<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Isaeus "Asi" Guiang</title>
    <description>The latest articles on DEV Community by Isaeus "Asi" Guiang (@asi_security).</description>
    <link>https://dev.to/asi_security</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1129365%2Fa3f6819c-059b-4546-95b3-ca5c8a219ded.jpg</url>
      <title>DEV Community: Isaeus "Asi" Guiang</title>
      <link>https://dev.to/asi_security</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/asi_security"/>
    <language>en</language>
    <item>
      <title>New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Tue, 21 Jan 2025 04:36:16 +0000</pubDate>
      <link>https://dev.to/asi_security/new-infostealer-fake-captcha-and-human-verification-novel-lumma-malware-detection-prevention-13a1</link>
      <guid>https://dev.to/asi_security/new-infostealer-fake-captcha-and-human-verification-novel-lumma-malware-detection-prevention-13a1</guid>
      <description>&lt;p&gt;&lt;strong&gt;A deceptive CAPTCHA test that seems harmless but is designed to trick Windows users into installing info-stealing malware.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This week, a friend of mine encountered a seemingly legitimate CAPTCHA Human Verification while browsing the internet. What appeared to be a routine verification was actually a sophisticated mechanism to distribute Lumma malware, a new and dangerous infostealer targeting sensitive data.&lt;/p&gt;

&lt;p&gt;This article will delve into the technical details of how the Lumma malware operates, its distribution mechanisms, and the steps users can take to safeguard themselves.&lt;/p&gt;

&lt;h2&gt;
  
  
  Anatomy of the Attack
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Step 1: The Fake CAPTCHA&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudp28y6xqh0e0jxcw51q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fudp28y6xqh0e0jxcw51q.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The attack begins with a fake CAPTCHA prompt designed to trick users into thinking they are verifying their humanity. This social engineering tactic leverages the commonality of CAPTCHAs across the web, ensuring that the prompt does not raise suspicion.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features of the Fake CAPTCHA:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Visual Design: The prompt mimics legitimate CAPTCHA services with a polished design.&lt;/li&gt;
&lt;li&gt;Dynamic Behavior: Interaction with the prompt initiates the download of a malicious payload.&lt;/li&gt;
&lt;li&gt;Browser-Specific Hooks: The prompt may adapt based on the user’s browser or device to maximize compatibility.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Malware Delivery&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuc3ihv1difqp75c2qq2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhuc3ihv1difqp75c2qq2.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once the user interacts with the fake CAPTCHA, they unknowingly download a file masquerading as a harmless application. This file often comes in the form of:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compressed Archives: ZIP or RAR files containing executables.&lt;/li&gt;
&lt;li&gt;Installer Packages: Pretending to be software updates or necessary tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Technical Details of the Payload:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;File Name Patterns: Commonly uses generic or enticing names like update_tool.exe or captcha_check.exe.&lt;/li&gt;
&lt;li&gt;File Type: Executable files that appear benign but are embedded with malicious code.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Execution and Data Exfiltration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmgu4rtn4ydairyejcaac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmgu4rtn4ydairyejcaac.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Upon execution, the Lumma malware begins its primary operation: stealing sensitive information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Capabilities of Lumma Malware:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Credential Harvesting:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Steals login credentials stored in browsers.&lt;/li&gt;
&lt;li&gt;Targets email clients and FTP applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cryptocurrency Theft:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Monitors clipboard activity for wallet addresses.&lt;/li&gt;
&lt;li&gt;Replaces wallet addresses with those controlled by the attackers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;System Reconnaissance:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Gathers system information, including IP address and hardware details.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Exfiltration:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sends the stolen data to remote command-and-control (C2) servers via encrypted channels.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Detection and Mitigation
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8aikrnu7uzdye3sw1vi6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8aikrnu7uzdye3sw1vi6.png" alt="Image description" width="800" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to Identify the Threat&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Behavioral Indicators:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Unexpected CAPTCHA prompts on unrelated websites.&lt;/li&gt;
&lt;li&gt;Unfamiliar downloads triggered after interacting with web elements.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;File Analysis:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use antivirus tools to scan downloaded files, in this case we used &lt;a href="https://www.malwarebytes.com/" rel="noopener noreferrer"&gt;Malwarebytes&lt;/a&gt; to scan and detect the trojan agents and quarantine the infected file.&lt;/li&gt;
&lt;li&gt;Check for anomalous behavior during file execution, according to my friend he experienced an unexpected disruption in network connectivity making him unable to connect to the internet until he restarted his device.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  INCIDENT RESPONSE: What to Do When You've Downloaded the Lumma Malware?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhku5viubcm29pfemx0c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhku5viubcm29pfemx0c.png" alt="Image description" width="776" height="442"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you suspect that you've inadvertently downloaded the Lumma malware, it's crucial to act quickly and methodically to minimize the impact of the attack.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Here's my suggested step-by-step guide on how to proceed:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Backup All Important Files to the Cloud&lt;/strong&gt;&lt;br&gt;
If the malware contains ransomware or other destructive payloads, it may target and encrypt files on your local machine.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Upload important files, such as documents, photos, and other critical data, to a cloud storage service. This will allow you to restore your files later if they are compromised.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Change All Passwords on Social Media and Bank Accounts&lt;/strong&gt;&lt;br&gt;
Since Lumma malware is designed to harvest login credentials, it's critical to change the passwords for your social media, banking, and email accounts, &lt;strong&gt;especially if these passwords were saved in your browser.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use a different (like your smart phone with a sms MFA method), trusted device to change all of your passwords, ensuring that your current device (which may be compromised) cannot intercept these changes. Enable two-factor authentication (2FA) on all accounts where possible to add an extra layer of security.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Stay Calm and Composed&lt;/strong&gt;&lt;br&gt;
Panicking can cloud your judgment and lead to more mistakes. Handling the situation calmly will allow you to follow the necessary steps to contain the infection.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Focus on isolating the compromised device to prevent further spread of the malware. If you are not backing up your important local files, you should disconnect the infected device from the internet and any other devices it may be connected to such as external hard disk drives or flash drives (USB Drives).&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Reformat your device (if necessary)
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fachhe6tpkn92kfhk2994.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fachhe6tpkn92kfhk2994.png" alt="Image description" width="299" height="168"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If the malware remains persistent and cannot be removed, it may be necessary to wipe your system and perform a fresh installation of your operating system.&lt;/p&gt;

&lt;p&gt;In my suggestion to my friend, I advised him to let me reformat his laptop for added safety and peace of mind.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In the first step, in any events of security breaches always back up essential files (but avoid backing up any files that may be infected), then perform a factory reset or reinstall the operating system to ensure the malware is completely eradicated.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;How to reformat your device? *&lt;/em&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open Settings&lt;/li&gt;
&lt;li&gt;Select System&lt;/li&gt;
&lt;li&gt;Select Recovery&lt;/li&gt;
&lt;li&gt;Select Reset this PC&lt;/li&gt;
&lt;li&gt;Choose Remove everything to erase all data&lt;/li&gt;
&lt;li&gt;Select Change settings to clean the drive&lt;/li&gt;
&lt;li&gt;Turn on the Clean data and Download Windows options&lt;/li&gt;
&lt;li&gt;Click Confirm&lt;/li&gt;
&lt;li&gt;Click Reset to confirm the reset&lt;/li&gt;
&lt;li&gt;Follow the on-screen instructions&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Remember to back-up all of your important files before doing this.&lt;/p&gt;

&lt;h2&gt;
  
  
  Preventive Measures
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F29atv5akveu1xxlcz6t7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F29atv5akveu1xxlcz6t7.png" alt="Image description" width="381" height="132"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User Awareness:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Be cautious when encountering CAPTCHAs outside well-known platforms.&lt;/li&gt;
&lt;li&gt;Avoid downloading files unless absolutely certain of their source.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Technical Safeguards:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable browser extensions to block malicious scripts.&lt;/li&gt;
&lt;li&gt;Deploy endpoint protection solutions capable of detecting infostealers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Network Security:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Monitor network traffic for unusual patterns.&lt;/li&gt;
&lt;li&gt;Implement DNS filtering to block known malicious domains.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Regular Updates:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep browsers, plugins, and operating systems up to date.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Prevention is better than cure!
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;It is easier to prevent an attack while it's still outside of our system/environment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3yikc7t3ei9tijv0r1n9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3yikc7t3ei9tijv0r1n9.png" alt="Image description" width="800" height="536"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Lumma malware demonstrates how threat actors leverage seemingly benign elements, like CAPTCHA prompts, to execute sophisticated attacks.&lt;/p&gt;

&lt;p&gt;By understanding the tactics employed by such threats, users and organizations can strengthen their defenses against them. &lt;/p&gt;

&lt;p&gt;Prevention is always better than cure. Staying vigilant and proactive security measures and preparation can significantly reduce the likelihood of falling victim to such attacks. Regularly updating software, practicing safe browsing habits, and using comprehensive security solutions are key to protect your personal data and devices from novel threats.&lt;/p&gt;

&lt;p&gt;Stay vigilant and you may share this information to help protect others from falling victim to similar schemes.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>website</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Understanding Zero-Trust Architecture (ZTA)</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Sat, 07 Dec 2024 14:35:46 +0000</pubDate>
      <link>https://dev.to/asi_security/understanding-zero-trust-architecture-zta-4glf</link>
      <guid>https://dev.to/asi_security/understanding-zero-trust-architecture-zta-4glf</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftlwk6iygsi4jddef3qoh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftlwk6iygsi4jddef3qoh.png" alt="Image description" width="800" height="458"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In an era where cyber threats are becoming more sophisticated and pervasive, traditional security models that rely on perimeter defenses are proving insufficient. Enter Zero-Trust Architecture (ZTA) – a transformative approach to cybersecurity that challenges the traditional "trust but verify" model with a new mantra: "never trust, always verify."&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Zero-Trust Architecture?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pekh0b3qc7hfqe14erx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0pekh0b3qc7hfqe14erx.png" alt="Image description" width="600" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Zero-Trust Architecture is a security framework that assumes all users, devices, and network components are untrusted until their legitimacy is explicitly verified. This paradigm is built on the principle of "least privilege," ensuring access is granted only to resources necessary for a specific task. By adopting ZTA, organizations can significantly reduce their attack surface and improve their resilience against breaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  Core Principles of Zero-Trust Architecture
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Verify Explicitly&lt;/strong&gt;:&lt;br&gt;
Every access request must be authenticated and authorized based on all available data points, such as user identity, device status, and geolocation. Multi-Factor Authentication (MFA) is a cornerstone of this principle.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Least Privilege Access&lt;/strong&gt;:&lt;br&gt;
Users and devices are granted only the permissions required for their tasks. This minimizes the potential damage of compromised credentials or insider threats.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Assume Breach&lt;/strong&gt;:&lt;br&gt;
Operate as if the network has already been compromised. By implementing segmentation and continuous monitoring, organizations can contain threats and limit lateral movement.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Key Components of Zero-Trust Architecture
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Identity and Access Management (IAM)&lt;/strong&gt;:&lt;br&gt;
Robust IAM systems ensure that only authenticated users and devices can access sensitive resources. Integrating single sign-on (SSO) and MFA enhances security while maintaining usability.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Endpoint Security&lt;/strong&gt;:&lt;br&gt;
Devices accessing the network must meet specific security standards. This includes ensuring up-to-date software, encryption, and compliance with security policies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Network Segmentation&lt;/strong&gt;:&lt;br&gt;
Micro-segmentation creates isolated zones within the network, limiting attackers’ ability to move freely if they gain access.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Continuous Monitoring and Analytics&lt;/strong&gt;:&lt;br&gt;
By leveraging AI and machine learning, organizations can detect anomalies in real time and respond to potential threats swiftly.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Security&lt;/strong&gt;:&lt;br&gt;
Encryption, tokenization, and strict access controls protect sensitive information both in transit and at rest.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  JSON Configuration Example for Zero-Trust Policies
&lt;/h2&gt;

&lt;p&gt;Here is an example JSON configuration for implementing Zero-Trust access policies:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight json"&gt;&lt;code&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="nl"&gt;"policies"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"policy-001"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"description"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Verify user identity with MFA"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"rules"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"require_mfa"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"conditions"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"user_role"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"employee"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"location"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"remote"&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"id"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"policy-002"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"description"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"Restrict access to sensitive data"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="nl"&gt;"rules"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"action"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"deny_access"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="nl"&gt;"conditions"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="w"&gt;
            &lt;/span&gt;&lt;span class="nl"&gt;"device_compliance"&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="w"&gt; &lt;/span&gt;&lt;span class="s2"&gt;"non_compliant"&lt;/span&gt;&lt;span class="w"&gt;
          &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
        &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
      &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
    &lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
  &lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="w"&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  YAML Configuration Example for Network Segmentation
&lt;/h2&gt;

&lt;p&gt;Below is an example YAML configuration for micro-segmentation in a Zero-Trust framework:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;segments&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Finance"&lt;/span&gt;
    &lt;span class="na"&gt;resources&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;database&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;finance-db"&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;application&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;payroll"&lt;/span&gt;
    &lt;span class="na"&gt;access&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;user_role&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;finance_manager"&lt;/span&gt;
        &lt;span class="na"&gt;actions&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;read"&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;write"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;user_role&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;employee"&lt;/span&gt;
        &lt;span class="na"&gt;actions&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;read"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;

