layout: default title: Blog description: “Noble Antwi’s technical blog — lab notes, project updates, learning journals, and cloud security articles covering AWS, Azure, IAM, and DevSecOps.” —
Writing & Notes
Two kinds of writing here — personal learning notes from my day-to-day journey, and polished articles published on Medium.
My Learning Journal
Raw, personal notes — things I've built, things I've learnt, things that confused me and how I figured them out.
HashiCorp Vault: Authentication Methods, Roles, and AppRole
Part of my ongoing journey through Bryan Krausen’s HashiCorp Vault for Absolute Beginners on Udemy. This session covered Vault Authentication Methods — how humans and machines p...
HashiCorp Vault: Audit Devices and Visibility into Vault Activity
Part of my ongoing journey through Bryan Krausen’s HashiCorp Vault for Absolute Beginners on Udemy. This session covered Vault Audit Devices — the mechanism Vault uses to log ev...
HashiCorp Vault: Understanding Tokens, TTLs, and Token Hierarchies
Part of my ongoing journey through Bryan Krausen’s HashiCorp Vault for Absolute Beginners on Udemy. This session covered Vault Tokens — the core authentication mechanism that co...
My AZ-900 Journey: Learning Azure Fundamentals from the Ground Up
After spending considerable time in AWS, I have decided to broaden my cloud knowledge by pursuing the Microsoft Azure Fundamentals (AZ-900) certification. This post documents wh...
My Okta Certification Journey: Two Passes, Two Fails, and a Valuable Lesson
Not every journey goes to plan. This one taught me something I could not have learned from a study guide.
HashiCorp Vault: How Sealing, Unsealing, and Auto-Unseal Actually Work
Part of my ongoing journey through Bryan Krausen’s HashiCorp Vault for Absolute Beginners on Udemy. Today’s session covered one of the most fundamental — and most misunderstood ...
Showing 5 of 6 entries
Published Articles
Long-form, polished articles published on Medium. Structured write-ups with in-depth coverage across cloud security, cybersecurity, and infrastructure.
AWS & Cloud Security
Why Cloud Security is No Longer Optional for Growing Businesses
July 8, 2025
Cloud computing has fundamentally reshaped how businesses operate. This article explores why cloud security is critical for growing businesses and the evolving threat landscape in modern cloud environments.
Using Service Control Policies (SCPs) to Restrict AWS Account Access
April 16, 2025 | AWS in Plain English
A comprehensive hands-on guide on implementing Service Control Policies to enforce security controls and restrict access across AWS accounts. Learn how to leverage AWS Organizations for effective multi-account security governance.
Building an AWS Multi-Account Structure with AWS Organizations
April 15, 2025
A practical hands-on lab walkthrough on implementing AWS Organizations for multi-account management. Learn the steps to structure multiple AWS accounts for scalability, security, and cost optimization.
GuardDuty - Runtime Monitoring for EC2: A Hands-on Guide
February 27, 2025
Learn how to implement AWS GuardDuty for runtime monitoring of EC2 instances. Includes hands-on implementation steps and troubleshooting techniques for detecting and responding to threats in your AWS environment.
Implementing Envelope Encryption with AWS KMS
February 16, 2025
A step-by-step guide on implementing envelope encryption using AWS Key Management Service (KMS). Understand how to secure your data at rest with advanced cryptographic techniques.
Security & Threat Analysis
Digital Deception: Dissecting a Phishing Email and Its Malicious Payload
January 13, 2025
A deep technical analysis of a phishing attack, breaking down the attack chain, payload analysis, and indicators of compromise. Learn how to identify and respond to sophisticated phishing attempts.
Advanced Techniques in Email Header Analysis for Phishing Detection
January 13, 2025
Master the techniques of email header analysis to detect and prevent phishing attacks. Learn how to trace email origins, identify spoofing attempts, and extract valuable forensic information from email metadata.
Phishing Detection and Mitigation in Practice: The Mighty Solutions, Inc. Case
January 10, 2025
A real-world case study on identifying and mitigating phishing attacks in an organizational context. Learn practical strategies for threat detection, incident response, and employee security awareness.
Data Loss Prevention in the Cloud: A Comprehensive Guide with a Focus on AWS
AWS in Plain English
Learn comprehensive data loss prevention strategies in cloud environments with a deep focus on AWS. Understand how to protect sensitive data at rest and in transit using AWS services and best practices.
Microsoft Security Updates: Critical Fixes and Zero-Day Vulnerabilities
January 2025
Stay informed on the latest Microsoft security updates, critical patches, and zero-day vulnerability disclosures. Learn how to prioritize and implement security updates in your Microsoft environment.
Infrastructure & Hands-On Labs
Launching an EC2 Linux Hands-On Lab
2025
A practical hands-on guide to launching and configuring EC2 Linux instances on AWS. Learn best practices for instance configuration, security, and management in a lab environment.
Want to Read More?
Visit my Medium profile for the complete collection of articles and stay updated with new technical write-ups.
Visit Medium Profile →Want to discuss these topics or collaborate?
Get In Touch