<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: mehdi-arfaoui</title>
    <description>The latest articles on DEV Community by mehdi-arfaoui (@mehdiarf).</description>
    <link>https://dev.to/mehdiarf</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3870292%2F6731faef-be96-4f64-8381-7dc74c5bcbda.png</url>
      <title>DEV Community: mehdi-arfaoui</title>
      <link>https://dev.to/mehdiarf</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mehdiarf"/>
    <language>en</language>
    <item>
      <title>I scanned my AWS account for disaster recovery gaps - here's what I found published: false tags: aws, devops, opensource, security</title>
      <dc:creator>mehdi-arfaoui</dc:creator>
      <pubDate>Thu, 09 Apr 2026 17:11:33 +0000</pubDate>
      <link>https://dev.to/mehdiarf/i-scanned-my-aws-account-for-disaster-recovery-gaps-heres-what-i-found-published-false-tags-2m4j</link>
      <guid>https://dev.to/mehdiarf/i-scanned-my-aws-account-for-disaster-recovery-gaps-heres-what-i-found-published-false-tags-2m4j</guid>
      <description>&lt;p&gt;Most teams know they should have a disaster recovery plan. Few know if it actually works.&lt;/p&gt;

&lt;p&gt;I built an open-source tool called &lt;a href="https://github.com/mehdi-arfaoui/Stronghold" rel="noopener noreferrer"&gt;Stronghold&lt;/a&gt; that scans AWS infrastructure and answers a simple question: &lt;strong&gt;if something fails right now, can we actually recover?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not "do we have backups configured" but "is the payment service still recoverable if eu-west-1a goes down, and do we have proof?"&lt;/p&gt;

&lt;p&gt;Here's what happened when I ran it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it yourself (30 seconds)
&lt;/h2&gt;

&lt;p&gt;No AWS credentials needed:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npx @stronghold-dr/cli demo
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This runs against built-in sample infrastructure, a realistic startup setup with 24 resources across RDS, Lambda, S3, DynamoDB, ELB, ElastiCache, and more.&lt;/p&gt;

&lt;h2&gt;
  
  
  What it found
&lt;/h2&gt;

&lt;p&gt;The demo simulates a typical startup AWS account. Here's the posture report:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;DR Posture - 2026-04-09

  Services:
    ✓ frontend       B   85/100   0 critical findings
    ✗ database       F   19/100   2 critical findings
    ! startup-api    D   53/100   4 high findings
    ✗ dns            F    0/100   1 critical finding
    ✗ storage        F   26/100   2 critical findings
    ✗ shared-files   F   28/100   3 critical findings
    ✓ cache          B   85/100   0 critical findings
    ✓ messaging      B   85/100   0 critical findings

  Score: 45/100 (D)
  Scenarios: 0/13 covered
  Evidence: 52 observed, 0 tested, 0 expired
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;45 out of 100. Grade D. Zero scenarios covered.&lt;/p&gt;

&lt;p&gt;That means: if any AZ fails, if the primary database goes down, if data gets corrupted, there is no proven recovery path for any of those cases.&lt;/p&gt;

&lt;p&gt;The scary part? This infrastructure has backups configured. It has read replicas. It looks fine in the AWS console. But when you reason about it at the &lt;strong&gt;service level&lt;/strong&gt; and ask "can we actually recover the payment service end-to-end?" — the answer is no.&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes this different from Prowler or AWS Config
&lt;/h2&gt;

&lt;p&gt;Prowler tells you "RDS instance has no backup." That's useful but incomplete.&lt;/p&gt;

&lt;p&gt;Stronghold tells you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Which service&lt;/strong&gt; is affected (not just which resource)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Which scenarios&lt;/strong&gt; are no longer survivable because of this gap&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What evidence&lt;/strong&gt; supports the current DR posture (observed config vs. actual tested recovery)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Whether the runbook&lt;/strong&gt; still matches the live infrastructure&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;How long&lt;/strong&gt; the gap has existed and whether posture is improving or degrading&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here's the scenario coverage for the demo account:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Scenario Coverage Analysis

  AZ Failure Scenarios:
    ✗ eu-west-1a failure    6 services affected   UNCOVERED
    ✗ eu-west-1b failure    5 services affected   UNCOVERED

  Region Failure Scenarios:
    ✗ eu-west-1 failure    14 services affected   UNCOVERED

  SPOF Failure Scenarios:
    ! prod-db-primary fails  4 services affected   DEGRADED
    ! prod-api-alb fails     2 services affected   DEGRADED

  Data Corruption Scenarios:
    ! database corruption    4 services affected   DEGRADED

  Summary: 0/13 covered, 3 uncovered, 10 degraded
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Zero scenarios covered. Not because there are no backups — but because the backups haven't been tested, the runbooks reference resources that have changed, and there's no proof that an end-to-end recovery would work.&lt;/p&gt;

&lt;h2&gt;
  
  
  The five questions
&lt;/h2&gt;