  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Engineering"&lt;/span&gt;
    &lt;span class="na"&gt;resources&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;database&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;engineering-db"&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;application&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;source_control"&lt;/span&gt;
    &lt;span class="na"&gt;access&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;user_role&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;engineer"&lt;/span&gt;
        &lt;span class="na"&gt;actions&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;read"&lt;/span&gt;&lt;span class="pi"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;write"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;user_role&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;intern"&lt;/span&gt;
        &lt;span class="na"&gt;actions&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;read"&lt;/span&gt;&lt;span class="pi"&gt;]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Implementing Zero-Trust Architecture
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgamug5mlgz1wre8n1ws9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgamug5mlgz1wre8n1ws9.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Adopting ZTA requires a phased and strategic approach. Here’s a roadmap:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Assess Your Current Environment&lt;/strong&gt;:&lt;br&gt;
Conduct a thorough audit of your network, devices, and access controls to identify vulnerabilities.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Define Policies&lt;/strong&gt;:&lt;br&gt;
Establish clear access policies based on user roles, device types, and sensitivity of resources.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Deploy Tools and Technologies&lt;/strong&gt;:&lt;br&gt;
Invest in solutions that align with ZTA principles, such as IAM platforms, endpoint detection and response (EDR) systems, and network segmentation tools.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Monitor and Adapt&lt;/strong&gt;:&lt;br&gt;
Continuously monitor network traffic, user behavior, and device compliance to adapt to evolving threats.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Educate and Train&lt;/strong&gt;:&lt;br&gt;
Ensure that employees and stakeholders understand ZTA principles and their role in maintaining security.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Benefits of Zero-Trust Architecture
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Security&lt;/strong&gt;: By eliminating implicit trust, ZTA reduces the risk of unauthorized access and data breaches.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Regulatory Compliance&lt;/strong&gt;: Many data protection regulations, such as GDPR and CCPA, align with ZTA principles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved Visibility&lt;/strong&gt;: Continuous monitoring provides real-time insights into network activity and potential threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resilience to Modern Threats&lt;/strong&gt;: ZTA effectively counters advanced persistent threats (APTs), ransomware, and insider attacks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Challenges and Considerations
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxc8rlq6chxsnadu3dnx0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxc8rlq6chxsnadu3dnx0.png" alt="Image description" width="800" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While ZTA offers significant advantages, implementing it is not without challenges:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Complexity&lt;/strong&gt;: Transitioning to ZTA involves reconfiguring legacy systems and processes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost&lt;/strong&gt;: The initial investment in new tools and training can be substantial.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cultural Resistance&lt;/strong&gt;: Organizations must address resistance to change among employees and stakeholders.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As organizations continue to embrace digital transformation, the adoption of Zero-Trust Architecture is expected to accelerate. Cloud computing, remote work, and the Internet of Things (IoT) highlight the need for a robust and adaptive security framework like ZTA. Emerging technologies such as Secure Access Service Edge (SASE) and AI-driven threat intelligence will further enhance ZTA’s capabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Embrace!
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0uzm8y51imwvs69e190y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0uzm8y51imwvs69e190y.png" alt="Image description" width="800" height="478"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Zero-Trust Architecture represents a critical evolution in cybersecurity. By shifting away from implicit trust and implementing granular access controls, organizations can proactively address the dynamic and sophisticated threat landscape. While the journey to ZTA may be challenging, the long-term benefits in terms of security, compliance, and operational efficiency make it a worthwhile investment.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>architecture</category>
      <category>cloud</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Automating Infrastructure Deployment for CI/CD Pipelines Using Terraform</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Tue, 03 Dec 2024 14:52:45 +0000</pubDate>
      <link>https://dev.to/asi_security/automating-infrastructure-deployment-for-cicd-pipelines-using-terraform-5f9p</link>
      <guid>https://dev.to/asi_security/automating-infrastructure-deployment-for-cicd-pipelines-using-terraform-5f9p</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5bqv1xagpk517pvo39f1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5bqv1xagpk517pvo39f1.png" alt="Image description" width="800" height="336"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Modern software development heavily relies on continuous integration and continuous delivery (CI/CD) pipelines to streamline deployments. Infrastructure as Code (IaC) tools like &lt;strong&gt;Terraform&lt;/strong&gt; play a critical role in automating the provisioning and management of infrastructure resources for these pipelines. In this blog, we will explore how Terraform simplifies infrastructure deployment for CI/CD pipelines, guide you through setting up Terraform, and demonstrate a simple implementation example.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Automate Infrastructure Deployment in CI/CD?
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuhdqtaio1343ewm6u7c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvuhdqtaio1343ewm6u7c.png" alt="Image description" width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Automating infrastructure provisioning as part of CI/CD pipelines ensures:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Consistency&lt;/strong&gt;: Resources are created and managed in a repeatable manner.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Efficiency&lt;/strong&gt;: Reduces manual effort and speeds up pipeline execution.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scalability&lt;/strong&gt;: Easily scales infrastructure as application demands grow.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Version Control&lt;/strong&gt;: Enables tracking and rollback of infrastructure changes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost Optimization&lt;/strong&gt;: Automates resource cleanup post-deployment or testing.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Setting Up Terraform
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa5hw4rd27wd8ep03ue9p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa5hw4rd27wd8ep03ue9p.png" alt="Image description" width="800" height="289"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To use Terraform in your CI/CD workflows, you must first set up the tool on your local machine or pipeline environment. Follow these steps:&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 1: Install Terraform
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Download Terraform&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Visit the &lt;a href="https://www.terraform.io/downloads" rel="noopener noreferrer"&gt;official Terraform website&lt;/a&gt; and download the appropriate binary for your operating system.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Install Terraform&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Linux/macOS&lt;/strong&gt;:
Extract the binary and move it to a directory in your &lt;code&gt;PATH&lt;/code&gt;. For example:
&lt;/li&gt;
&lt;/ul&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt; unzip terraform_&amp;lt;version&amp;gt;_linux_amd64.zip
 &lt;span class="nb"&gt;sudo mv &lt;/span&gt;terraform /usr/local/bin/
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Windows&lt;/strong&gt;:
 Extract the binary and add the directory to your system's &lt;code&gt;PATH&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Verify Installation&lt;/strong&gt;:
Run the following command to confirm Terraform is installed:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   terraform &lt;span class="nt"&gt;--version&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  Step 2: Configure a Cloud Provider
&lt;/h3&gt;

&lt;p&gt;Terraform needs credentials to interact with cloud providers. For example, if using AWS:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Install AWS CLI&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Follow the &lt;a href="https://aws.amazon.com/cli/" rel="noopener noreferrer"&gt;AWS CLI installation guide&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Set Up AWS Credentials&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Run the following command and provide your AWS access key and secret key:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   aws configure
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Verify Access&lt;/strong&gt;:
Confirm that the credentials are working by running:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   aws s3 &lt;span class="nb"&gt;ls&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  Step 3: Initialize a Terraform Project
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Create a Project Directory&lt;/strong&gt;:
Organize your Terraform configurations in a dedicated directory:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   &lt;span class="nb"&gt;mkdir &lt;/span&gt;terraform-project
   &lt;span class="nb"&gt;cd &lt;/span&gt;terraform-project
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Write a Configuration File&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Create a &lt;code&gt;main.tf&lt;/code&gt; file to define the resources (an example is provided later).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Initialize Terraform&lt;/strong&gt;:&lt;br&gt;&lt;br&gt;
Run the following command to download provider plugins and prepare the working directory:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   terraform init
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Sample Use Case: Deploying Infrastructure for a Web Application
&lt;/h2&gt;

&lt;p&gt;Imagine a simple scenario where a CI/CD pipeline needs to provision:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A virtual machine for running the application.&lt;/li&gt;
&lt;li&gt;A load balancer to manage traffic.&lt;/li&gt;
&lt;li&gt;A database instance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We’ll use Terraform to automate this.&lt;/p&gt;




&lt;h3&gt;
  
  
  Step 1: Prepare Terraform Configuration Files
&lt;/h3&gt;

&lt;h4&gt;
  
  
  &lt;code&gt;main.tf&lt;/code&gt;
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight hcl"&gt;&lt;code&gt;&lt;span class="nx"&gt;provider&lt;/span&gt; &lt;span class="s2"&gt;"aws"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;region&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"us-east-1"&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="nx"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_instance"&lt;/span&gt; &lt;span class="s2"&gt;"app_server"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;ami&lt;/span&gt;           &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"ami-0c02fb55956c7d316"&lt;/span&gt; &lt;span class="c1"&gt;# Example AMI ID&lt;/span&gt;
  &lt;span class="nx"&gt;instance_type&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"t2.micro"&lt;/span&gt;
  &lt;span class="nx"&gt;tags&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;Name&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"AppServer"&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="nx"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_elb"&lt;/span&gt; &lt;span class="s2"&gt;"app_lb"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;name&lt;/span&gt;               &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"app-lb"&lt;/span&gt;
  &lt;span class="nx"&gt;availability_zones&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"us-east-1a"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="s2"&gt;"us-east-1b"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;

  &lt;span class="nx"&gt;listener&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;instance_port&lt;/span&gt;     &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;80&lt;/span&gt;
    &lt;span class="nx"&gt;instance_protocol&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"HTTP"&lt;/span&gt;
    &lt;span class="nx"&gt;lb_port&lt;/span&gt;           &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;80&lt;/span&gt;
    &lt;span class="nx"&gt;lb_protocol&lt;/span&gt;       &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"HTTP"&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;

  &lt;span class="nx"&gt;health_check&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;target&lt;/span&gt;              &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"HTTP:80/"&lt;/span&gt;
    &lt;span class="nx"&gt;interval&lt;/span&gt;            &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;30&lt;/span&gt;
    &lt;span class="nx"&gt;timeout&lt;/span&gt;             &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;5&lt;/span&gt;
    &lt;span class="nx"&gt;healthy_threshold&lt;/span&gt;   &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;
    &lt;span class="nx"&gt;unhealthy_threshold&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;

  &lt;span class="nx"&gt;instances&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;aws_instance&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;app_server&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;id&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="nx"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_db_instance"&lt;/span&gt; &lt;span class="s2"&gt;"app_db"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;identifier&lt;/span&gt;            &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"app-db"&lt;/span&gt;
  &lt;span class="nx"&gt;engine&lt;/span&gt;                &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"mysql"&lt;/span&gt;
  &lt;span class="nx"&gt;instance_class&lt;/span&gt;        &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"db.t2.micro"&lt;/span&gt;
  &lt;span class="nx"&gt;allocated_storage&lt;/span&gt;     &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;20&lt;/span&gt;
  &lt;span class="nx"&gt;name&lt;/span&gt;                  &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"appdb"&lt;/span&gt;
  &lt;span class="nx"&gt;username&lt;/span&gt;              &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"admin"&lt;/span&gt;
  &lt;span class="nx"&gt;password&lt;/span&gt;              &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"password"&lt;/span&gt;
  &lt;span class="nx"&gt;publicly_accessible&lt;/span&gt;   &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;
  &lt;span class="nx"&gt;skip_final_snapshot&lt;/span&gt;   &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="kc"&gt;true&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  Step 2: Integrate Terraform with a CI/CD Pipeline
&lt;/h3&gt;

&lt;p&gt;Most CI/CD tools (e.g., GitHub Actions, Jenkins, GitLab CI/CD) support Terraform. Here’s how to integrate Terraform with &lt;strong&gt;GitHub Actions&lt;/strong&gt;.&lt;/p&gt;

&lt;h4&gt;
  
  
  GitHub Actions Workflow File: &lt;code&gt;.github/workflows/terraform.yml&lt;/code&gt;
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Terraform Deployment&lt;/span&gt;

&lt;span class="na"&gt;on&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;push&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;branches&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;main&lt;/span&gt;

&lt;span class="na"&gt;jobs&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;terraform&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;runs-on&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;ubuntu-latest&lt;/span&gt;

    &lt;span class="na"&gt;steps&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Checkout Code&lt;/span&gt;
        &lt;span class="na"&gt;uses&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;actions/checkout@v3&lt;/span&gt;

      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Setup Terraform&lt;/span&gt;
        &lt;span class="na"&gt;uses&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;hashicorp/setup-terraform@v2&lt;/span&gt;
        &lt;span class="na"&gt;with&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
          &lt;span class="na"&gt;terraform_version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;1.5.0&lt;/span&gt;

      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Terraform Init&lt;/span&gt;
        &lt;span class="na"&gt;run&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;terraform init&lt;/span&gt;

      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Terraform Plan&lt;/span&gt;
        &lt;span class="na"&gt;run&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;terraform plan&lt;/span&gt;

      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Terraform Apply&lt;/span&gt;
        &lt;span class="na"&gt;run&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;terraform apply -auto-approve&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h3&gt;
  
  
  Step 3: Execute the Pipeline
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Push your Terraform configurations and GitHub Actions workflow to your repository.&lt;/li&gt;
&lt;li&gt;Upon pushing changes to the &lt;code&gt;main&lt;/code&gt; branch, the GitHub Actions pipeline will:

