Student: Mohammed Jarah | Course: IT335 | Due Date: March 17, 2026
This lab applies the lessons from the Capital One cloud breach by configuring foundational AWS security controls. As a student security engineer, I implemented essential protections across identity, storage, compute, and monitoring to demonstrate how proper configuration prevents real-world breaches.
- π IAM Least Privilege: Creating restricted users and groups to limit credential blast radius
- πͺ£ S3 Access Control: Blocking public access to prevent unauthorized data exfiltration
- π» EC2 Network Security: Restricting inbound traffic using Security Groups and IMDSv2
- ποΈ Continuous Monitoring: Understanding CloudTrail, AWS Config, and Billing dashboards
- π Identity (IAM): Enabled MFA on root account, created
lab-student-userandLabUsersgroup with read-only permissions - πͺ£ Storage (S3): Created private bucket
it335-lab3-mohammedjarah-securewith Block All Public Access enabled - π» Compute (EC2): Launched Free Tier instance with Security Group restricted to my IP only, avoiding 0.0.0.0/0
- ποΈ Visibility: Reviewed CloudTrail logging and Billing dashboard for governance awareness
- πΈ
screenshots/before/β Baseline AWS dashboards before any configuration - β
screenshots/after/β Proof of all security configurations - π
lab3-reflection.mdβ Written analysis connecting configurations to the Capital One breach - π»
terminal-proof.mdβ Evidence of terminal-based Git workflow and commit history
| π€ Student | Mohammed Jarah |
| π Course | IT335 β Cloud Security |
| π« University | Marymount University |
| π Due Date | March 17, 2026 |