<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Ali-Funk</title>
    <description>The latest articles on Forem by Ali-Funk (@alifunk).</description>
    <link>https://forem.com/alifunk</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3699166%2F6f5bb287-3a67-4f08-83ae-bd23e6d06c62.png</url>
      <title>Forem: Ali-Funk</title>
      <link>https://forem.com/alifunk</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/alifunk"/>
    <language>en</language>
    <item>
      <title>Lets say my Manager wants Multi-Cloud (AWS + GCP) in 6 months here’s how I would respond and why</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Thu, 02 Apr 2026 21:33:26 +0000</pubDate>
      <link>https://forem.com/alifunk/let-s-say-my-manager-wants-multi-cloud-aws-gcp-in-6-months-heres-how-i-would-respond-and-why-27kc</link>
      <guid>https://forem.com/alifunk/let-s-say-my-manager-wants-multi-cloud-aws-gcp-in-6-months-heres-how-i-would-respond-and-why-27kc</guid>
      <description>&lt;p&gt;A contact on LinkedIn asked a question that every cloud architect eventually hears:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Your manager says "We need to be Multi Cloud, AWS plus GCP. In 6 months."&lt;br&gt;
You’re currently 100 % in AWS. Do you push back, agree, or propose a middle path? The reason behind the request matters more than the request itself.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Here is exactly how I answered and why.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Hidden Costs of the Multi-Cloud Trend&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Transitioning to a Multi Cloud architecture is often sold as a strategic victory. When management sets a six month deadline to integrate GCP into an existing 100 % AWS environment, the first job of any engineer is to evaluate operational reality rather than marketing hype. Drawing on eight years of professional experience as a Solutions Architect, I consider this one of the most dangerous directives an engineering team can receive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Questioning the Directive First&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The very first step is always to clarify the objective. Is the company facing strict regulatory compliance that genuinely requires two clouds? Or is management simply afraid of "vendor lock in"? If the reasoning is &lt;br&gt;
fear based rather than business-driven, the resulting architecture will be flawed from day one.&lt;/p&gt;

&lt;p&gt;The one non negotiable exception is Mergers and Acquisitions. If your company just acquired an organization running natively on GCP, integrating that environment is a hard business mandate, not a trend.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Evaluating the True Costs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Egress&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;Cloud providers want your data to stay inside their ecosystem. Moving even moderate volumes of data between AWS and GCP triggers significant egress fees. The hyperscalers let data in for free but charge heavily to move it out. The network architecture required to bridge the two environments adds complexity and cost that is rarely budgeted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Team Capacity&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;Forcing a single team to master both AWS and GCP is an engineering &lt;br&gt;
anti pattern. The alternative , hiring a completely new team or launching extensive retraining programs , this cannot be done securely or effectively in just six months.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architectural Coupling&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The danger level of a six month timeline depends entirely on your compute layer. &lt;br&gt;
If your AWS environment relies heavily on proprietary managed services like Lambda and DynamoDB, a GCP integration is an operational nightmare. &lt;/p&gt;

&lt;p&gt;However, if your architecture is already heavily containerized using EKS and stateless microservices, dropping those workloads into Google Kubernetes Engine is significantly less complex.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pipeline Fragmentation&lt;/strong&gt;  &lt;/p&gt;

&lt;p&gt;Managing infrastructure state across two hyperscalers requires immense discipline. The cognitive load of preventing configuration drift while deploying to two different environments is almost never factored into management timelines. Securing two separate Identity and Access Management perimeters at the same time doubles the risk of a breach.&lt;/p&gt;