&lt;ul&gt;
&lt;li&gt;Initialize Terraform.&lt;/li&gt;
&lt;li&gt;Generate and display the execution plan.&lt;/li&gt;
&lt;li&gt;Apply the configurations to provision resources.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  Key Considerations for CI/CD Automation
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdcmbpeyj1oqbbyzmiv4s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdcmbpeyj1oqbbyzmiv4s.png" alt="Image description" width="800" height="412"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;State Management&lt;/strong&gt;: Use remote backends (e.g., AWS S3) to store Terraform state securely and enable collaboration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Secrets Handling&lt;/strong&gt;: Manage sensitive data (e.g., database credentials) securely using tools like AWS Secrets Manager or HashiCorp Vault.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rollback Strategy&lt;/strong&gt;: Automate resource cleanup in case of pipeline failures to minimize costs and maintain resource hygiene.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Testing&lt;/strong&gt;: Incorporate automated testing tools like Terratest to validate infrastructure deployments.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Goodluck!
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdpjr95nmqb87rb73m9m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffdpjr95nmqb87rb73m9m.png" alt="Image description" width="800" height="362"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Setting up and using Terraform in CI/CD pipelines automates infrastructure provisioning, ensuring faster, consistent, and reliable deployments. By defining infrastructure as code, teams can focus on delivering high-quality applications without manual setup overhead.&lt;/p&gt;

&lt;p&gt;Terraform’s versatility and wide cloud provider support make it a powerful tool for modern DevOps workflows. Start small by automating one piece of your infrastructure and scale gradually as you refine your pipeline processes.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Have questions or insights about Terraform in CI/CD? Let’s discuss in the comments!&lt;/em&gt;&lt;/p&gt;

</description>
      <category>terraform</category>
      <category>aws</category>
      <category>automation</category>
      <category>cicd</category>
    </item>
    <item>
      <title>Creating a Simple a Virus using Python</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Sat, 30 Nov 2024 17:15:00 +0000</pubDate>
      <link>https://dev.to/asi_security/creating-a-simple-a-virus-using-python-4e3n</link>
      <guid>https://dev.to/asi_security/creating-a-simple-a-virus-using-python-4e3n</guid>
      <description>&lt;h4&gt;
  
  
  &lt;strong&gt;Legal and Ethical Use&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;This script is provided for educational purposes only and should not be used to harm systems or coerce individuals. Misuse of this code could result in legal consequences.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp42cohrpqu7t4owca4yv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp42cohrpqu7t4owca4yv.png" alt="Image description" width="626" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Imagine this scenario:&lt;/strong&gt; You’re working late, focused on a critical task, and suddenly, your browsers close, a cryptic pop-up appears on your screen, and a suspicious webpage opens, urging you to make a purchase. Panic sets in as you wonder what just happened.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flqjg7o7h1yu4o1t5cccm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flqjg7o7h1yu4o1t5cccm.png" alt="Image description" width="440" height="342"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This script demonstrates how easily such disruptions can be engineered using everyday programming tools. It serves as a cautionary tale, reminding us of the importance of cybersecurity, ethical programming practices, and the responsibility developers hold in safeguarding digital environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Through this analysis, we aim to understand the mechanics behind the code, not to encourage harm but to foster awareness of how vulnerabilities can be exploited—and how they can be prevented&lt;/strong&gt;. As with any powerful tool, programming demands ethical stewardship to harness its potential for good.&lt;/p&gt;

&lt;p&gt;Now, let’s examine how this script operates and how its techniques might be repurposed for positive applications in cybersecurity and system management.&lt;/p&gt;




&lt;p&gt;This Python script combines system commands, GUI pop-ups, and web interactions to simulate malicious behavior. &lt;/p&gt;

&lt;p&gt;You may access the code of the virus on my GitHub repo: &lt;br&gt;
&lt;a href="https://github.com/asiguiang/Creating-Simple-Virus/blob/main/SimpleEthicalVirus.py" rel="noopener noreferrer"&gt;https://github.com/asiguiang/Creating-Simple-Virus/blob/main/SimpleEthicalVirus.py&lt;/a&gt;&lt;/p&gt;




&lt;h4&gt;
  
  
  &lt;strong&gt;Overview&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;This script is an educational example of how Python can be used for potentially malicious purposes, like disrupting system activity, displaying warnings, and opening URLs. It demonstrates methods to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Interact with system processes.&lt;/li&gt;
&lt;li&gt;Create pop-ups with urgent messages.&lt;/li&gt;
&lt;li&gt;Open web links automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Dependencies&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Python 3.x&lt;/li&gt;
&lt;li&gt;Libraries: &lt;code&gt;webbrowser&lt;/code&gt;, &lt;code&gt;os&lt;/code&gt;, &lt;code&gt;platform&lt;/code&gt;, &lt;code&gt;ctypes&lt;/code&gt;, &lt;code&gt;tkinter&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd3ffaiu2ab3kvg5b10y9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd3ffaiu2ab3kvg5b10y9.png" alt="Image description" width="623" height="151"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Functions&lt;/strong&gt;
&lt;/h4&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Function&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;close_other_browsers&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Closes active browser processes based on the operating system.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;show_popup&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Displays a pop-up dialog box with a message using &lt;code&gt;tkinter&lt;/code&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;code&gt;open_website&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;Opens a specific URL in the user's default web browser using &lt;code&gt;webbrowser.open()&lt;/code&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Platforms Supported&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Linux&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;macOS (Darwin)&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Security Concerns&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Disruption&lt;/strong&gt;: Terminates browser processes, which can result in loss of unsaved data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Psychological Impact&lt;/strong&gt;: Displays a fear-inducing pop-up.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Coercion&lt;/strong&gt;: Opens a webpage that might attempt to scam the user.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Execution Flow&lt;/strong&gt;
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;code&gt;close_other_browsers()&lt;/code&gt;:

&lt;ul&gt;
&lt;li&gt;Detect the operating system.&lt;/li&gt;
&lt;li&gt;Close browser processes.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;open_pup_website()&lt;/code&gt;:

&lt;ul&gt;
&lt;li&gt;Open the specified URL.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;show_popup()&lt;/code&gt;:

&lt;ul&gt;
&lt;li&gt;Display the threatening message.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Improvements for Educational Value&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Replace malicious elements with benign actions to teach functionality safely.

&lt;ul&gt;
&lt;li&gt;Example: Use a harmless pop-up message like "System Check Complete."&lt;/li&gt;
&lt;li&gt;Redirect to a safe webpage instead of a suspicious link.&lt;/li&gt;
&lt;li&gt;Demonstrate proper browser process handling for managing application resources.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Code Explanation&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Imports&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;webbrowser&lt;/code&gt;&lt;/strong&gt;: Used to open a web page in the default web browser.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;os&lt;/code&gt;&lt;/strong&gt;: Provides a way to interact with the operating system for task and process management.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;platform&lt;/code&gt;&lt;/strong&gt;: Determines the current operating system.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;ctypes&lt;/code&gt;&lt;/strong&gt;: Enables low-level Windows system calls (not explicitly used here but potentially for further malicious behavior).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;tkinter&lt;/code&gt;&lt;/strong&gt;: Creates GUI elements, specifically the pop-up message.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2exzmy9fag8tq8p4fa9l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2exzmy9fag8tq8p4fa9l.png" alt="Image description" width="623" height="151"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Functions&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;close_other_browsers()&lt;/code&gt;&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Detects the operating system using &lt;code&gt;platform.system()&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;On Windows:&lt;/li&gt;
&lt;li&gt;Uses &lt;code&gt;taskkill&lt;/code&gt; to terminate browsers: Chrome, Firefox, and Edge.&lt;/li&gt;
&lt;li&gt;On Linux:&lt;/li&gt;
&lt;li&gt;Uses &lt;code&gt;pkill&lt;/code&gt; to terminate browser processes.&lt;/li&gt;
&lt;li&gt;On macOS (Darwin):&lt;/li&gt;
&lt;li&gt;Uses &lt;code&gt;pkill&lt;/code&gt; to terminate Safari processes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Effect&lt;/strong&gt;: Disrupts user browsing activity.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;show_popup()&lt;/code&gt;&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Creates a pop-up window using &lt;code&gt;tkinter&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Displays a threatening message ("YOU HAVE BEEN HACKED, 36 HOURS LEFT! BUY NOW!") in a dialog box.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;open_pup_website()&lt;/code&gt;&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;Opens a provided URL in the default browser using &lt;code&gt;webbrowser.open()&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;URL is a link to a supposed antivirus purchase page.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Main Functionality&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Executes the functions sequentially:

&lt;ol&gt;
&lt;li&gt;Closes browser processes.&lt;/li&gt;
&lt;li&gt;Opens the specified website.&lt;/li&gt;
&lt;li&gt;Shows the threatening pop-up.&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonqixcprein388dkhwdd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fonqixcprein388dkhwdd.png" alt="Image description" width="800" height="343"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Purpose&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;The script simulates ransomware-like behavior by disrupting browsing, coercing a purchase, and presenting an alarming message. It may be designed to force users into purchasing a product or falling victim to a scam.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Disclaimer&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The script simulates malicious activity and should only be used in a controlled environment for learning purposes. Any unauthorized use on third-party systems is unethical and potentially illegal.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Isaeus "Asi" Guiang&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community.&lt;/p&gt;

&lt;p&gt;Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;/p&gt;

&lt;p&gt;Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>python</category>
      <category>cybersecurity</category>
      <category>automation</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Leadership Fatigue and Burnout</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Tue, 19 Nov 2024 00:03:37 +0000</pubDate>
      <link>https://dev.to/asi_security/leadership-fatigue-and-burnout-1j0m</link>
      <guid>https://dev.to/asi_security/leadership-fatigue-and-burnout-1j0m</guid>
      <description>&lt;p&gt;&lt;strong&gt;Remember: Leadership isn’t just about driving change—it’s about sustaining it, starting with yourself.&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgw8oxx5sdrjej8zskzao.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgw8oxx5sdrjej8zskzao.png" alt="Image description" width="800" height="409"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When I started being a student-leader back in high school, I adopted what I called the "&lt;em&gt;Lone-Wolf&lt;/em&gt;" Mentality. I made executions solely on my shoulders, and I often struggled to delegate tasks, thinking I could do everything myself. &lt;/p&gt;

