resources such as servers, networks, computers, and other systems and network resources. However, threats like system failures, cyber-attacks, or natural disasters can disrupt availability. Therefore, maintaining critical data and systems availability as much as possible is crucial for a business&apos;s profitability, people&apos;s well-being, and many other benefits.</p>]]></content:encoded></item><item><title><![CDATA[Cybersecurity: A Balance Between Security and Convenience]]></title><description><![CDATA[<p></p><p>Juggling security and convenience can be a real challenge. Getting it right is essential, but it can be challenging. Security measures can do the job, but they can also make things more complicated. Sometimes, prioritizing convenience can leave us open to attacks. Whether security or convenience should come first depends</p>]]></description><link>https://cyberguidesolutions.com/a-balance-between-security-and-convenience/</link><guid isPermaLink="false">667591e04a6a363d8eddba58</guid><category><![CDATA[CIA Triad]]></category><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Kahlil James Ganih]]></dc:creator><pubDate>Mon, 26 Feb 2024 00:08:11 GMT</pubDate><media:content url="https://cyberguidesolutions.com/content/images/2024/03/law-justice-concept-digital-world-generative-ai.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://cyberguidesolutions.com/content/images/2024/03/law-justice-concept-digital-world-generative-ai.jpg" alt="Cybersecurity: A Balance Between Security and Convenience"><p></p><p>Juggling security and convenience can be a real challenge. Getting it right is essential, but it can be challenging. Security measures can do the job, but they can also make things more complicated. Sometimes, prioritizing convenience can leave us open to attacks. Whether security or convenience should come first depends on the situation. Just remember that finding the right balance is an ongoing process. We need to be adaptable and flexible to keep things in check. The goal is to have adequate security that minimizes risks while maximizing convenience.</p><p></p><p>Cybersecurity measures are essential to protect businesses, jobs, health, and lives worldwide. Here are some examples that showcase the adverse outcomes of inadequate cybersecurity measures:</p><p></p><h3 id="equifax-data-breach-2017">Equifax Data Breach (2017):</h3><p></p><p>One of the most prominent credit reporting agencies, Equifax, suffered from a massive data breach that exposed the personal information of over 147 million people.</p><p><strong>Financial Losses:</strong>&#xA0;Equifax faced significant financial losses due to lawsuits, regulatory fines, and a drop in its stock price.</p><p>Reputation Damage: The incident severely damaged Equifax&apos;s reputation and trust among consumers.</p><p></p><h3 id="wannacry-ransomware-attack-2017">WannaCry Ransomware Attack (2017):</h3><p></p><p>The WannaCry ransomware attack impacted healthcare systems, including the UK&apos;s National Health Service (NHS), causing widespread disruption. Hospitals had to cancel appointments and redirect patients due to the inability to access critical systems.</p><p><strong>Lives Affected:</strong>&#xA0;Patients&apos; lives were directly affected as patient care was delayed or compromised, highlighting the real-world consequences of cyberattacks on healthcare infrastructure.</p><p></p><h3 id="solarwinds-supply-chain-attack-2020">SolarWinds Supply Chain Attack (2020):</h3><p></p><p>The SolarWinds supply chain attack infiltrated numerous government agencies and corporations worldwide, compromising the software supply chain.</p><p><strong>National Security Implications:</strong>&#xA0;The incident raised concerns about national security as sensitive government agencies, including the US Department of Defense and the Department of Homeland Security, were compromised.</p><p><strong>Job Implications:</strong>&#xA0;The incident led to increased scrutiny of supply chain security practices, which may lead to potential job changes for cybersecurity professionals.</p><p></p><h3 id="colonial-pipeline-ransomware-attack-2021">Colonial Pipeline Ransomware Attack (2021):</h3><p></p><p>The ransomware attack on Colonial Pipeline disrupted fuel supplies along the East Coast, leading to panic buying and fuel shortages.</p><p><strong>Economic Consequences:</strong>&#xA0;The attack had significant consequences due to disrupted fuel distribution and increased fuel prices.</p><p><strong>Public Safety Concerns:</strong>&#xA0;The incident raised concerns about the vulnerability of critical infrastructure to cyberattacks and underscored the potential risks to public safety.</p><p></p><p>These examples show inadequate cybersecurity measures can negatively affect businesses, jobs, health, and lives worldwide. Therefore, organizations must prioritize cybersecurity measures and invest in robust defenses to prevent such incidents from happening in the future.</p>]]></content:encoded></item></channel></rss>