Posts

week 10 Reyna Cloud Automation

  Cloud Automation This week’s focus on cloud automation highlighted how powerful automated processes can be in improving efficiency, accuracy, and scalability in cloud environments. Automation in the cloud leverages software-driven solutions to handle routine, repetitive, or complex tasks with minimal human intervention. Examples include automatically provisioning or decommissioning virtual machines, configuring virtual networks, or deploying an entire cloud environment. One key takeaway from this module is that automation is only as good as the planning behind it . Predictable configurations, clear workflows, and proper triggers are essential for ensuring automated systems work as intended. The technology itself is powerful, but without well-documented processes and adequate user training, organizations risk misconfigurations or security oversights. The readings and resources reinforced how automation ties into both operational efficiency and security: AWS Systems Manager...

week 9 reyna Cloud Observability and Disaster Recovery: Keys to Resilient Cloud Operations

  Cloud Observability and Disaster Recovery: Keys to Resilient Cloud Operations This week’s learning focused on two critical aspects of managing cloud environments: observability and disaster recovery planning . As organizations increasingly rely on cloud services, understanding how to monitor resources effectively and prepare for inevitable disruptions is essential. Observability in the cloud means having the tools and processes in place to gain real-time insights into system performance and health. Services like Amazon CloudWatch , Azure Monitor , and Google Cloud’s monitoring tools enable IT teams to collect logs, metrics, and traces that help quickly detect anomalies or bottlenecks. This visibility is crucial for maintaining optimal performance while controlling costs, as it lets teams respond proactively before minor issues escalate. Another major takeaway for me is the importance of capacity management  planning and scaling cloud resources to meet demand without ov...

week 8 reyna Understanding Storage Technologies and Cloud Backup Essentials

  Understanding Storage Technologies and Cloud Backup Essentials This week’s module highlights the foundational storage architectures that underpin modern IT environments, both on-premises and in the cloud. The discussion begins with traditional storage types: Direct Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Networks (SAN). Each offers unique advantages depending on organizational needs, from the simplicity of DAS to the scalability and high performance of SAN. Transitioning to cloud storage, the module distinguishes three primary data storage models: file storage, block storage, and object storage. File storage offers a familiar, hierarchical folder structure ideal for shared file access. Block storage divides data into chunks for high-speed transaction processing, commonly used by databases and virtual machines. Object storage, designed for massive scalability, stores data alongside metadata and is optimized for unstructured data like media files ...

week 7 reyna Enhancing Cloud Security with Identity and Access Management (IAM)

  Enhancing Cloud Security with Identity and Access Management (IAM) When working with cloud environments, security starts with how access is managed. One critical best practice is to avoid using the default root account for everyday cloud operations. Root accounts typically have full administrative privileges, making them prime targets for attackers. Instead, it’s much safer to create individual, less-privileged user accounts tailored to specific roles and responsibilities. Most major cloud providers offer built-in Identity and Access Management (IAM) services designed to simplify this process. IAM allows administrators to create unique digital identities not only for human users but also for applications and services that interact with cloud resources. Each identity can then be assigned precise roles and permissions, following the principle of least privilege — granting only the minimum access necessary to perform a task. Authentication mechanisms ensure that only valid users ...

week 6 Reyna Strengthening Cloud Security Through Strategy and Awareness

                                Strengthening Cloud Security Through Strategy and Awareness As organizations accelerate their migration to cloud platforms, ensuring effective cloud security becomes not just a technical necessity but a strategic imperative. This week’s materials from Module 6, alongside industry readings, offered a crucial reminder: most cloud security failures do not originate from flaws in the cloud itself, but from misconfigurations and human error. Understanding cloud security means not just learning how to deploy tools, but learning how to think critically about shared responsibility, user behavior, and layered defense. A central concept discussed was the Shared Responsibility Model , which helps delineate what the cloud provider is responsible for versus what the customer must secure. This model is often misunderstood, and that misunderstanding can lead to major vulnerabilities. For e...

week 5 Reyna Building a Resilient Hybrid Cloud

   Building a Resilient Hybrid Cloud: Connectivity, Management & Troubleshooting As more organizations migrate to the cloud, many discover that the hybrid cloud —a blend of on-premises infrastructure and cloud services is not just a transitional phase, but a long-term strategy. Why? Because hybrid environments offer the best of both worlds: the scalability of the cloud and the control of on-prem data centers. But to make this approach work, seamless and secure connectivity between locations is absolutely critical. This week, I dove into key strategies and technologies that support successful hybrid cloud deployments from connection types to troubleshooting. Here's what I learned: Connecting On-Prem to the Cloud: 3 Options Your hybrid cloud journey starts with choosing how to connect your environments. Three primary options exist, each with its own pros and cons: Public Internet VPNs Easy to deploy Cost-effective Relies on internet bandwidth and encryptio...

week 4 Reyna The Shift from Local Networks to Cloud-Based Infrastructure

  Understanding the Shift from Local Networks to Cloud-Based Infrastructure Transitioning from a local physical network to a cloud-based network brings significant changes in how resources are accessed, managed, and secured. One of the most important concepts to grasp is the shared responsibility model. In traditional networks, the organization manages everything—from hardware to application security. In the cloud, however, the cloud service provider (CSP) handles the infrastructure, while the customer is responsible for data, identity, and configuration. Additionally, cloud networking introduces software-defined networking (SDN), which enables greater flexibility in traffic management and policy enforcement. Businesses must also consider network latency, bandwidth costs, and access controls when designing cloud architectures. These factors directly impact performance and security and must be evaluated carefully before migration. While the cloud offers scalability and efficiency, ...