&lt;p&gt;Years have passed, and through my active involvement in the Amazon Web Services (AWS) User Groups realm and managing AWS Cloud Club Philippines since 2023, &lt;strong&gt;I’ve come to realize the toll this mentality has taken on me. This mindset cost me mental, emotional, and physical fatigue&lt;/strong&gt;, as I constantly pushed myself to meet every expectation without relying on others. The pressure to perform at such a relentless pace began to chip away at my well-being.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I had to unlearn these habits and reframe my approach to leadership.&lt;/strong&gt; Being part of AWS User Groups has shown me the power of collaboration, trust, and empowering others. Leadership isn’t about carrying the burden alone—it’s about fostering teamwork, building trust, and cultivating a shared sense of responsibility.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The journey hasn’t been easy since I need to re-program my years of system and practice ever since high school, but it’s been transformative. Learning to delegate, trust my team, and focus on contrast and balance has not only made me a better leader but also a healthier person.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this blog post, I share more about one of the leadership roles I have, the risks of burnout, and how I’ve learned to find balance and sustainability in my leadership style!&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Mental Fatigue leads to Leadership Burnouts&lt;/strong&gt;
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Fatigue is the price of Leadership, Mediocrity is the price of never getting tired.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fybbaeah8trmbyf4bvmrb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fybbaeah8trmbyf4bvmrb.png" alt="Image description" width="800" height="458"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As a &lt;strong&gt;Regional Captain&lt;/strong&gt; in a vibrant and fast-paced community like AWS Cloud Club, I’ve experienced firsthand how leadership demands can push boundaries. Being a Regional Captain is not just a local role—it’s a &lt;strong&gt;country-level responsibility&lt;/strong&gt;. The scope of the position is vast, with the weight of leading an entire region, which often encompasses multiple cities or provinces, or the entire nation. We strive to inspire, innovate, and lead by example—but sometimes, &lt;strong&gt;even the most passionate leaders face burnout&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Burnout isn’t a sign of weakness&lt;/strong&gt;; &lt;em&gt;it’s a reminder that we are human&lt;/em&gt;. Leading effectively requires not just dedication but also balance and self-care. Here’s how I manage to avoid burnout while navigating the responsibilities of leadership.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;A Day in the Life of a Regional Captain&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhg1xzf561c7q29h0gna5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhg1xzf561c7q29h0gna5.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Being a Regional Captain is both an honor and a challenge. It’s a dynamic role that requires juggling multiple responsibilities while keeping the bigger picture in mind.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Core Responsibilities of a Regional Captain:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Community Building:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Supporting local AWS Cloud Clubs and their leaders.
&lt;/li&gt;
&lt;li&gt;Guiding new captains to set up, grow, and sustain their communities.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Event Management:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Organizing large-scale events like hackathons, boot camps, and tech summits.
&lt;/li&gt;
&lt;li&gt;Coordinating with sponsors, speakers, and volunteers to ensure seamless execution.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Leadership and Mentorship:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Providing mentorship to students and budding professionals in tech.
&lt;/li&gt;
&lt;li&gt;Offering guidance to captains on navigating challenges in their communities.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Partnerships and Collaboration:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Building relationships with industry partners, educators, and organizations.
&lt;/li&gt;
&lt;li&gt;Aligning initiatives with AWS’s broader mission to empower learners globally.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Advocacy:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Representing the region in global forums.
&lt;/li&gt;
&lt;li&gt;Advocating for technological innovation and democratizing access to AWS resources.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Operational Duties:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Managing budgets, event logistics, and reporting outcomes to AWS leadership.
&lt;/li&gt;
&lt;li&gt;Balancing technical involvement with administrative tasks.
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;This role isn’t a typical 9-to-5—it’s dynamic, evolving, and often unpredictable. From addressing last-minute logistical issues to inspiring teams at events, no two days are the same.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;The Challenge of Balancing Responsibilities&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs861y4b3ie3svbnawa8t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs861y4b3ie3svbnawa8t.png" alt="Image description" width="728" height="547"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With so much on the plate, it’s easy for a Regional Captain(me) to feel overwhelmed. The role demands:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Multi-tasking:&lt;/strong&gt; Managing projects across different communities.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;High adaptability:&lt;/strong&gt; Responding to unexpected hurdles and shifting priorities.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Constant availability:&lt;/strong&gt; Being accessible to captains, teams, and partners alike.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;But these challenges also bring opportunities to grow as a leader, problem-solver, and mentor.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;1. Recognize the Signs of Burnout&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbupbgkk3v68pt468fd9t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbupbgkk3v68pt468fd9t.png" alt="Image description" width="800" height="454"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Burnout doesn’t happen overnight; it’s a gradual process with warning signs. Look out for:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Chronic fatigue:&lt;/strong&gt; Feeling exhausted even after resting.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Loss of enthusiasm:&lt;/strong&gt; A decline in motivation or interest in previously exciting tasks.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Emotional detachment:&lt;/strong&gt; Feeling disconnected from your team or projects.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Decreased productivity:&lt;/strong&gt; Struggling to focus or complete tasks efficiently.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Acknowledging these signs early can help you address burnout before it worsens.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;2. Set Boundaries&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fodew3l7tj73zjtxxzuzv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fodew3l7tj73zjtxxzuzv.png" alt="Image description" width="800" height="418"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Leadership often involves juggling multiple roles, but it’s essential to draw the line.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Define work hours:&lt;/strong&gt; Avoid working late into the night unless absolutely necessary.  (ALSO A HYPOCRITE ADVICEEEE! LOL, writing this blog at 4 AM, trust me im working on it.)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Learn to say no:&lt;/strong&gt; Taking on too much dilutes your focus and effectiveness.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Delegate:&lt;/strong&gt; Empower your team members to take ownership of tasks—they’ll grow, and you’ll gain breathing room.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By setting boundaries, you safeguard your energy for meaningful contributions.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;3. Prioritize Self-Care&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fexx1uo6qpmgk5jifrmti.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fexx1uo6qpmgk5jifrmti.png" alt="Image description" width="800" height="535"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Leadership starts with taking care of yourself. Build habits that nurture your well-being:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Get enough sleep:&lt;/strong&gt; Aim for 7-9 hours of quality rest every night.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exercise regularly:&lt;/strong&gt; Physical activity boosts energy levels and reduces stress.  #FunFact: I Jog!&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Practice mindfulness:&lt;/strong&gt; Techniques like meditation or journaling can help you process emotions and stay grounded.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Eat healthily:&lt;/strong&gt; Nutrition directly affects energy and mood—avoid skipping meals or relying on caffeine. (this is a hypocrite advice but i am working on this!) &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Remember, self-care is not indulgence; it’s maintenance.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;4. Cultivate a Support Network&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7rb672lpiwfa6hatyva5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7rb672lpiwfa6hatyva5.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Leadership can feel lonely at times, but it doesn’t have to be.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Connect with peers:&lt;/strong&gt; Share experiences and challenges with fellow leaders.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Seek mentorship:&lt;/strong&gt; A mentor can offer valuable advice and perspective.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lean on your team:&lt;/strong&gt; Trust your community to provide support and feedback. (i love my team so much)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Having a trusted network ensures you’re not carrying the weight of leadership alone.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;5. Celebrate Small Wins&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi9t63gpgpt61rw8lceev.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi9t63gpgpt61rw8lceev.png" alt="Image description" width="800" height="804"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the rush of achieving big goals, we often overlook the smaller victories.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Recognize individual and team accomplishments.
&lt;/li&gt;
&lt;li&gt;Reflect on how far you’ve come, even when the journey ahead feels overwhelming.
&lt;/li&gt;
&lt;li&gt;Use milestones as moments to recharge and reconnect with your “why.”
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Celebrating wins—big or small—helps maintain momentum and fosters positivity.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;6. Learn to Disconnect&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6jtph5l9aqxhp8abwcgs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6jtph5l9aqxhp8abwcgs.png" alt="Image description" width="800" height="799"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sometimes, the best way to reconnect with your passion is to step away temporarily.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Schedule downtime:&lt;/strong&gt; Block off time for hobbies, family, or simply unwinding.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unplug from tech:&lt;/strong&gt; Take breaks from emails and notifications to recharge mentally.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Take vacations:&lt;/strong&gt; A change of scenery can help reset your perspective.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Regular breaks ensure you return to your role refreshed and ready to lead.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;7. Focus on Purpose&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F54bjkj5dakqr1uwad0gq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F54bjkj5dakqr1uwad0gq.png" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When burnout looms, reconnect with your purpose.  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why did you take on this leadership role?
&lt;/li&gt;
&lt;li&gt;How has your work impacted others positively?
&lt;/li&gt;
&lt;li&gt;What vision keeps you motivated?
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Aligning with your core values and goals reignites passion and pushes back against fatigue.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Final Thoughts&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabesfq028nsl5c7b9tq2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fabesfq028nsl5c7b9tq2.png" alt="Image description" width="600" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;As leaders, we often prioritize others over ourselves.&lt;/strong&gt; But to inspire and guide effectively, we must first ensure our own well-being. By recognizing the signs of burnout, setting boundaries, practicing self-care, and leaning on a support network, you can lead with energy and enthusiasm.  &lt;/p&gt;

&lt;p&gt;Leadership is a marathon, not a sprint. Pace yourself, embrace the journey, and remember: resilience is not about avoiding stress but learning how to thrive amidst it. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We need to learn how to dance in the midst of the rain, because life is not about waiting for the storm to pass.&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Being a Regional Captain position means embracing challenges with a clear purpose. You’re not just managing events or mentoring leaders—you’re shaping the future of tech communities in your region. But to be the best leader for others, you need to prioritize your own well-being.&lt;br&gt;
Burnout isn’t the end of the road; it’s a reminder to recalibrate. By balancing responsibilities with self-care and seeking support when needed, you can lead with energy and enthusiasm while inspiring others to do the same.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let’s lead sustainably—because our communities deserve leaders who are both passionate and present.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Take care of yourself, so you can take care of your team.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Awesome thanks to my partner in tech and considered my best friend in college for support me and reviewing this blog &lt;strong&gt;Mark Achiles Flores Jr&lt;/strong&gt;! &lt;/p&gt;

&lt;p&gt;Finally to my constant mentors who enabled me to do balance in my career and nurtured me in the process: &lt;strong&gt;Raphael Justin Jambalos, Raphael Francis Quisumbing, and Joshua Arvin Lat!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About the Author:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Isaeus "Asi" Guiang&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community.&lt;/p&gt;

&lt;p&gt;Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;/p&gt;

&lt;p&gt;Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>learning</category>
      <category>leadership</category>
      <category>student</category>
      <category>recovery</category>
    </item>
    <item>
      <title>Introduction to Chaos Engineering and LitmusChaos</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Mon, 18 Nov 2024 22:54:11 +0000</pubDate>
      <link>https://dev.to/asi_security/introduction-to-chaos-engineering-and-litmuschaos-2non</link>
      <guid>https://dev.to/asi_security/introduction-to-chaos-engineering-and-litmuschaos-2non</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fizd1rxytitvo28j8c5bz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fizd1rxytitvo28j8c5bz.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Chaos isn’t a pit. Chaos is a ladder.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Like winter, you knew this was coming. This signature quotation from Littlefinger in Game of Thrones (later echoed forebodingly by Bran Stark in Season 7) captures the essence of Chaos Engineering. Chaos is not something to fear; instead, it’s an opportunity to ascend, to learn, and to grow stronger.&lt;/p&gt;

&lt;p&gt;In the fast-paced world of modern software systems, where complexity often breeds fragility, &lt;strong&gt;Chaos Engineering&lt;/strong&gt; emerges as the ladder to resilience. &lt;strong&gt;Instead of avoiding failure, it teaches us to embrace it, understand it, and prepare for it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This blog explores Chaos Engineering, why it’s essential, and how tools like &lt;strong&gt;LitmusChaos&lt;/strong&gt; make it accessible and effective for teams striving to build robust, reliable systems.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;What is Chaos Engineering?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzxqoczibisxiqqo433h5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzxqoczibisxiqqo433h5.png" alt="Image description" width="626" height="417"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Chaos Engineering is more than just breaking things—it’s about &lt;strong&gt;understanding system behavior under stress&lt;/strong&gt; and ensuring reliability when the unexpected happens. By deliberately injecting failures into a controlled environment, teams can assess whether their systems respond gracefully or crumble under pressure.  &lt;/p&gt;

&lt;p&gt;Unlike traditional testing, which is often limited to specific conditions, Chaos Engineering focuses on uncovering unknowns, providing a deeper understanding of system interdependencies and failure points.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Core Principles of Chaos Engineering:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Start with a Hypothesis:&lt;/strong&gt; Define your system's steady state—what does "normal" look like?
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simulate Real-World Conditions:&lt;/strong&gt; Mimic scenarios like server crashes, DNS outages, or resource exhaustion.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Measure Impact:&lt;/strong&gt; Collect metrics to determine how your system deviates from the steady state during experiments.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Learn and Improve:&lt;/strong&gt; Use findings to build more resilient architectures and improve incident response strategies.
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The process of Chaos Engineering doesn’t just prepare systems for failures; it builds &lt;strong&gt;confidence&lt;/strong&gt; in your ability to recover from them.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Why is Chaos Engineering Important?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgemfmkorggasjawdbxs4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgemfmkorggasjawdbxs4.png" alt="Image description" width="568" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Modern software architectures, powered by &lt;strong&gt;microservices&lt;/strong&gt;, &lt;strong&gt;containerization&lt;/strong&gt;, and &lt;strong&gt;cloud computing&lt;/strong&gt;, have brought unparalleled scalability and flexibility. However, they also introduce &lt;strong&gt;complex interdependencies&lt;/strong&gt; that make predicting system behavior increasingly difficult.  &lt;/p&gt;

&lt;p&gt;When a single component fails, it can trigger a &lt;strong&gt;domino effect&lt;/strong&gt; of issues across the system. Chaos Engineering addresses this challenge by ensuring:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Proactive Resilience:&lt;/strong&gt; Identify and mitigate vulnerabilities before they impact users.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Faster Recovery:&lt;/strong&gt; Develop and validate automated recovery strategies for incidents.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Team Preparedness:&lt;/strong&gt; Empower teams to respond effectively during real-world outages.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Continuous Improvement:&lt;/strong&gt; Foster a culture of learning and adaptation, critical for modern DevOps teams.
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Introducing LitmusChaos&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4uq7tiu30s2yy1lu9f9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4uq7tiu30s2yy1lu9f9.png" alt="Image description" width="601" height="588"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LitmusChaos&lt;/strong&gt; is a Kubernetes-native Chaos Engineering platform designed to simplify the process of resilience testing for cloud-native systems. As a project under the CNCF (Cloud Native Computing Foundation), LitmusChaos is a powerful tool to test the &lt;strong&gt;reliability&lt;/strong&gt; and &lt;strong&gt;robustness&lt;/strong&gt; of distributed systems.  &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Why LitmusChaos?&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Chaos Engineering tools like LitmusChaos help automate experiments and integrate them into existing workflows, reducing the manual effort involved. Its Kubernetes-first approach ensures seamless compatibility with modern cloud-native applications.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3al8l17nmxqym40l1yxn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3al8l17nmxqym40l1yxn.png" alt="Image description" width="800" height="456"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Key Features of LitmusChaos:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0md8r50w3a2ya65vm3p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd0md8r50w3a2ya65vm3p.png" alt="Image description" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Chaos Workflows:&lt;/strong&gt; Automate complex experiments using predefined workflows or build custom ones for unique scenarios.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;ChaosHub:&lt;/strong&gt; Access a library of curated chaos experiments to simulate a wide range of failure scenarios.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Observability Integration:&lt;/strong&gt; Monitor the impact of chaos experiments with integrated dashboards, logs, and metrics.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Kubernetes-Native Design:&lt;/strong&gt; Manage experiments as Kubernetes CRDs, making it easy to integrate with cluster management practices.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Extensibility and Customization:&lt;/strong&gt; Create and run custom experiments tailored to your application's specific needs.
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Common Use Cases:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CPU Stress Tests:&lt;/strong&gt; Evaluate system performance under extreme CPU load.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pod Termination:&lt;/strong&gt; Simulate sudden pod crashes to test service recovery.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network Chaos:&lt;/strong&gt; Introduce latency, packet loss, or disconnections to study communication resilience.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Infrastructure Failures:&lt;/strong&gt; Test the impact of node failures or cloud service outages.
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Getting Started with LitmusChaos&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. &lt;strong&gt;Installation&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;LitmusChaos can be deployed on a Kubernetes cluster using Helm or YAML manifests. The tool includes a user-friendly Litmus Portal to manage and monitor chaos experiments.  &lt;/p&gt;