&lt;p&gt;Here is a minimal Terraform example that illustrates the immediate fragmentation:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight hcl"&gt;&lt;code&gt;&lt;span class="c1"&gt;# AWS provider&lt;/span&gt;
&lt;span class="nx"&gt;provider&lt;/span&gt; &lt;span class="s2"&gt;"aws"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="nx"&gt;region&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"eu-west-1"&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;# GCP provider already doubling the cognitive load&lt;/span&gt;
&lt;span class="nx"&gt;provider&lt;/span&gt; &lt;span class="s2"&gt;"google"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;project&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"my-gcp-project"&lt;/span&gt;
  &lt;span class="nx"&gt;region&lt;/span&gt;  &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"europe-west1"&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;# Two separate remote backends become mandatory&lt;/span&gt;
&lt;span class="nx"&gt;terraform&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="nx"&gt;backend&lt;/span&gt; &lt;span class="s2"&gt;"s3"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;      &lt;span class="c1"&gt;# AWS state&lt;/span&gt;
&lt;span class="c1"&gt;# GCP state needs its own backend GCS&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A single terraform apply now touches two completely different ecosystems. State drift detection, IAM policies, and security scanning all become twice as complex.&lt;/p&gt;

&lt;p&gt;When (and only when) Multi Cloud actually makes sense&lt;br&gt;
In rare cases Multi Cloud is the right call: strict data-residency regulations that force workloads into specific GCP regions, a highly specialized service (such as BigQuery for massive analytics that has no cost-effective AWS equivalent), or a true disaster recovery strategy that demands geographic and provider diversity.&lt;/p&gt;

&lt;p&gt;When those conditions are met, the safe middle path is not a big bang six month migration. Start with a narrow, non-critical "proof of concept" workload in GCP (e.g., a new analytics pipeline), keep the core platform in AWS, abstract common patterns with Terraform modules, and enforce strict cost and security gates before any production traffic moves.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Multi Cloud is not inherently bad, but rushing into it for the wrong reasons is expensive, risky, and almost always avoidable. The reason behind the request matters more than the request itself. Ask why first. Then protect the team and the architecture with data, not dogma.&lt;br&gt;
Sources&lt;/p&gt;

&lt;p&gt;AWS Data Transfer Out Pricing (to Internet / other clouds): &lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/ec2/pricing/on-demand/#Data_Transfer" rel="noopener noreferrer"&gt;https://aws.amazon.com/ec2/pricing/on-demand/#Data_Transfer&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Martin Fowler&lt;br&gt;&lt;br&gt;
“Don’t get locked up into avoiding lock-in” (Multi Cloud discussion): &lt;/p&gt;

&lt;p&gt;&lt;a href="https://martinfowler.com/articles/oss-lockin.html" rel="noopener noreferrer"&gt;https://martinfowler.com/articles/oss-lockin.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HashiCorp &lt;br&gt;
Workspace Best Practices for HCP Terraform (Multi Cloud state management): &lt;br&gt;
&lt;a href="https://developer.hashicorp.com/terraform/cloud-docs/workspaces/best-practices" rel="noopener noreferrer"&gt;https://developer.hashicorp.com/terraform/cloud-docs/workspaces/best-practices&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>gcp</category>
      <category>multicloud</category>
      <category>architecture</category>
    </item>
    <item>
      <title>I highly recommend for you all to see theses views on comments in your code. Great perspective!</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Tue, 31 Mar 2026 17:14:38 +0000</pubDate>
      <link>https://forem.com/alifunk/i-highly-recommend-for-you-all-to-see-theses-views-on-comments-in-your-code-great-perspective-4a9l</link>
      <guid>https://forem.com/alifunk/i-highly-recommend-for-you-all-to-see-theses-views-on-comments-in-your-code-great-perspective-4a9l</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/filozofer/i-was-asked-to-delete-my-comments-before-committing-5437" class="crayons-story__hidden-navigation-link"&gt;I was asked to delete my comments before committing&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/filozofer" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F457658%2F18cc9621-8bc2-4803-bd61-df2e97f4113e.jpg" alt="filozofer profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/filozofer" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Tual Maxime (@filozofer)
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Tual Maxime (&lt;a class="mentioned-user" href="https://dev.to/filozofer"&gt;@filozofer&lt;/a&gt;)
                
