Posts

Showing posts from July, 2025

week 8 reyna Understanding Storage Technologies and Cloud Backup Essentials

  Understanding Storage Technologies and Cloud Backup Essentials This week’s module highlights the foundational storage architectures that underpin modern IT environments, both on-premises and in the cloud. The discussion begins with traditional storage types: Direct Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Networks (SAN). Each offers unique advantages depending on organizational needs, from the simplicity of DAS to the scalability and high performance of SAN. Transitioning to cloud storage, the module distinguishes three primary data storage models: file storage, block storage, and object storage. File storage offers a familiar, hierarchical folder structure ideal for shared file access. Block storage divides data into chunks for high-speed transaction processing, commonly used by databases and virtual machines. Object storage, designed for massive scalability, stores data alongside metadata and is optimized for unstructured data like media files ...

week 7 reyna Enhancing Cloud Security with Identity and Access Management (IAM)

  Enhancing Cloud Security with Identity and Access Management (IAM) When working with cloud environments, security starts with how access is managed. One critical best practice is to avoid using the default root account for everyday cloud operations. Root accounts typically have full administrative privileges, making them prime targets for attackers. Instead, it’s much safer to create individual, less-privileged user accounts tailored to specific roles and responsibilities. Most major cloud providers offer built-in Identity and Access Management (IAM) services designed to simplify this process. IAM allows administrators to create unique digital identities not only for human users but also for applications and services that interact with cloud resources. Each identity can then be assigned precise roles and permissions, following the principle of least privilege — granting only the minimum access necessary to perform a task. Authentication mechanisms ensure that only valid users ...

week 6 Reyna Strengthening Cloud Security Through Strategy and Awareness

                                Strengthening Cloud Security Through Strategy and Awareness As organizations accelerate their migration to cloud platforms, ensuring effective cloud security becomes not just a technical necessity but a strategic imperative. This week’s materials from Module 6, alongside industry readings, offered a crucial reminder: most cloud security failures do not originate from flaws in the cloud itself, but from misconfigurations and human error. Understanding cloud security means not just learning how to deploy tools, but learning how to think critically about shared responsibility, user behavior, and layered defense. A central concept discussed was the Shared Responsibility Model , which helps delineate what the cloud provider is responsible for versus what the customer must secure. This model is often misunderstood, and that misunderstanding can lead to major vulnerabilities. For e...

week 5 Reyna Building a Resilient Hybrid Cloud

   Building a Resilient Hybrid Cloud: Connectivity, Management & Troubleshooting As more organizations migrate to the cloud, many discover that the hybrid cloud —a blend of on-premises infrastructure and cloud services is not just a transitional phase, but a long-term strategy. Why? Because hybrid environments offer the best of both worlds: the scalability of the cloud and the control of on-prem data centers. But to make this approach work, seamless and secure connectivity between locations is absolutely critical. This week, I dove into key strategies and technologies that support successful hybrid cloud deployments from connection types to troubleshooting. Here's what I learned: Connecting On-Prem to the Cloud: 3 Options Your hybrid cloud journey starts with choosing how to connect your environments. Three primary options exist, each with its own pros and cons: Public Internet VPNs Easy to deploy Cost-effective Relies on internet bandwidth and encryptio...