&lt;h3&gt;
  
  
  2. &lt;strong&gt;Setting Up Chaos Experiments&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Access ChaosHub:&lt;/strong&gt; Explore existing experiments in ChaosHub or define custom scenarios.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Target Specific Resources:&lt;/strong&gt; Configure experiments to test workloads, nodes, or services in your cluster.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. &lt;strong&gt;Execution and Observability&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Run experiments through the LitmusChaos UI or CLI.
&lt;/li&gt;
&lt;li&gt;Monitor system health and experiment impact using Prometheus, Grafana, or integrated observability tools.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. &lt;strong&gt;Learning from Results&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Use experiment data to identify weaknesses and apply necessary fixes, ensuring stronger system performance and resilience in the future.  &lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Benefits of Using LitmusChaos&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;LitmusChaos is more than just a testing tool—it’s a &lt;strong&gt;resilience enabler&lt;/strong&gt;:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CI/CD Integration:&lt;/strong&gt; Run chaos experiments alongside automated testing pipelines to catch vulnerabilities earlier.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost-Effective:&lt;/strong&gt; As an open-source tool, LitmusChaos minimizes the financial barrier to adopting Chaos Engineering practices.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Community-Driven Development:&lt;/strong&gt; Contributions from a thriving open-source community ensure rapid evolution and feature development.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Built for Kubernetes:&lt;/strong&gt; Designed to scale with modern cloud-native architectures, from small setups to large, complex clusters.
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm9c767zz8wwk03m7ryv0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm9c767zz8wwk03m7ryv0.png" alt="Image description" width="636" height="253"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In a world where reliability is paramount, Chaos Engineering offers a powerful way to uncover hidden vulnerabilities and build confidence in your system’s resilience. &lt;strong&gt;LitmusChaos&lt;/strong&gt;, with its open-source foundation and Kubernetes-native design, provides the perfect starting point for organizations looking to adopt this practice.  &lt;/p&gt;

&lt;p&gt;Remember: Chaos isn’t the enemy—it’s an opportunity. It’s a ladder to better systems, stronger architectures, and more reliable applications. So, take the first step. Start experimenting with LitmusChaos today, and ensure your systems can withstand even the harshest conditions.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ready to elevate your reliability game?&lt;/strong&gt; Explore &lt;a href="https://litmuschaos.io/" rel="noopener noreferrer"&gt;LitmusChaos&lt;/a&gt; and join the global community of chaos engineers leading the way to resilience.  &lt;/p&gt;

&lt;p&gt;About the Author:&lt;br&gt;
&lt;strong&gt;Isaeus "Asi" Guiang&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjtmcmeaxbmuiabtwoi9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frjtmcmeaxbmuiabtwoi9.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community.&lt;br&gt;
Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;br&gt;
Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>chaosengineering</category>
      <category>security</category>
      <category>devops</category>
      <category>litmuschaos</category>
    </item>
    <item>
      <title>Create a Relational Database Application</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Mon, 18 Nov 2024 21:04:06 +0000</pubDate>
      <link>https://dev.to/asi_security/create-a-relational-database-application-56p3</link>
      <guid>https://dev.to/asi_security/create-a-relational-database-application-56p3</guid>
      <description>&lt;h2&gt;
  
  
  About The Project
&lt;/h2&gt;

&lt;p&gt;A Company is implementing a robust RDBMS to streamline its employment application process. Our goal is to efficiently manage applications, track candidate progress, and enhance communication between recruiters and applicants.&lt;/p&gt;

&lt;h3&gt;
  
  
  Table Of Contents
&lt;/h3&gt;

&lt;ol&gt;
  &lt;li&gt;
    About The Project
    &lt;ul&gt;
      &lt;li&gt;Table Of Contents&lt;/li&gt;
      &lt;li&gt;Features&lt;/li&gt;
      &lt;li&gt;Technologies Used&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;
    Database Design
  &lt;/li&gt;
  &lt;li&gt;
    Website Snapshots
  &lt;/li&gt;
  &lt;li&gt;
    Getting Started
    &lt;ul&gt;
      &lt;li&gt;Prerequisites&lt;/li&gt;
      &lt;li&gt;Installation&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;
  &lt;li&gt;
    Run
  &lt;/li&gt;
  &lt;li&gt;
    Contributors
  &lt;/li&gt;
  &lt;li&gt;
    License
  &lt;/li&gt;
&lt;/ol&gt; 

&lt;h3&gt;
  
  
  Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Authentication System&lt;/li&gt;
&lt;li&gt;Log in and log out function&lt;/li&gt;
&lt;li&gt;Dashboard&lt;/li&gt;
&lt;li&gt;Queries&lt;/li&gt;
&lt;li&gt;Applicant CRUD&lt;/li&gt;
&lt;li&gt;Application CRUD&lt;/li&gt;
&lt;li&gt;Education History CRUD&lt;/li&gt;
&lt;li&gt;Employment History CRUD&lt;/li&gt;
&lt;li&gt;Reference CRUD&lt;/li&gt;
&lt;li&gt;Print Functionality&lt;/li&gt;
&lt;li&gt;Search&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Technologies Used
&lt;/h3&gt;

&lt;p&gt;We use a number of open source projects to work properly:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://react.dev/" rel="noopener noreferrer"&gt;React&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://nodejs.org/en" rel="noopener noreferrer"&gt;Node.js&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://expressjs.com/" rel="noopener noreferrer"&gt;Express&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.mysql.com/" rel="noopener noreferrer"&gt;MySQL&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.npmjs.com/package/bcrypt" rel="noopener noreferrer"&gt;bcrypt&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.npmjs.com/package/jsonwebtoken" rel="noopener noreferrer"&gt;jsonwebtoken&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Database Design
&lt;/h2&gt;

&lt;p&gt;Database design plays a very important part in the Software Development Life Cycle (SDLC). This part includes creating metadata, normalization, and constructing an Entity-Relationship Diagram (ERD).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://drive.google.com/file/d/1yS8kMfTHYsi9vOEHuishXdnfKdnZJrDf/view?usp=drive_link" rel="noopener noreferrer"&gt;Metadata&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.google.com/spreadsheets/d/124bbZ7ouiWAvD4o5zNh6cpj74sUj69iw/edit?usp=sharing&amp;amp;ouid=112699599917769491070&amp;amp;rtpof=true&amp;amp;sd=true" rel="noopener noreferrer"&gt;Normalization&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://drive.google.com/file/d/1vuParCXUbfH7dsntEip-CoXTuUoDHQm3/view?usp=sharing" rel="noopener noreferrer"&gt;ERD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To add, provided &lt;a href="https://drive.google.com/file/d/16KIyYrTSyngqj3-zBF4LNOG9iv-1n_Me/view?usp=sharing" rel="noopener noreferrer"&gt;here&lt;/a&gt; is the &lt;code&gt;.sql&lt;/code&gt; file of &lt;code&gt;dbKraft&lt;/code&gt; (the database used) if you want to have the database ready.&lt;/p&gt;

&lt;h2&gt;
  
  
  Website Snapshots
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Log in page
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7to7wis0q3qk1kisowt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7to7wis0q3qk1kisowt.png" alt="Screenshot 2024-07-08 172407" width="800" height="379"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Home page
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fir4rrfx5t6d2zlr5vrjt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fir4rrfx5t6d2zlr5vrjt.png" alt="Screenshot 2024-07-08 172455" width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  CRUD page example
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxp9g25jr0sh05fpt7v2e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxp9g25jr0sh05fpt7v2e.png" alt="Screenshot 2024-07-08 172629" width="800" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Query page
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc25wderzl43uxxqgzcob.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc25wderzl43uxxqgzcob.png" alt="Screenshot 2024-07-08 175850" width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Query page example
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgntykcosekf9nruwi4wl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgntykcosekf9nruwi4wl.png" alt="Screenshot 2024-07-08 180056" width="800" height="377"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Getting Started
&lt;/h2&gt;

&lt;p&gt;KRAFT is not yet accessible to the world wide web, as it is yet to be deployed. But, if you're interested in seeing the UI and experience the website yourself, you are in the right section of the README. To get started with accessing the source code, follow the steps below.&lt;/p&gt;

&lt;h3&gt;
  
  
  Prequisites
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ensure that Node.js and npm are installed on your machine.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Installation
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;You can fork this repository, or you can also clone this repository directly on your local machine.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;After cloning the repository on your local machine, access it on any IDE.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;After opening the project, you should see all the files&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install dependencies using,&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm &lt;span class="nb"&gt;install&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create a .env on the server folder and type the code below. Make sure to replace &lt;code&gt;YOUR_DB_PASSWORD_HERE&lt;/code&gt; with your actual &lt;strong&gt;MariaDB/MySQL/Any RDBMS password&lt;/strong&gt;.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;DATABASE_PASSWORD&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"YOUR_DB_PASSWORD_HERE"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Configure the database connection in &lt;code&gt;server/config/db.js&lt;/code&gt; as per your MariaDB/MySQL/Any RDBMS database environment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;To install the required dependencies for the &lt;strong&gt;client&lt;/strong&gt; folder, see the &lt;a href="https://github.com/feiryrej/KRAFTCompany/blob/main/client/package.json" rel="noopener noreferrer"&gt;&lt;code&gt;package.json&lt;/code&gt;&lt;/a&gt; for the client-side.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;To install the required dependencies for the &lt;strong&gt;server&lt;/strong&gt; folder, see the &lt;a href="https://github.com/github.com/feiryrej/KRAFTCompany/blob/main/server/package.json" rel="noopener noreferrer"&gt;&lt;code&gt;package.json&lt;/code&gt;&lt;/a&gt; for the server-side.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Run
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Run the server on &lt;code&gt;/server&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;node server.js
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;With &lt;code&gt;nodemon&lt;/code&gt;, you can run the server using,&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm run server
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Run the client on &lt;code&gt;/client&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm start
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;Contributor's Table&lt;/h3&gt;
&lt;br&gt;
  &lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;br&gt;
    &lt;thead&gt;
&lt;br&gt;
      &lt;tr&gt;
&lt;br&gt;
        &lt;th&gt;Name&lt;/th&gt;
&lt;br&gt;
        &lt;th&gt;Avatar&lt;/th&gt;
&lt;br&gt;
        &lt;th&gt;GitHub&lt;/th&gt;
&lt;br&gt;
        &lt;th&gt;Contributions&lt;/th&gt;
&lt;br&gt;
      &lt;/tr&gt;
&lt;br&gt;
    &lt;/thead&gt;
&lt;br&gt;
    &lt;tbody&gt;
&lt;br&gt;
      &lt;tr&gt;
&lt;br&gt;
        &lt;td&gt;Regina Bonifacio&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F116869096%3Fv%3D4" alt="" width="460" height="460"&gt;&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;&lt;a href="https://github.com/feiryrej" rel="noopener noreferrer"&gt;Feiryrej&lt;/a&gt;&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;Fullstack Developer&lt;/td&gt;
&lt;br&gt;
      &lt;/tr&gt;
&lt;br&gt;
      &lt;tr&gt;
&lt;br&gt;
        &lt;td&gt;Isaeus Guiang&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F142424210%3Fv%3D4" alt="" width="460" height="460"&gt;&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;&lt;a href="https://github.com/asiguiang" rel="noopener noreferrer"&gt;asiguiang&lt;/a&gt;&lt;/td&gt;
&lt;br&gt;
        &lt;td&gt;Database Administrator, Technical Writer&lt;/td&gt;
&lt;br&gt;
      &lt;/tr&gt;
&lt;br&gt;
    &lt;/tbody&gt;
&lt;br&gt;
  &lt;/table&gt;&lt;/div&gt;
&lt;br&gt;


&lt;p&gt;Checkout My Colleague's Repository: &lt;br&gt;
&lt;a href="https://github.com/feiryrej/KRAFTCompany" rel="noopener noreferrer"&gt;https://github.com/feiryrej/KRAFTCompany&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  License
&lt;/h2&gt;

&lt;p&gt;Distributed under the &lt;a href="https://choosealicense.com/licenses/mit/" rel="noopener noreferrer"&gt;MIT&lt;/a&gt; License. See &lt;a href="https://dev.toLICENSE"&gt;LICENSE&lt;/a&gt; for more information.&lt;/p&gt;

