Week 4 Worklog

Week 4 Objectives:

  • Focus on security controls, service limits, and access management.
  • Practice tools that strengthen governance and protection on AWS.

Tasks to be carried out this week:

DayTaskStart DateCompletion DateReference MaterialStatus
1AWS: Quotas & Environment05/08/202605/08/2026Reviewed service quotas and working environment setupCompleted
2AWS: EBS Backup Automation05/09/202605/09/2026Automated snapshots and backup patternsCompleted
3AWS: SSO & Permissions05/10/202605/10/2026Explored centralized identity and permissionsCompleted
4AWS: IAM Policies & Sec Hub05/11/202605/11/2026Practiced IAM policy design and compliance checksCompleted
5AWS: S3 Endpoints & WAF05/12/202605/12/2026Implemented private S3 access and app protectionCompleted
6AWS: Macie & KMS05/13/202605/13/2026Applied encryption and sensitive data discoveryCompleted
7AWS: Secrets & Firewall Mgr05/14/202605/14/2026Managed secrets and security policies at scaleCompleted

Daily Details

Day 1 - AWS: Quotas & Environment

  • Reviewed service quotas and prepared the working environment before deeper labs.

Day 1 screenshot

Day 2 - AWS: EBS Backup Automation

  • Automated snapshots and learned basic backup planning for EBS volumes.

Day 2 screenshot

Day 3 - AWS: SSO & Permissions

  • Explored centralized identity with SSO and practiced permission assignment.

Day 3 screenshot

Day 4 - AWS: IAM Policies & Sec Hub

  • Designed IAM policies and used Security Hub to review security posture.

Day 4 screenshot

Day 5 - AWS: S3 Endpoints & WAF

  • Implemented private S3 access patterns and added application protection with WAF.

Day 5 screenshot

Day 6 - AWS: Macie & KMS

  • Applied encryption with KMS and reviewed sensitive data discovery with Macie.

Day 6 screenshot

Day 7 - AWS: Secrets & Firewall Mgr

  • Managed secrets and centralized security policies across multiple accounts.

Day 7 screenshot

Week 4 Achievements:

  • Improved capability to design layered security controls.
  • Practiced IAM, KMS, Macie, WAF, and Security Hub in realistic scenarios.
  • Built stronger awareness of governance and compliance requirements.