leemahcloud.hashnode.devDetecting Unencrypted EBS Volumes Using AWS ConfigIntroduction Data-at-rest security is a critical aspect of cloud security. In AWS, Amazon Elastic Block Store (EBS) volumes are commonly used to store application data, operating system files, and logs for EC2 instances. If these volumes are not encr...Dec 22, 2025·4 min read
leemahcloud.hashnode.devDetecting IAM Users Without MFA Using AWS Config, with Real-Time Admin Notifications via SNSIntroduction Securing AWS accounts is crucial in today’s cloud-driven world. One of the simplest yet most overlooked risks is IAM users without Multi-Factor Authentication (MFA). Accounts without MFA are highly vulnerable to password leaks, phishing ...Dec 17, 2025·3 min read
leemahcloud.hashnode.devGitOps with Argo CD: Deploying to AWS ECR and Securing with AWS CloudTrailThis project demonstrates the use of GitOps with Argo CD to automate the deployment of a React web app to a Kubernetes cluster, using AWS Elastic Container Registry (ECR) for storing Docker images and integrating AWS CloudTrail for monitoring and sec...Dec 30, 2024·6 min read
leemahcloud.hashnode.devUsing Terraform to Create IAM Roles and Policies, Secure Data and Applications, and Ensure Compliance in AWS.Overview Infrastructure as Code (IaC) tools like Terraform enable organizations to manage and automate their cloud infrastructure efficiently. In this article, we will explore how to use Terraform to achieve three critical tasks in AWS: creating IAM ...Dec 17, 2024·5 min read
leemahcloud.hashnode.devAutomate Malicious traffic detection in cloud using Amazon guard duty AIIntroduction The design of this system plays a pivotal role in the successful realization of any complex computing project. In the context of this project, which focuses on the crucial task of malicious traffic detection in a cloud environment, the s...Dec 4, 2023·14 min read