</description>
      <category>mysql</category>
      <category>webdev</category>
      <category>beginners</category>
      <category>react</category>
    </item>
    <item>
      <title>AWS Cloud Club Captain - Do you have what it takes to be the next SUPER student-leader?</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Mon, 18 Nov 2024 18:42:43 +0000</pubDate>
      <link>https://dev.to/asi_security/aws-cloud-club-captain-do-you-have-what-it-takes-to-be-the-next-super-student-leader-1nn1</link>
      <guid>https://dev.to/asi_security/aws-cloud-club-captain-do-you-have-what-it-takes-to-be-the-next-super-student-leader-1nn1</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F72n176kuynvvnnvmmcaj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F72n176kuynvvnnvmmcaj.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is a Student Leader?&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;A student leader is not merely someone who takes charge of projects or initiatives within their academic setting. It’s someone who inspires, innovates, and leads with purpose. Today’s student leaders are evolving, taking on roles that bridge academia, technology, and real-world challenges. They represent the voice of their peers, lead impactful initiatives, and pave the way for future leaders to follow in their footsteps.&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;AWS Cloud Club: Two Models, Regional and University&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;AWS Cloud Club&lt;/strong&gt; empowers students to bring cloud computing closer to their peers. It operates under two primary models:  &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;University Model&lt;/strong&gt; – Tailored for a specific campus, University Cloud Clubs focus on creating localized impact. They organize events, workshops, and hands-on training for students within their school.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Regional Model&lt;/strong&gt; – Regional Captains coordinate activities across multiple universities, amplifying their reach and connecting communities at a broader scale. They tackle higher-level initiatives, engage with AWS professionals, and promote cloud advocacy on a national or regional stage.
&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcyke4ryk4km3o4w3clyr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcyke4ryk4km3o4w3clyr.png" alt="Image description" width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;AWS Captains&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;What is an AWS Captain?&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
An AWS Captain is the face and voice of AWS Academic Advocacy within their community. Captains are the ones leading AWS Cloud Clubs, simplifying complex cloud concepts, and building bridges between students and industry professionals.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Captains:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;University Captains:&lt;/strong&gt; Operate on campus to lead their university-specific Cloud Clubs.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Regional Captains:&lt;/strong&gt; Guide multiple university clubs, spearhead country-wide initiatives, and represent the region in global AWS events.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Badge of a Captain:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The Captain Badge is more than just a symbol; it’s a mark of dedication, skill, and leadership in the world of cloud computing and student advocacy.  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Why is Being an AWS Captain a Super Student-Leader Role?&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff66ytuggwfwzkeid52as.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff66ytuggwfwzkeid52as.png" alt="Image description" width="800" height="886"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exceeding Standards and Traditions&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Traditionally, student leaders have been tied to roles within university councils or clubs. AWS Captains break the mold, addressing modern tech challenges and creating a legacy that inspires others to explore cloud computing.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simplifying Cloud Complexities&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftn3nrz8p9a3lxm9q1bw3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftn3nrz8p9a3lxm9q1bw3.png" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One common misconception is that you need to be an expert programmer to lead an AWS Club. Not true! Captains focus on making cloud computing concepts accessible, showing students that anyone can excel in this field.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Going Beyond University Curriculum&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
AWS Captains venture where standard academic frameworks cannot—bridging the gap between theoretical knowledge and real-world applications.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99pdknpv45alq0fgnrq2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F99pdknpv45alq0fgnrq2.png" alt="Image description" width="800" height="1066"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connecting Industry Professionals and Academia&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Captains often serve as liaisons, fostering partnerships between faculty members, students, and professionals in the tech industry.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enjoying Unparalleled Perks&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Free AWS exam certifications.
&lt;/li&gt;
&lt;li&gt;Premium licenses and subscriptions for learning tools.
&lt;/li&gt;
&lt;li&gt;Swag boxes delivered to your doorstep! See image below! 
&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fko625sg796vth196g9va.png" alt="Image description" width="800" height="856"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Access to a Global Network of Super Student-Leaders&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Imagine working with peers from different time zones, collaborating on international projects, and forming lifelong connections—all while representing your university and community.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvymjudjvwbald1xck108.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvymjudjvwbald1xck108.png" alt="Image description" width="800" height="436"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Watch our discussion here:  &lt;a href="https://www.facebook.com/AWSCloudClubPhilippines/videos/1152273682734962" rel="noopener noreferrer"&gt;https://www.facebook.com/AWSCloudClubPhilippines/videos/1152273682734962&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Characteristics of an AWS Captain&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjnmc5o1nugi6eka9whji.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjnmc5o1nugi6eka9whji.png" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;
  
  
  &lt;strong&gt;Mental Strength&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Balancing responsibilities, overcoming burnout, and handling high expectations are all part of the journey. True leaders find ways to recharge and persevere.  &lt;/p&gt;
&lt;h4&gt;
  
  
  &lt;strong&gt;Academic Responsibility&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;You don’t need perfect grades to lead, but setting a good example in conduct and dedication is non-negotiable.  &lt;/p&gt;
&lt;h4&gt;
  
  
  &lt;strong&gt;Emotional Intelligence&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Understanding your peers' struggles and tailoring initiatives to address them is key. Leadership begins with empathy.  &lt;/p&gt;
&lt;h4&gt;
  
  
  &lt;strong&gt;Physical Presence&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Show up. Whether it’s shaking hands, taking pictures, or giving hugs (with consent!), being present is a superpower in itself.  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;The AWS Captain Superpower: C5&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj61vz915avqbym0ay03.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcj61vz915avqbym0ay03.png" alt="Image description" width="800" height="758"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Charisma&lt;/strong&gt;
Inspire others and focus on providing opportunities for your peers.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Candidness&lt;/strong&gt;
Be real and passionate about your advocacy.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Creativity&lt;/strong&gt;
Think outside the box to address challenges like resource constraints or rigid policies.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Compassion&lt;/strong&gt;
Care deeply about the growth of your community.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Capability&lt;/strong&gt;
Execute projects effectively and make AWS concepts easy for students to grasp.
&lt;/li&gt;
&lt;/ol&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Scope of Responsibility&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjyvy3mjdhpnuyy391gvf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjyvy3mjdhpnuyy391gvf.png" alt="Image description" width="800" height="600"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;In Your School:&lt;/strong&gt; Meeting the basic expectations of running a club.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;In AWS Communities:&lt;/strong&gt; Collaborating with AWS professionals and user groups.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Country-Level Advocacies:&lt;/strong&gt; Regional Captains take on initiatives that impact the tech community at a national level.
&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Serve Hard and Recover Hard&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Balance is essential. It’s okay to make mistakes as long as you learn and bounce back stronger. You’re still a student, after all!  &lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Incorporating New Perspectives into the Blog&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;A thoughtful contribution from a fellow AWS Captain brings valuable insights that align perfectly with the essence of what being an AWS Captain entails. Here are the highlights, woven seamlessly into the original narrative to enhance the impact and depth of the message:  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Identifying Failures and Embracing Them&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Leadership is not about avoiding failure—it's about recognizing it, learning from it, and turning it into a stepping stone. Impromptu thinking and actions are vital, especially when plans don’t go as expected. A true captain adapts, recalibrates, and continues to lead with confidence.  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Create a Visual Map for Your Journey&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;As a captain, mapping out your goals and milestones can provide clarity and direction. Here’s how to start:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Outline the &lt;strong&gt;events&lt;/strong&gt; you want to organize (consider referring to the AWS Cloud Club Handbook for inspiration).
&lt;/li&gt;
&lt;li&gt;Set &lt;strong&gt;personal goals&lt;/strong&gt; for leadership growth and technical expertise.
&lt;/li&gt;
&lt;li&gt;Define &lt;strong&gt;community achievements&lt;/strong&gt;, ensuring both short-term and long-term objectives are meaningful and impactful.
&lt;/li&gt;
&lt;li&gt;For captains aiming to start a new club: Ensure your plan aligns with AWS's values and resonates with their mission. If it doesn’t, it might be best to refine your vision or reconsider applying.
&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Promote Inclusion in All Forms&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Inclusivity is a cornerstone of effective leadership. Captains should aim to foster an environment that celebrates diversity, both within their teams and the broader community. Examples include:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hosting &lt;strong&gt;minority-centric events&lt;/strong&gt;, such as women-led speaker panels.
&lt;/li&gt;
&lt;li&gt;Ensuring that inclusion doesn’t inadvertently lead to bias; strive for a balance that uplifts all voices.
&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Ask for Help and Offer It Freely&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyqkv46oilmt2slwu8bsc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyqkv46oilmt2slwu8bsc.png" alt="Image description" width="800" height="460"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Collaboration is the heart of the AWS Cloud Club program. Never hesitate to seek guidance when you’re overwhelmed, and be equally willing to support your peers. This spirit of mutual growth strengthens the global AWS Captain network.  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Events Are Your Voice&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv796tsp804p1lxu7o9j8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fv796tsp804p1lxu7o9j8.png" alt="Image description" width="493" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Your events are a direct reflection of your leadership. They embody your creativity, resourcefulness, and ability to adapt. To ensure they resonate:  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify your audience and tailor your approach accordingly.
&lt;/li&gt;
&lt;li&gt;Be open to learning and evolving as you plan, manage, and execute.
&lt;/li&gt;
&lt;li&gt;Use your events as a platform to communicate your vision and bring meaningful change.
&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Clear Communication and Gratitude&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Dealing with the overwhelming responsibilities of being a captain requires maintaining clear communication with your team and community. Express gratitude—not just to speakers but also to attendees and everyone who contributes to your initiatives. A simple “thank you” can foster goodwill and motivate your peers.  &lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Impact of an Active Captain&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi1jkpbs0gdcvltk9mjbb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi1jkpbs0gdcvltk9mjbb.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;An engaged captain leads by example. Your presence, participation, and proactive approach can inspire others to step up and contribute to your collective goals.  &lt;/p&gt;

&lt;p&gt;Integrating AWS Leadership Principles&lt;/p&gt;

&lt;p&gt;Being an AWS Cloud Captain is not just about understanding the technical side of AWS, it's about embracing leadership principles that extend far beyond the classroom. As a student leader, integrating AWS's leadership principles into your journey can elevate your impact and help you lead with purpose and vision.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;1. Customer Obsession&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;As an AWS Cloud Captain, your primary "customers" are the students and faculty within your community. To be a super student leader, focus on understanding their needs, struggles, and goals. Whether it's through hosting events, answering questions, or providing resources, constantly ask yourself: &lt;em&gt;How can I serve my community better?&lt;/em&gt; A customer-obsessed leader is always ready to listen, adapt, and provide value to those they lead.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;2. Ownership&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Taking ownership means being fully accountable for your actions, decisions, and the outcomes of your initiatives. For AWS Captains, this can mean taking charge of events, workshops, or community-building projects. Don’t wait for someone else to solve the problems—take initiative, step up, and be the leader who leads by example. You are responsible for the success and direction of your university’s AWS Cloud Club, and that responsibility should drive you to deliver the best results.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;3. Invent and Simplify&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;AWS is built on innovation, and as a student leader, you should embrace the same mindset. Look for ways to improve existing processes, simplify complex topics for your peers, and always think outside the box when it comes to problem-solving. For example, you might create a more accessible learning path for newcomers to cloud computing or design an event format that better fits your university’s culture. Remember, simplifying complex cloud concepts for your peers is a powerful skill that shows true leadership.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;4. Are Right, A Lot&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;This principle emphasizes the importance of good judgment, decision-making, and seeking diverse perspectives. As an AWS Captain, your role will often involve making decisions about events, team dynamics, and community engagement. Seek input from your peers and mentors, and make informed decisions that serve the best interests of the community. Being right a lot doesn’t mean being perfect—it means making thoughtful, well-rounded decisions based on knowledge and experience.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;5. Learn and Be Curious&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;"Learn how to learn" is a mindset that aligns perfectly with the AWS leadership principle of learning and curiosity. As an AWS Cloud Captain, you need to continually expand your knowledge of AWS services, leadership techniques, and your peers' needs. Stay curious about the cloud, technology, and how to improve your leadership abilities. This principle will keep you flexible and adaptable, ensuring you never stop growing as a student leader.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;6. Hire and Develop the Best&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;While you might not be hiring employees in your role as a captain, you are certainly developing your peers. The best leaders nurture talent, encourage growth, and help others reach their full potential. Foster a learning environment where everyone can thrive. Recognize potential in your team, mentor new captains, and promote leadership opportunities within your club. This can create a self-sustaining cycle of growth and excellence within your community.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;7. Insist on the Highest Standards&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Always hold yourself and your community to the highest standards, whether it's in your academic work, the quality of your events, or how you support your peers. The ability to maintain high standards despite obstacles or setbacks is a key trait of a strong AWS leader. Encourage your team to aim for excellence and consistently improve—never settle for “just good enough.” Your leadership will inspire others to do the same.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;8. Think Big&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;The AWS leadership principle of thinking big encourages you to have an ambitious vision for the future. As a captain, think beyond your local university or region. Aim to connect with AWS leaders, build partnerships with other schools, or even contribute to larger AWS initiatives. The world of cloud computing is vast, and your leadership journey should reflect the same ambition and vision. Strive to make a global impact.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;9. Bias for Action&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Being a super student leader means not only thinking about what needs to be done but also acting decisively. The ability to take action quickly, especially in fast-paced or uncertain situations, is crucial for success as an AWS Captain. Whether it’s organizing an event at the last minute or troubleshooting an issue with AWS resources, make decisions quickly and move forward with confidence.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;10. Frugality&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Leadership doesn't always require a big budget. In fact, being resourceful and creative with limited resources can often yield the best results. As an AWS Cloud Captain, you’ll need to be frugal with your time, finances, and energy while delivering value to your community. This principle teaches you to prioritize what matters most and make the most of what you have.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;11. Earn Trust&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Trust is the foundation of strong leadership. As an AWS Cloud Captain, your peers will look to you for guidance and support. By demonstrating honesty, transparency, and integrity, you will earn their trust. Be reliable, follow through on commitments, and ensure that your actions align with the values you uphold as a leader.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;12. Dive Deep&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;As a student leader, it’s essential to dig into the details—whether it's a technical challenge, a team issue, or event logistics. Don’t shy away from deep dives into topics that matter. Understanding the intricacies of AWS services, or thoroughly researching a problem before making decisions, will make you a better leader and a stronger advocate for your community.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;13. Have Backbone; Disagree and Commit&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;There will be times when you may disagree with the direction of a project, team decision, or AWS policy. But as a leader, it’s important to voice your opinion respectfully. Once a decision is made, regardless of your stance, commit to it fully and help move the initiative forward. Your ability to stand firm, make decisions, and commit to them is a hallmark of strong leadership.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;14. Deliver Results&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Finally, to be a super student leader, you must deliver results. Whether it's executing an event, mentoring a peer, or contributing to a global AWS initiative, it’s crucial that you consistently deliver on your promises. The ability to execute and achieve tangible outcomes is what separates good leaders from great ones.&lt;/p&gt;