              
              &lt;div id="story-author-preview-content-3381902" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/filozofer" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F457658%2F18cc9621-8bc2-4803-bd61-df2e97f4113e.jpg" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Tual Maxime (@filozofer)&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/filozofer/i-was-asked-to-delete-my-comments-before-committing-5437" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Mar 22&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/filozofer/i-was-asked-to-delete-my-comments-before-committing-5437" id="article-link-3381902"&gt;
          I was asked to delete my comments before committing
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/git"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;git&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/productivity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;productivity&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/developer"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;developer&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/ai"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;ai&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/filozofer/i-was-asked-to-delete-my-comments-before-committing-5437" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/exploding-head-daceb38d627e6ae9b730f36a1e390fca556a4289d5a41abb2c35068ad3e2c4b5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/fire-f60e7a582391810302117f987b22a8ef04a2fe0df7e3258a5f49332df1cec71e.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;18&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/filozofer/i-was-asked-to-delete-my-comments-before-committing-5437#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              22&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            5 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>git</category>
      <category>productivity</category>
      <category>developer</category>
      <category>ai</category>
    </item>
    <item>
      <title>The AI Rebound Effect and the Transition to Systems Architecture</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Tue, 31 Mar 2026 07:12:26 +0000</pubDate>
      <link>https://forem.com/alifunk/the-ai-rebound-effect-and-the-transition-to-systems-architecture-32n9</link>
      <guid>https://forem.com/alifunk/the-ai-rebound-effect-and-the-transition-to-systems-architecture-32n9</guid>
      <description>&lt;p&gt;The reaction to the recent Claude AI outage reveals a fundamental misunderstanding of how developers should interact with artificial intelligence. &lt;/p&gt;

&lt;p&gt;Reports of developers feeling entirely unable to work without their AI assistant point to a dangerous trend of „deskilling“.&lt;/p&gt;

&lt;p&gt;John Nosta accurately describes this as the „AI rebound effect“, where improved performance masks a rapidly declining foundational ability.&lt;/p&gt;

&lt;p&gt;If an engineer relies so heavily on a probabilistic model that they cannot function when it goes offline, they are using the tool incorrectly. &lt;br&gt;
One developer on Reddit described it as : "I wrote code like a caveman"&lt;/p&gt;

&lt;p&gt;The future of software engineering requires us to elevate our skills, not abandon them. Instead of focusing purely on syntax generation and accepting the first output a model provides, I find that engineers should or even must transition into the role of systems architects.&lt;/p&gt;

&lt;p&gt;By mastering agentic workflows and deterministic execution, we shift our cognitive load from writing boilerplate code to designing complex and secure infrastructure. &lt;/p&gt;

&lt;p&gt;The AI handles the syntax, but the human must control the logic (or at least the human should be in control), the security constraints, and the integration points. &lt;/p&gt;

&lt;p&gt;Letting your core skills regress is a choice. &lt;/p&gt;

&lt;p&gt;The alternative is to step up, utilize spec driven development, and master the architecture that governs the AI.&lt;/p&gt;