&lt;p&gt;Stronghold exists to answer five questions that most DR tooling skips:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;What do we actually have?&lt;/strong&gt; → Service-level mapping, not just resource inventory&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What breaks if this fails?&lt;/strong&gt; → Dependency graph with blast radius analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Do we still have a viable recovery path?&lt;/strong&gt; → Scenario coverage, not just config checks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What evidence supports that belief?&lt;/strong&gt; → Evidence maturity (observed ≠ tested)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Has our posture improved or degraded?&lt;/strong&gt; → History, trends, and DR debt tracking&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Quick start on a real account
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Generate the read-only IAM policy&lt;/span&gt;
npx @stronghold-dr/cli iam-policy &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; stronghold-policy.json

&lt;span class="c"&gt;# Scan&lt;/span&gt;
npx @stronghold-dr/cli scan &lt;span class="nt"&gt;--region&lt;/span&gt; eu-west-1

&lt;span class="c"&gt;# See your posture&lt;/span&gt;
npx @stronghold-dr/cli status

&lt;span class="c"&gt;# Check scenario coverage&lt;/span&gt;
npx @stronghold-dr/cli scenarios

&lt;span class="c"&gt;# Generate a recovery plan&lt;/span&gt;
npx @stronghold-dr/cli plan generate &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; drp.yaml
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Stronghold is &lt;strong&gt;read-only&lt;/strong&gt; - it calls &lt;code&gt;Describe&lt;/code&gt;, &lt;code&gt;List&lt;/code&gt;, and &lt;code&gt;Get&lt;/code&gt; APIs only. It makes no changes to your infrastructure. Zero telemetry.&lt;/p&gt;

&lt;h2&gt;
  
  
  Add it to your CI
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;Stronghold DR Check&lt;/span&gt;
  &lt;span class="na"&gt;uses&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;mehdi-arfaoui/stronghold-dr-check@v1&lt;/span&gt;
  &lt;span class="na"&gt;with&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;aws-region&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;eu-west-1&lt;/span&gt;
    &lt;span class="na"&gt;aws-access-key-id&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;${{ secrets.AWS_ACCESS_KEY_ID }}&lt;/span&gt;
    &lt;span class="na"&gt;aws-secret-access-key&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;${{ secrets.AWS_SECRET_ACCESS_KEY }}&lt;/span&gt;
    &lt;span class="na"&gt;fail-under-score&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;60&lt;/span&gt;
  &lt;span class="na"&gt;env&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;GITHUB_TOKEN&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;${{ secrets.GITHUB_TOKEN }}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This posts a DR impact comment on every pull request and fails the check if the score drops below your threshold.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's under the hood
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;16 AWS service scanners with bounded concurrency and retry&lt;/li&gt;
&lt;li&gt;Service detection from CloudFormation, tags, and topology&lt;/li&gt;
&lt;li&gt;39 DR validation rules across 6 categories&lt;/li&gt;
&lt;li&gt;Evidence model with 5 maturity levels&lt;/li&gt;
&lt;li&gt;Scenario coverage analysis (AZ failure, region failure, SPOF, data corruption)&lt;/li&gt;
&lt;li&gt;DRP-as-Code with executable runbooks&lt;/li&gt;
&lt;li&gt;Posture memory with finding lifecycle, DR debt, and trend tracking&lt;/li&gt;
&lt;li&gt;Governance with ownership, risk acceptance, and policy enforcement&lt;/li&gt;
&lt;li&gt;AES-256-GCM encryption, redaction, and always-on audit trail&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;TypeScript, strict mode, zero &lt;code&gt;any&lt;/code&gt;, 654 tests, 81% core coverage. AGPL-3.0.&lt;/p&gt;

&lt;h2&gt;
  
  
  Links
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;GitHub&lt;/strong&gt;: &lt;a href="https://github.com/mehdi-arfaoui/Stronghold" rel="noopener noreferrer"&gt;mehdi-arfaoui/Stronghold&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;npm&lt;/strong&gt;: &lt;a href="https://www.npmjs.com/package/@stronghold-dr/cli" rel="noopener noreferrer"&gt;@stronghold-dr/cli&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GitHub Action&lt;/strong&gt;: &lt;a href="https://github.com/mehdi-arfaoui/stronghold-dr-check" rel="noopener noreferrer"&gt;stronghold-dr-check&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Website&lt;/strong&gt;: &lt;a href="https://stronghold.software" rel="noopener noreferrer"&gt;stronghold.software&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;If you've ever wondered whether your DR plan would actually work in a real incident, try running the demo. It takes 30 seconds and you might be surprised by what a fresh pair of eyes finds, even on sample infrastructure.&lt;/p&gt;

&lt;p&gt;I'm building this solo and in the open.&lt;br&gt;
Feedback, issues, and stars are all welcome!&lt;/p&gt;

</description>
      <category>aws</category>
      <category>devops</category>
      <category>opensource</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