&lt;blockquote&gt;
&lt;p&gt;You need more than just technical expertise—you need to live and lead by the AWS Leadership Principles. By embracing these principles and applying them to your role as an AWS Cloud Captain, you will not only become a more effective leader but also inspire those around you to do the same. Remember, it's not just about building your university community—it’s about creating a lasting, positive impact on the global AWS community.&lt;/p&gt;
&lt;/blockquote&gt;



&lt;p&gt;By incorporating these thoughts, we enrich our collective understanding of the AWS Captain’s journey. These additions emphasize resilience, planning, inclusivity, and the human side of leadership, rounding out the already comprehensive vision for what it means to be a Super Student-Leader.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To all aspiring captains:&lt;/strong&gt; Map your journey, embrace collaboration, celebrate diversity, and most importantly, lead with purpose. Your legacy begins here.&lt;/p&gt;
&lt;h3&gt;
  
  
  &lt;strong&gt;Perks and Benefits Beyond AWS Academic Advocacy&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Networking with industry leaders.
&lt;/li&gt;
&lt;li&gt;Securing internships and mentorship opportunities.
&lt;/li&gt;
&lt;li&gt;Building a strong reputation for becoming a future industry leader.
&lt;/li&gt;
&lt;/ul&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;How to Apply as a Captain&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Interested? Check the AWS Student Hub for application details and step-by-step guides on starting your own club. I designed a framework for your reference below to have a successful community building! Reach me out on slack or linkedIn if you need more guidance! &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpor3jtpxarid14ehut6j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpor3jtpxarid14ehut6j.png" alt="Image description" width="800" height="595"&gt;&lt;/a&gt;&lt;br&gt;
Get the full picture + templates here: &lt;a href="https://www.canva.com/design/DAGW2jN3lvE/DFznhvUIKm4ynYQM3ubgGA/edit?utm_content=DAGW2jN3lvE&amp;amp;utm_campaign=designshare&amp;amp;utm_medium=link2&amp;amp;utm_source=sharebutton" rel="noopener noreferrer"&gt;https://www.canva.com/design/DAGW2jN3lvE/DFznhvUIKm4ynYQM3ubgGA/edit?utm_content=DAGW2jN3lvE&amp;amp;utm_campaign=designshare&amp;amp;utm_medium=link2&amp;amp;utm_source=sharebutton&lt;/a&gt;&lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Succession Planning for AWS Captains&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Maintaining the legacy of your club requires thoughtful planning. Ensure you pass the torch to capable hands. This framework I designed is for successful and smooth transfer of power, feel free to readjust this guidance that fits your culture or way of leaderships. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7j0d02oho9lqkmej2qud.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7j0d02oho9lqkmej2qud.png" alt="Image description" width="800" height="599"&gt;&lt;/a&gt;&lt;br&gt;
Get the full picture + templates here: &lt;a href="https://www.canva.com/design/DAGW2jN3lvE/DFznhvUIKm4ynYQM3ubgGA/edit?utm_content=DAGW2jN3lvE&amp;amp;utm_campaign=designshare&amp;amp;utm_medium=link2&amp;amp;utm_source=sharebutton" rel="noopener noreferrer"&gt;https://www.canva.com/design/DAGW2jN3lvE/DFznhvUIKm4ynYQM3ubgGA/edit?utm_content=DAGW2jN3lvE&amp;amp;utm_campaign=designshare&amp;amp;utm_medium=link2&amp;amp;utm_source=sharebutton&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;To Make a SUPER Student Leader at AWS:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqx31du5va9wimlrnm1ln.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqx31du5va9wimlrnm1ln.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Being an AWS Cloud Captain is not just about technical knowledge—it's about cultivating an environment of leadership, curiosity, and community. Here's how you can truly embody the role:&lt;/p&gt;
&lt;h2&gt;
  
  
  &lt;strong&gt;Know AWS from a Technical Perspective:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;A super student leader must understand the core services that make AWS the powerhouse it is. Whether it's &lt;strong&gt;compute services like EC2&lt;/strong&gt;, &lt;strong&gt;data storage solutions such as S3&lt;/strong&gt;, or &lt;strong&gt;machine learning tools like SageMaker&lt;/strong&gt;, each service has a unique purpose in the ecosystem. But it’s not enough to know &lt;em&gt;what&lt;/em&gt; these services do—you must also be able to communicate their potential to your peers in a way that's clear and impactful.&lt;/p&gt;

&lt;p&gt;This is where the &lt;strong&gt;"Learn how to learn"&lt;/strong&gt; mindset comes into play. It's my favorite quote, and it truly captures the essence of leadership. It encourages curiosity, adaptability, and a growth mindset. You must be constantly learning, not just for yourself, but to teach others and inspire those around you to do the same. Embracing this mentality will allow you to evolve as a leader, even when faced with unfamiliar challenges.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;Fostering the Right Environment:&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxlq8xfsm3ytpj2hejr7g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxlq8xfsm3ytpj2hejr7g.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While understanding AWS services is critical, the environment you create as a captain is just as important. The AWS Cloud Club is not just a technical hub; it's a space where leadership is built on &lt;strong&gt;principles of collaboration, inclusion, and respect&lt;/strong&gt;. As a captain, you must guide your team, your university, and your community in a way that reflects these values.&lt;/p&gt;

&lt;p&gt;Your leadership journey should not be limited to just your university or local group. &lt;strong&gt;Interconnectivity&lt;/strong&gt; is key. As an AWS Cloud Captain, your influence should extend beyond your immediate community. Whether it’s supporting fellow captains across regions or contributing to global initiatives, your ability to collaborate virtually or on-site adds an exciting dimension to your leadership experience.&lt;/p&gt;


&lt;h4&gt;
  
  
  &lt;strong&gt;Why This Journey is Exciting:&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7y4y94s5s2i5mbyuh7t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft7y4y94s5s2i5mbyuh7t.png" alt="Image description" width="552" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Being a Super Student-Leader at AWS means that you're not just changing your university—you're shaping the future of cloud computing globally. Your journey becomes &lt;strong&gt;much more exciting&lt;/strong&gt; when you realize that your work, ideas, and efforts can impact students and professionals across the world. Helping other regions or countries, whether remotely or in person, provides a fulfilling sense of interconnectedness and global leadership. It’s a continuous exchange of ideas, learning, and growth.&lt;/p&gt;



&lt;p&gt;To be a &lt;strong&gt;SUPER student leader at AWS&lt;/strong&gt;, you need to balance both technical expertise and leadership principles. &lt;strong&gt;"Learn how to learn"&lt;/strong&gt; and apply this mindset to foster a collaborative, inclusive, and expansive environment. Strive to connect with and support your peers, not just within your university, but across the globe. This is the journey of leadership at AWS—exciting, dynamic, and full of possibilities.&lt;/p&gt;


&lt;h3&gt;
  
  
  &lt;strong&gt;Closing Remarks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Being an AWS Captain isn’t just about technical knowledge—it’s about inspiring, empowering, and leaving a lasting impact. As you navigate this journey, remember that you’re part of a global movement shaping the future of tech advocacy.  &lt;/p&gt;

&lt;p&gt;Through our collective efforts, we provided readers with a more comprehensive opinion and a solid basis for understanding &lt;strong&gt;student-leadership&lt;/strong&gt; in the AWS Cloud Club landscape in our tenure. We aim to empower our community with these perspectives and an inspiration to aspiring future captains in the 2025 Cohort.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The author's blog is a comprehensive collaboration and peer reviewed with his outstanding co-captains in the AWS Cloud Club Program. This lineup of collaborators represents the best of the best, bringing together a wealth of knowledge and experience from various backgrounds. Each captain has demonstrated exceptional leadership and mentorship in their respective communities, ensuring that the insights shared in this blog are not only well-informed but also diverse and multifaceted.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Through our collective efforts, we provided readers with a more comprehensive opinion and a solid basis for understanding &lt;strong&gt;student-leadership&lt;/strong&gt; in the AWS Cloud Club landscape in our tenure. We aim to empower our community with these perspectives and an inspiration to aspiring future captains in the 2025 Cohort.&lt;/em&gt; &lt;/p&gt;

&lt;p&gt;You might be interested as well in learning the 7 Leadership Principle of AWS User Group Philippines authored by our very own AWS Community Hero, Mr. Raphael "Rafi" Quisumbing: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://community.awsug.ph/principles/index.html" rel="noopener noreferrer"&gt;https://community.awsug.ph/principles/index.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdxitkv8d96fw0gnyz77g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdxitkv8d96fw0gnyz77g.png" alt="Image description" width="800" height="496"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About the Author:&lt;/strong&gt; &lt;br&gt;
&lt;strong&gt;Regional Captain Isaeus "Asi" Guiang&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejh0ybect522nop20puu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fejh0ybect522nop20puu.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community.&lt;br&gt;
Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;br&gt;
Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;                           **Collaborators**
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Regional Captain Nikolaos Douranos&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Regional Captain and Founder of AWS Cloud Club Greece&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftec0sksq5mskjnho52jk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftec0sksq5mskjnho52jk.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Nikolaos Douranos is deeply passionate about the Computer Science industry. He is currently pursuing a dual degree in Computer Science at The University of Manchester and Management Science and Technology at Athens University of Economics and Business. Having moved to the United Kingdom five years ago, he earned an exceptional academic record and graduated from Cox Green School, achieving the second-highest score in A-Level exams. With excellent communication skills, Nikolaos excels in conveying complex ideas to diverse audiences. He recently completed a highly successful internship at Amazon Web Services (AWS) in Madrid, enhancing his skills in cloud computing and AI technologies. This year, he gained further practical experience at IBM in cutting-edge technologies and is currently pursuing his second internship at AWS in Madrid as a Solutions Architect.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Captain Alex Even&lt;/strong&gt;   &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Captain of AWS Cloud Club London&lt;br&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw575y0vtthiz42xf251o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw575y0vtthiz42xf251o.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Alex Even is a finance and machine learning undergraduate at Bayes Business School with a proven track record in global organizations like Amazon, Greystar, and Swiss Re across EMEA and APAC. In these roles, he’s led financial data analysis, cloud solutions, and business insights, driving measurable impact. As the founder of the City Innovation Hub, he built a community of 500+ members, bridging the tech skills gap for University of London students. Alex is also 1 of only 3 AWS Cloud Captains in London, spearheading cloud initiatives/ events and fostering further innovation at City, University of London.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Regional Captain Rukhsar Bakhtaj&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Captain of AWS Cloud Club Pakistan&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl93bq53y1yoz8ckyuhsv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl93bq53y1yoz8ckyuhsv.png" alt="Image description" width="800" height="782"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Rukhsar Bakhtaj, known as "Rukhsar AI," is shaping the future of tech in Pakistan. As a 2023 Google Generation Scholar, she leads from the front—founding AWS Cloud Club Pakistan and AWS Cloud Club AWKUM, creating spaces where innovation succeeds. A founder &amp;amp; former president of the Technology and Innovation Society at AWKUM, Rukhsar is all about empowering others, from coaching in AWS's New Voices Program to organizing tech events at scale. Her work in AI, cloud computing, and community-building speaks for itself.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Captain Rashi Dashore&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Captain of AWS Cloud Club International Institute of Professional Studies&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0jlop4wwh38o02mol3ei.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0jlop4wwh38o02mol3ei.png" alt="Image description" width="512" height="512"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Rashi Dashore serves as a Centralised Placement Cell Coordinator at Devi Ahilya Vishwavidyalaya (DAVV), where she manages student data, collaborates with HR professionals, and organizes on-campus placement drives. Through her dedication, Rashi has successfully facilitated numerous recruitment events, helping many students achieve their career aspirations. Her role also involves gaining valuable experience in project development and strategic planning.&lt;br&gt;
Currently pursuing a Master of Computer Applications (MCA) degree, Rashi holds a Bachelor of Computer Applications from the International Institute of Professional Studies (IIPS), DAVV, Indore. Her technical skills include proficiency in Java, Spring Frameworks, MySQL, Python, and AWS. She has also completed several certifications and virtual experience programs, such as the Wells Fargo Software Engineering Virtual Experience Program and the SQL Skill Verification by HackerRank.&lt;br&gt;
Rashi is deeply passionate about problem-solving, programming, reading, and lifelong learning. Her proactive approach to self-improvement highlights her commitment to personal and professional growth.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Regional Captain Upendra Prasad Neupane&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Regional Captain of AWS Cloud Club Nepal&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4nci58j46jt9brvbjjfe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4nci58j46jt9brvbjjfe.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A Computer Engineer specializing in DevOps and Cloud technologies. Known for being an excellent team player with strong leadership abilities, I am dedicated to continuous learning and professional growth. Passionate about communication, I enjoy sharing knowledge with others and building connections within the community. I actively contribute to community-building efforts, engaging with like-minded professionals to exchange insights and ideas.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Captain Dulari Bhushan&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Captain of AWS Cloud Club CHARUSAT&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft9jjcostxs83zbbtj58j.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft9jjcostxs83zbbtj58j.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A driven leader and enthusiast in AI/ML, currently serving as the Club Captain for AWS Cloud Club at CHARUSAT. Dulari has gained hands-on experience in AI research, particularly in explainable AI for emotion detection models, during an internship at CHARUSAT. Additionally, they have a background in firmware development through an internship at VOLANSYS and have demonstrated leadership skills as the Business Development Team Lead at AIESEC in India. Dulari is passionate about tech innovation and team development.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Captain Mohammed Bangie&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Captain of AWS Cloud Club University of Witwatersrand&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyem6a16k70r4nrhe45q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyem6a16k70r4nrhe45q.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mohammed Bangie is the founder of the first AWS Cloud Club in Southern Africa and a 2x AWS Certified professional. As a Software Development Engineer (SDE) Intern at AWS, his mission is to make cloud technologies accessible to students and aspiring professionals.&lt;/p&gt;

