In this article I’d like to go through how to setup auditing and logging of files/objects using native Windows File Server tools. Some of my projects over the years have had workstreams implementing security and compliance objectives of logging and auditing activities, particularly file/object access. A lot of the solutions have used CyberArk and Centrify […]
Category Archives: Cyber Security
DDOS Attacks and Website Hacking
Very recently, this website suffered a Distributed Denial of Service (DDOS) attack. Following on from that, I thought I would write a short blog post on what happened, how I found out about it, the response to recover from the attack, and the lessons learnt. Firstly, this article will be heavily focused on AWS as […]
Set Up CloudWatch Monitoring and Logging
This is a tutorial on how to setup monitoring and logging on a Debian Linux EC2 instance running a web server using Apache using AWS CloudWatch. CloudWatch does not provide disk (i.e. storage) and memory (i.e. RAM) utilisation metrics within it’s standards AWS CloudWatch options. For this, custom monitoring will have to be used through […]
Installation and Configuration Manual for Your Own, Secured & Encrypted Personal Cloud Storage Using NextCloud
This instruction manual covers the setting up of a private cloud storage, similar in features as OneDrive and Google Drive, using the NextCloud platform. This cloud storage will be self-hosted – running on your own servers – and secured using encryption. Thus, you will have full control and sole admin access to your private data. […]
Building a Website Environment – How to Build a Web Server
In this tutorial we will look at how to build a web server. We will build upon what was covered in my series on what goes on Inside the Cloud, and build ourselves an environment to run a website. This tutorial will cover a single server setup running the entire environment, however in later blog […]
Designing a Scalable, Highly Resilient & Self-Healing Cloud Infrastructure Architecture
In the Inside the Cloud Series, we looked at the individual components of the cloud in more detail. In this article, we will build on that and put all those components together and see how they combine to create a scalable, highly resilient self-healing Cloud. Summary / TL;DR A user connects to our DNS servers […]
Firewalls
In this article, another in our series of looking inside the Cloud, we will be looking more closely at Firewalls – their purpose and how they work. A firewall is combination of hardware and software that monitors incoming and outgoing network traffic and permits or blocks that traffic (specifically called data packets) based on a […]