&lt;p&gt;Sources:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Business Insider: AI deskilling impact on worker skills and productivity &lt;br&gt;
&lt;a href="https://www.businessinsider.com/ai-deskilling-impact-on-worker-skills-productivity-2026-3" rel="noopener noreferrer"&gt;https://www.businessinsider.com/ai-deskilling-impact-on-worker-skills-productivity-2026-3&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Psychology Today: The AI Rebound Effect and Cognitive Decline &lt;br&gt;
&lt;a href="https://www.psychologytoday.com/us/blog/the-digital-self/202508/ai-rebound-the-paradoxical-drop-after-the-ai-lift" rel="noopener noreferrer"&gt;https://www.psychologytoday.com/us/blog/the-digital-self/202508/ai-rebound-the-paradoxical-drop-after-the-ai-lift&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hyper AI: The Great AI Deskilling Trend &lt;a href="https://hyper.ai/en/stories/93549dd29c8a15321052bf0d1d71a5e4" rel="noopener noreferrer"&gt;https://hyper.ai/en/stories/93549dd29c8a15321052bf0d1d71a5e4&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>architecture</category>
      <category>ai</category>
      <category>devops</category>
      <category>design</category>
    </item>
    <item>
      <title>The European Commission AWS Breach and the Failure of Paper Security</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Fri, 27 Mar 2026 13:33:07 +0000</pubDate>
      <link>https://forem.com/alifunk/the-european-commission-aws-breach-and-the-failure-of-paper-security-5e10</link>
      <guid>https://forem.com/alifunk/the-european-commission-aws-breach-and-the-failure-of-paper-security-5e10</guid>
      <description>&lt;p&gt;The European Commission, the executive body of the European Union, is currently investigating a security breach of its Amazon Web Services infrastructure. &lt;/p&gt;

&lt;p&gt;According to a report published today by Bleeping Computer, a threat actor gained access to at least one AWS account used to manage the Commission's cloud environment. Although the incident was detected quickly, the breach demonstrates a critical reality: &lt;br&gt;
administrative checklists and compliance frameworks fail where deterministic architecture is missing. If the most heavily regulated entity in Europe can suffer an AWS breach, paper security is proven ineffective against real-world threat actors.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The Misunderstood Shared Responsibility Model&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;When an enterprise-level breach occurs on AWS, the failure is almost never on the side of the provider. The AWS Shared Responsibility Model is explicit. Amazon secures the facility, the compute hardware, the hypervisor, and the underlying global network. The customer is entirely responsible for securing everything in the cloud: the configuration, the data, the applications, and the identity perimeter.&lt;/p&gt;

&lt;p&gt;AWS makes this distinction crystal clear: Amazon secures the cloud, while the customer secures what is inside the cloud. You cannot audit your way to a secure configuration. Threat actors do not read your ISO 27001 documentation. They scan for misconfigured S3 buckets, overly permissive IAM roles, exposed access keys, and configuration drift.&lt;/p&gt;

&lt;p&gt;The moment you rely on manual changes in the AWS Management Console, you introduce human error. In a cloud environment, that single human error can scale instantly into a structural compromise.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Deterministic Security through Infrastructure as Code&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The only reliable way to prevent cloud takeovers is to remove manual intervention entirely. Security must be engineered directly into the deployment pipeline using Infrastructure as Code.&lt;/p&gt;

&lt;p&gt;By defining your entire AWS environment with Terraform, you transform abstract security policies into mathematical certainty. Every IAM policy, every private subnet, every security group rule, and every encryption setting is declared in code, version-controlled, peer-reviewed, and applied through automated pipelines.&lt;/p&gt;

&lt;p&gt;The Terraform &lt;strong&gt;state file&lt;/strong&gt; becomes the single source of truth for your infrastructure. If an engineer attempts to manually alter a configuration in the AWS console, the next Terraform run will detect the drift and revert the environment back to its secure baseline. &lt;/p&gt;

&lt;p&gt;This mechanism directly prevents the exact type of configuration drift that attackers exploit to gain and expand their foothold.&lt;/p&gt;

&lt;p&gt;Here is a minimal example that enforces least privilege and blocks dangerous actions attackers commonly abuse:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight hcl"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Enforce least-privilege IAM with no long-lived access keys&lt;/span&gt;
&lt;span class="nx"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_iam_role"&lt;/span&gt; &lt;span class="s2"&gt;"app_role"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;name&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"ec2-app-role"&lt;/span&gt;