&lt;p&gt;With experience leading cloud initiatives at the University of the Witwatersrand and mentoring on AWS and Azure certifications, Mohammed has presented at Africa's largest AWS Summit. He has practical expertise in AWS services, particularly Networking, IAM, and Security, and is preparing for additional certifications in Solutions Architect, Machine Learning, and Developer.&lt;/p&gt;

&lt;p&gt;Mohammed is passionate about educating, inspiring, and connecting people in tech, sharing insights through his blog and workshops. He is committed to customer obsession, delivering high-quality content and solutions to the tech community.&lt;br&gt;
&lt;/p&gt;


&lt;/blockquote&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;REFERENCES


header Image source: 
_https://funderstanding.com/wp-content/uploads/2024/01/a_digital_art_piece_of_science_and_technology_in_a_c_a2de2481-dcde-4a88-8164-4e5cd1249035.png_
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>school</category>
      <category>aws</category>
      <category>leadership</category>
      <category>student</category>
    </item>
    <item>
      <title>Simple Number Guessing Game in Python</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Mon, 18 Nov 2024 17:37:43 +0000</pubDate>
      <link>https://dev.to/asi_security/simple-number-guessing-game-in-python-a3a</link>
      <guid>https://dev.to/asi_security/simple-number-guessing-game-in-python-a3a</guid>
      <description>&lt;h3&gt;
  
  
  Number Guessing Game Overview:
&lt;/h3&gt;

&lt;p&gt;This Python program is a fun and engaging &lt;strong&gt;Number Guessing Game&lt;/strong&gt; where the user has five chances to guess a randomly generated number between 1 and 100. Here's a breakdown of how the game works and how the code operates:&lt;/p&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;How It Works&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Welcome Message&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
When the game starts, the user is greeted with a playful message:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"Hello! This is Isaeus Guiang, and this is a number guessing game. You have 5 chances to guess the number, or... you will die :)."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Random Number Generation&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The program generates a random integer between 1 and 100 using &lt;code&gt;random.randint(1, 100)&lt;/code&gt;. This number will be the target the user must guess.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;User Input &amp;amp; Validation&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The user has five attempts to guess the number.&lt;/li&gt;
&lt;li&gt;If the user enters anything other than a valid integer, they are prompted to enter a number again without losing an attempt.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Feedback on Guesses&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
After each guess, the program provides feedback:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the guess is &lt;strong&gt;too low&lt;/strong&gt;, the message is: &lt;em&gt;"Too low! Try again."&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;If the guess is &lt;strong&gt;too high&lt;/strong&gt;, the message is: &lt;em&gt;"Too high! Try again."&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;If the guess is correct, the program congratulates the user and exits the game.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Game Over&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the user runs out of attempts without guessing the number, the program reveals the correct number with the message:
&amp;gt; *"Oops, sorry, the number was [number]. You are going to die :)."&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Features of the Code&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Random Number Generation&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The game uses &lt;code&gt;random.randint(1, 100)&lt;/code&gt; to create an unpredictable number, ensuring a fair and exciting challenge for every playthrough.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Input Validation&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The code prevents invalid inputs (like letters or symbols) from counting as attempts, using a &lt;code&gt;try-except&lt;/code&gt; block to handle errors gracefully.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Attempts Tracking&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The &lt;code&gt;guess_counter&lt;/code&gt; variable keeps track of how many guesses the user has made, ensuring the user gets exactly five chances.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Dynamic Feedback&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The game provides helpful hints after each incorrect guess, guiding the player toward the correct number.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Humorous Twist&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
The playful messaging adds a fun, lighthearted tone to the game, making it more entertaining.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;h3&gt;
  
  
  &lt;strong&gt;Sample Gameplay&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Start of the Game:&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;   Hello! This is Isaeus Guiang, and this is a number guessing game. 
   You have 5 chances to guess the number, or...
   you will die :).
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;User Makes Guesses:&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;   Attempt 1/5 - Your Guess :) -&amp;gt; 50
   Too high! Try again.
   Attempt 2/5 - Your Guess :) -&amp;gt; 25
   Too low! Try again.
   Attempt 3/5 - Your Guess :) -&amp;gt; 37
   Too low! Try again.
   Attempt 4/5 - Your Guess :) -&amp;gt; 43
   Too high! Try again.
   Attempt 5/5 - Your Guess :) -&amp;gt; 40
   Oops, sorry, the number was 42. You are going to die :).
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Correct Guess (Before 5 Attempts):&lt;/strong&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;   Attempt 3/5 - Your Guess :) -&amp;gt; 42
   The number is 42, and you guessed it right in 3 attempt(s)!
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;p&gt;This program is a great way to practice basic Python concepts, including loops, conditionals, user input, and error handling, while also enjoying a fun guessing game!&lt;/p&gt;

&lt;p&gt;Feel free to use my code on my GitHub: &lt;a href="https://github.com/asiguiang/Simple-python-game-Number-Guessing?tab=readme-ov-file#number-guessing-game-overview" rel="noopener noreferrer"&gt;https://github.com/asiguiang/Simple-python-game-Number-Guessing?tab=readme-ov-file#number-guessing-game-overview&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb08awh2b6297k6af6e98.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb08awh2b6297k6af6e98.png" alt="Image description" width="800" height="298"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About the Author:&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Isaeus "Asi" Guiang&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcygn53yjnzr1q5mzraw7.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community.&lt;/p&gt;

&lt;p&gt;Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;/p&gt;

&lt;p&gt;Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>python</category>
      <category>sideprojects</category>
      <category>gamechallenge</category>
      <category>student</category>
    </item>
    <item>
      <title>DevSecOps?</title>
      <dc:creator>Isaeus "Asi" Guiang</dc:creator>
      <pubDate>Mon, 18 Nov 2024 17:28:47 +0000</pubDate>
      <link>https://dev.to/asi_security/devsecops-11hp</link>
      <guid>https://dev.to/asi_security/devsecops-11hp</guid>
      <description>&lt;p&gt;&lt;strong&gt;DevSecOps is not just a role within an organization&lt;/strong&gt;; it is a holistic practice and culture that promotes collaboration among development, security, and operations teams. This paradigm shift recognizes that security should be an essential consideration throughout the entire software development lifecycle (SDLC), rather than merely an isolated function or a final checkpoint before deployment. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Necessity of DevSecOps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As organizations accelerate their software delivery through Agile and DevOps methodologies, security often becomes an afterthought, typically addressed only at the end of the development process. This reactive approach can lead to significant vulnerabilities being overlooked until late in the lifecycle, which increases the cost and effort required to rectify security flaws.&lt;/p&gt;

&lt;p&gt;Moreover, traditional methods often involve silos among the development, operations, and security teams, which can lead to disjointed efforts to manage security risks. &lt;strong&gt;DevSecOps encourages collaboration among these teams&lt;/strong&gt;, ensuring that security is a shared responsibility rather than solely the domain of a separate security team. This aligns with the modern understanding that security needs should be incorporated from the beginning of the development workflow, facilitating early detection and remediation of vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ataxopa0qy3ug6ivtdi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6ataxopa0qy3ug6ivtdi.png" alt="Image description" width="541" height="289"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;​DevSecOps is a development practice that integrates security into every stage of the software development lifecycle (SDLC), ensuring that security is a shared responsibility among development, security, and operations teams.​ This approach evolves traditional software development by embedding security measures into the core processes rather than treating them as an afterthought. &lt;/p&gt;

&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;p&gt;DevSecOps stands for development, security, and operations, and represents the automation of security practices at each phase of application development—from initial design through to integration, testing, delivery, and deployment. This seamless integration addresses security issues as they arise, enabling teams to fix vulnerabilities more efficiently before deploying software into production. The primary goal of DevSecOps is to build security into the development pipeline, promoting a culture where every team member contributes to maintaining security standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Components of DevSecOps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The DevSecOps framework encompasses several key components that ensure effective security integration:&lt;/p&gt;

&lt;p&gt;Continuous Integration and Continuous Delivery (CI/CD): In this approach, automated tests for security vulnerabilities are integrated into the CI/CD pipeline, allowing for immediate detection of issues during code development.&lt;/p&gt;

&lt;p&gt;Automated Security Testing: This includes tools that perform static and dynamic analysis of the code as it is being developed, ensuring compliance with security standards throughout the process.&lt;/p&gt;

&lt;p&gt;Threat Modeling: Incorporating threat modeling early helps identify potential vulnerabilities and mitigates them during the planning and development stages.&lt;/p&gt;

&lt;p&gt;Collaboration and Communication: Successful DevSecOps requires effective collaboration between development, operations, and security teams to create a shared understanding of security standards and practices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits of DevSecOps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Implementing DevSecOps leads to numerous advantages for organizations:&lt;/p&gt;

&lt;p&gt;Increased Security: By addressing security throughout the development cycle, organizations can reduce the risk of vulnerabilities in their applications.&lt;/p&gt;

&lt;p&gt;Faster Time to Market: DevSecOps minimizes bottlenecks by automating security checks, allowing teams to deliver higher quality software at a faster pace.&lt;/p&gt;

&lt;p&gt;Cost Efficiency: Identifying and resolving security issues early in the development process is generally cheaper than addressing them post-deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DevSecOps&lt;/strong&gt; promotes a proactive approach to security in software development, enhancing not only the safety and integrity of applications but also improving the overall efficiency of development teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;​In conclusion, the integration of security into DevOps as a formal practice known as DevSecOps is a vital response to the growing complexity of software applications and the threats they face.​&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;About the Author: &lt;br&gt;
&lt;strong&gt;Isaeus "Asi" Guiang&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnkezqxagwrlozjwhe1ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnkezqxagwrlozjwhe1ig.png" alt="Image description" width="800" height="800"&gt;&lt;/a&gt;&lt;br&gt;
Regional Captain of AWS Cloud Clubs Philippines and a dedicated student at the Polytechnic University of the Philippines. With a strong passion for cloud computing and cybersecurity, Asi has played pivotal roles as the Former Captain, of AWS Cloud Club - PUP Manila, driving collaboration and innovation in the tech community. &lt;/p&gt;

&lt;p&gt;Currently pursuing a Bachelor of Science in Computer Science, Asi has a wealth of experience, including being an AWS re/Start Course Coordinator Intern and a Soft Skills Review Instructor. He teaches practical AWS workshops and is now a Security Risk Assessment and Compliance Intern at Globe, enhancing his expertise in the field.&lt;/p&gt;

&lt;p&gt;Currently studying and focusing on Cloud Financial Operations and Security Compliance.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>security</category>
      <category>devops</category>
      <category>cybersecurity</category>
      <category>career</category>
    </item>
  </channel>
</rss>
