Logging and Audit Pic

Setting up Auditing & Logging of Files/Objects Using Native Windows File Server Tools

In this article I’d like to go through how to setup auditing and logging of files/objects using native Windows File Server tools. Some of my projects over the years have had workstreams implementing security and compliance objectives of logging and auditing activities, particularly file/object access. A lot of the solutions have used CyberArk and Centrify […]

DDOS

DDOS Attacks and Website Hacking

Very recently, this website suffered a Distributed Denial of Service (DDOS) attack. Following on from that, I thought I would write a short blog post on what happened, how I found out about it, the response to recover from the attack, and the lessons learnt. Firstly, this article will be heavily focused on AWS as […]

Set Up CloudWatch Monitoring and Logging

This is a tutorial on how to setup monitoring and logging on a Debian Linux EC2 instance running a web server using Apache using AWS CloudWatch. CloudWatch does not provide disk (i.e. storage) and memory (i.e. RAM) utilisation metrics within it’s standards AWS CloudWatch options. For this, custom monitoring will have to be used through […]

Building a Website Environment – How to Build a Web Server

In this tutorial we will look at how to build a web server. We will build upon what was covered in my series on what goes on Inside the Cloud, and build ourselves an environment to run a website. This tutorial will cover a single server setup running the entire environment, however in later blog […]

Firewalls

In this article, another in our series of looking inside the Cloud, we will be looking more closely at Firewalls – their purpose and how they work. A firewall is combination of hardware and software that monitors incoming and outgoing network traffic and permits or blocks that traffic (specifically called data packets) based on a […]