  &lt;span class="nx"&gt;assume_role_policy&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;jsonencode&lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt;
    &lt;span class="nx"&gt;Version&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"2012-10-17"&lt;/span&gt;
    &lt;span class="nx"&gt;Statement&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[{&lt;/span&gt;
      &lt;span class="nx"&gt;Effect&lt;/span&gt;    &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"Allow"&lt;/span&gt;
      &lt;span class="nx"&gt;Principal&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;Service&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"ec2.amazonaws.com"&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt;
      &lt;span class="nx"&gt;Action&lt;/span&gt;    &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"sts:AssumeRole"&lt;/span&gt;
    &lt;span class="p"&gt;}]&lt;/span&gt;
  &lt;span class="p"&gt;})&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="nx"&gt;resource&lt;/span&gt; &lt;span class="s2"&gt;"aws_iam_policy"&lt;/span&gt; &lt;span class="s2"&gt;"least_privilege"&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;name&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"least-privilege-policy"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A single terraform apply now guarantees these boundaries cannot be weakened by console clicks or emergency fixes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enforcing the Identity Perimeter&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional network boundaries are obsolete in cloud environments. Identity is the only true perimeter left.&lt;br&gt;
To prevent the unauthorized access seen in the European Commission breach, strict Identity and Access Management must be enforced at the API level. This means abandoning static, long-lived access keys in favor of temporary credentials generated through AWS IAM Identity Center or IAM Roles Anywhere. Every workload, every autonomous agent, and every service must operate under the strict principle of least privilege.&lt;br&gt;
If an attacker compromises a single service, well-defined execution boundaries must prevent lateral movement into sensitive databases or escalation to higher-privilege administrative roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Compliance is a byproduct of good engineering, not the other way around. Building a resilient AWS environment requires deep operational experience and a genuine commitment to deterministic architecture.&lt;/p&gt;

&lt;p&gt;We must stop treating security as an administrative burden and start treating it as a "core engineering discipline." &lt;/p&gt;

&lt;p&gt;In my view "Paper policies" do not stop breaches. Code does.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sources&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Bleeping Computer Report on the European Commission AWS Breach &lt;/p&gt;

&lt;p&gt;(March 27, 2026): &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-hack/" rel="noopener noreferrer"&gt;https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-hack/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;AWS Shared Responsibility Model: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/shared-responsibility-model/" rel="noopener noreferrer"&gt;https://aws.amazon.com/shared-responsibility-model/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HashiCorp Terraform State Management: &lt;/p&gt;

&lt;p&gt;&lt;a href="https://developer.hashicorp.com/terraform/language/state" rel="noopener noreferrer"&gt;https://developer.hashicorp.com/terraform/language/state&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>security</category>
      <category>terraform</category>
    </item>
    <item>
      <title>The End of the Demo Phase: Securing AI Infrastructure in the Enterprise</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Sat, 21 Mar 2026 11:22:32 +0000</pubDate>
      <link>https://forem.com/alifunk/the-end-of-the-demo-phase-securing-ai-infrastructure-in-the-enterprise-2l0n</link>
      <guid>https://forem.com/alifunk/the-end-of-the-demo-phase-securing-ai-infrastructure-in-the-enterprise-2l0n</guid>
      <description>&lt;p&gt;&lt;strong&gt;The Market Reality&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We are officially moving past the demo phase of artificial intelligence. The new NVIDIA certification framework correctly categorizes AI Networking and AI Operations as distinct professional tracks. Enterprise value is no longer created by chatting with a generative model. It is created by integrating these systems into highly secure cloud environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Architectural Divide&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The industry is currently splitting into two definitive paths. You are either building intelligence or you are building infrastructure. While the application track focuses on probabilistic generative models, the infrastructure track demands absolute deterministic control. The application track is rapidly fragmenting into countless new tools, while the infrastructure track relies on the permanent constants of physical networks, compute clusters, and Zero Trust architecture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Security Mandate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can design the most advanced multimodal system in the world. If you deploy it into a Virtual Private Cloud with broad subnet allowances and weak ingress rules, you have failed the enterprise.&lt;/p&gt;

