Cloud Security Portfolio · 2026
My cloud security portfolio documenting hands-on learning in cloud identity security, cloud detection and response, container security, and infrastructure hardening. I share this work to track my growth and encourage others to learn Cloud Security.
Focus Areas
Four connected tracks covering cloud attack surfaces from IAM and networking to runtime detection and incident response.
Cloud Detection & Response
Building cloud-native detection pipelines to analyze AWS and Azure telemetry, triage alerts, and improve incident response workflows.
Cloud Identity & Access
Hardening IAM with least privilege, role trust policies, and continuous access review to reduce cloud account takeover risk.
Container & Kubernetes Security
Securing cloud workloads with image scanning, runtime policies, secrets protection, and hardened Kubernetes configurations.
Cloud Threat Modeling
Applying STRIDE and attack-path analysis to cloud architectures so students learn to identify and mitigate risks before deployment.
Tools & Projects
Project-based learning across IAM defense, cloud detection engineering, container security, and cloud threat modeling.
Cloud IAM Misconfiguration Defender
A toolkit that audits risky IAM policies, detects privilege escalation paths, and recommends least-privilege remediations.
Cloud Incident Response Simulation Suite
A repeatable lab environment for practicing cloud incident response with realistic alerts, investigation playbooks, and post-incident reporting.
Cloud SOC Analyst Assistant
A workflow assistant that summarizes cloud alerts, suggests triage steps, and helps students practice SOC analysis with cloud-focused context.
My Learning Roadmap
A structured sequence of projects covering cloud IAM, cloud detection engineering, container security, and threat modeling, documented at every step for student learning.
Full Roadmap →Months 1–2
Phase 1 · Core Foundations
Cloud IAM Misconfiguration Defender + cloud log analysis labs with practical alert triage.
Months 3–5
Phase 2 · Container Security & Platform Hardening
Container security labs, Kubernetes hardening patterns, and cloud baseline enforcement templates.
Months 6–8
Phase 3 · Portfolio + Community Learning Outcomes
Cloud IR simulation suite, cloud SOC assistant workflows, and reproducible notes prepared to help others learn faster.
Latest Cloud Security Notes
Benchmarking AWS IAM Privilege Escalation Detection Rules Across 200 Test Cases
I tested multiple IAM detection approaches against a custom escalation dataset and documented which rules produced strong signal with manageable noise.
Read →Reproducing a Cloud Incident Timeline: From Initial Access to Containment
A step-by-step reconstruction of a cloud incident workflow showing how telemetry, alert triage, and containment decisions fit together in practice.
Read →Cloud Threat Modeling Walkthrough: Mapping Real Attack Paths in a Multi-Account Environment
A practical walkthrough of cloud threat modeling using realistic misconfiguration and privilege abuse paths across shared cloud infrastructure.
Read →Cloud Security Portfolio
I am documenting projects, writeups, and experiments as I learn Cloud Security. Use these examples for your own study and share your learning progress too.