&lt;p&gt;While rapid iteration is valuable in R&amp;amp;D, production environments demand deterministic controls. Probabilistic systems guess and iterate — when they are allowed to iterate across an unsecured network, they become a critical vulnerability. A broad network configuration is a lazy engineering practice that breaks isolation and expands the blast radius.&lt;/p&gt;

&lt;p&gt;Here’s the difference in practice (Terraform):&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight terraform"&gt;&lt;code&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;FAIL&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="nx"&gt;Demo&lt;/span&gt; &lt;span class="nx"&gt;era&lt;/span&gt; &lt;span class="nx"&gt;configuration&lt;/span&gt;
&lt;span class="nx"&gt;ingress&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="nx"&gt;from_port&lt;/span&gt;   &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;443&lt;/span&gt;
&lt;span class="nx"&gt;to_port&lt;/span&gt;     &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;443&lt;/span&gt;
&lt;span class="nx"&gt;protocol&lt;/span&gt;    &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tcp"&lt;/span&gt;
&lt;span class="nx"&gt;cidr_blocks&lt;/span&gt; &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"0.0.0.0/0"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;  &lt;span class="c1"&gt;# This opens up to the entire world!&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;PASS&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="nx"&gt;Production&lt;/span&gt; &lt;span class="nx"&gt;era&lt;/span&gt; &lt;span class="nx"&gt;Zero&lt;/span&gt; &lt;span class="nx"&gt;Trust&lt;/span&gt; &lt;span class="nx"&gt;configuration&lt;/span&gt;
&lt;span class="nx"&gt;ingress&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
&lt;span class="nx"&gt;description&lt;/span&gt;      &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"HTTPS from internal networks"&lt;/span&gt;
&lt;span class="nx"&gt;from_port&lt;/span&gt;        &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;443&lt;/span&gt;
&lt;span class="nx"&gt;to_port&lt;/span&gt;          &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;443&lt;/span&gt;
&lt;span class="nx"&gt;protocol&lt;/span&gt;         &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="s2"&gt;"tcp"&lt;/span&gt;
&lt;span class="nx"&gt;cidr_blocks&lt;/span&gt;      &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="s2"&gt;"10.0.0.0/16"&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="nx"&gt;security_groups&lt;/span&gt;  &lt;span class="p"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;aws_security_group&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;app&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;id&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt; &lt;span class="c1"&gt;# Limit access to a specific application security group&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp0dwxgtuisn2fm73uv19.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp0dwxgtuisn2fm73uv19.png" alt=" " width="800" height="282"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Operational Execution&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;My operational reality is securing this foundation. Bringing eight years of operational IT experience into my current AWS Solutions Architect training, I understand that data scientists need a highly restricted environment: VPC endpoints only, no public subnets, IAM roles with least-privilege access for SageMaker or Bedrock, network ACLs combined with security groups, and private model registries.&lt;/p&gt;

&lt;p&gt;This aligns perfectly with my direct progression toward a Master of Business Administration in IT Security and Compliance. Securing compute clusters and enforcing Zero Trust network boundaries is the only way to move intelligent systems from isolated tests into production. This requires strict Terraform execution and absolute adherence to compliance standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The future of enterprise scale belongs to those who build the secure boundaries.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sources&lt;/p&gt;

&lt;p&gt;1.NVIDIA Deep Learning Institute Certification Framework: &lt;br&gt;
&lt;a href="https://www.nvidia.com/en-us/training/certification/" rel="noopener noreferrer"&gt;https://www.nvidia.com/en-us/training/certification/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.AWS Security Best Practices for Machine Learning: &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/sagemaker/latest/dg/security.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/sagemaker/latest/dg/security.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3.NIST Artificial Intelligence Risk Management Framework: &lt;br&gt;
&lt;a href="https://www.nist.gov/itl/ai-risk-management-framework" rel="noopener noreferrer"&gt;https://www.nist.gov/itl/ai-risk-management-framework&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4.HashiCorp Terraform AWS Provider Documentation: &lt;br&gt;
&lt;a href="https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group" rel="noopener noreferrer"&gt;https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;5.AWS Well Architected Framework Security Pillar: &lt;br&gt;
&lt;a href="https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/welcome.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloud</category>
      <category>devops</category>
      <category>security</category>
    </item>
    <item>
      <title>Zero Trust Architecture for AI Runtime Execution</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Tue, 17 Mar 2026 22:03:04 +0000</pubDate>
      <link>https://forem.com/alifunk/zero-trust-architecture-for-ai-runtime-execution-151e</link>
      <guid>https://forem.com/alifunk/zero-trust-architecture-for-ai-runtime-execution-151e</guid>
      <description>&lt;p&gt;The introduction of the Bedrock AgentCore Runtime Shell Command elevates large language models from text generators to active system participants. This capability demands a strict zero trust architecture.&lt;/p&gt;

&lt;p&gt;Enterprise operations require predictability. When deploying an autonomous shell, the infrastructure must enforce a zero trust baseline. Giving a probabilistic model direct interaction with an operational environment is a massive paradigm shift. We can no longer rely on prompt engineering to secure an enterprise environment. Trusting a generative model to obey natural language constraints is a structural vulnerability. Instead, we must apply strict deterministic limits.&lt;/p&gt;

&lt;p&gt;Here is how we build the architecture for an autonomous shell:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Network Isolation&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
The execution environment must be entirely sealed. Place the Bedrock agent runtime in a dedicated Virtual Private Cloud with no inbound internet access. Outbound connections must be explicitly allowed to approved endpoints only.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Identity and Access Management&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
The role assumed by the agent must have a strict permissions boundary. It should never have the ability to alter its own permissions or create new policy versions. Limit the blast radius to the exact resources required for the task.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;Immutable Logging&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
Every system command generated and executed by the shell must be recorded. Send these logs to an isolated storage bucket where the agent has zero write access. You need a verifiable audit trail of every automated action.&lt;/p&gt;

&lt;p&gt;Security is not optional. We MUST build environments that dictate the rules to the AI. We MUST treat the autonomous shell exactly like an unverified external entity. Security is established by deterministic infrastructure rules, never by generative models.&lt;/p&gt;

&lt;p&gt;Sources:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/about-aws/whats-new/2026/03/bedrock-agentcore-runtime-shell-command/" rel="noopener noreferrer"&gt;https://aws.amazon.com/about-aws/whats-new/2026/03/bedrock-agentcore-runtime-shell-command/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://docs.aws.amazon.com/bedrock/latest/userguide/security-iam.html" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/bedrock/latest/userguide/security-iam.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://aws.amazon.com/architecture/security-identity-compliance/" rel="noopener noreferrer"&gt;https://aws.amazon.com/architecture/security-identity-compliance/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>bedrock</category>
      <category>ai</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Why End-to-End Encryption Cannot Protect Infrastructure Metadata</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Mon, 09 Mar 2026 20:30:31 +0000</pubDate>
      <link>https://forem.com/alifunk/why-end-to-end-encryption-cannot-protect-infrastructure-metadata-4bj4</link>
      <guid>https://forem.com/alifunk/why-end-to-end-encryption-cannot-protect-infrastructure-metadata-4bj4</guid>
      <description>&lt;p&gt;The recent incident involving Proton and the FBI is not a technical failure of encryption. It is a harsh reminder of a fundamental architectural truth:&lt;/p&gt;

&lt;p&gt;end-to-end encryption protects the payload, but network infrastructure inevitably generates metadata. &lt;/p&gt;

&lt;p&gt;When enterprise architects or privacy advocates confuse encrypted storage with "absolute" anonymity, they create a massive vulnerability in their threat model, at least that´s my view.&lt;/p&gt;

&lt;p&gt;At its core, end-to-end encryption ensures that the &lt;strong&gt;content&lt;/strong&gt; of a message remains cryptographically sealed between the sender and the recipient. The service provider cannot read the payload. &lt;/p&gt;

&lt;p&gt;However, delivering that payload requires &lt;em&gt;routing&lt;/em&gt;. It requires session tokens, account creation timestamps, payment gateways, and recovery email addresses. This operational "exhaust" is the metadata and that metadata can be analyzed.&lt;/p&gt;

&lt;p&gt;When legal compliance frameworks and cross-border assistance treaties are activated, authorities do not need to break the AES or RSA encryption of the message content. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What do they have to do instead to get around it ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They simply target the metadata. A recovery email address linked to a different provider or a logged IP address from a specific session is often more than enough to establish identity.&lt;/p&gt;

&lt;p&gt;The industry is finally beginning to recognize this vulnerability at the network layer. For example, Mullvad VPN recently integrated DAITA (Defense against AI-guided Traffic Analysis) into their infrastructure. &lt;/p&gt;

&lt;p&gt;Read more about it here: &lt;a href="https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita" rel="noopener noreferrer"&gt;https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Because modern AI can analyze the size and timing of encrypted packets to accurately &lt;strong&gt;infer&lt;/strong&gt; user activity, DAITA pads all data packets to a constant size and injects random "dummy" traffic into the tunnel. &lt;br&gt;
This feature is a direct architectural response to the fact that payload encryption is no longer enough. The battleground has entirely shifted to obscuring the operational exhaust.&lt;/p&gt;

&lt;p&gt;However, while tools like DAITA protect real-time traffic analysis from ISPs or data brokers, they do not solve the static identity problem. &lt;/p&gt;

&lt;p&gt;After eight years in operational IT, the most common architectural flaw I observe is the &lt;em&gt;assumption&lt;/em&gt; that a secure application automatically provides a secure environment. But the &lt;em&gt;assumption&lt;/em&gt; is what I see as a mindset problem. &lt;/p&gt;

&lt;p&gt;If you deploy a highly encrypted service but fail to govern the underlying identity verification mechanisms or account recovery paths, you have only shifted the vulnerability.&lt;/p&gt;

&lt;p&gt;Trusting a third-party service provider ultimately means trusting THEIR local legal jurisdiction and their logging mechanisms. Marketing claims about safe haven data centers do not override international legal cooperation.&lt;/p&gt;

&lt;p&gt;If your threat model requires &lt;strong&gt;absolute operational anonymity&lt;/strong&gt;, relying on a _public _ SaaS provider is architecturally insufficient, regardless of how "strong" their encryption is. You must &lt;strong&gt;govern&lt;/strong&gt; the ENTIRE DATA LIFECYCLE, from the physical network routing up to the application layer. &lt;/p&gt;

&lt;p&gt;That is very expensive. That is why only the so-called "Hyperscalers" Amazon Web Services, Google Cloud and Microsoft Azure can do it. &lt;/p&gt;

&lt;p&gt;To truly understand this vulnerability, we must visualize the network journey. The following architecture diagram maps a standard secure connection. Notice how the core payload is protected, yet the operational exhaust like DNS requests, routing IP addresses, and session logs remains fully exposed at multiple infrastructure layers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Visual Proof: Payload vs. Metadata Exhaust&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9lwhvy8ukj3c2voqta2m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9lwhvy8ukj3c2voqta2m.png" alt=" " width="800" height="692"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This reality completely dismantles the illusion that small-scale operators can realistically govern the entire data lifecycle &lt;strong&gt;without&lt;/strong&gt; relying on external infrastructure. It proves that true digital sovereignty is a financial issue, not just a technical one.&lt;/p&gt;

&lt;p&gt;Everything else is just an illusion of privacy.&lt;/p&gt;

&lt;p&gt;Sources:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Proton: FBI user identification shakes Swiss data protection &lt;br&gt;
&lt;a href="https://www.heise.de/en/news/Proton-FBI-user-identification-shakes-Swiss-data-protection-11203086.html" rel="noopener noreferrer"&gt;https://www.heise.de/en/news/Proton-FBI-user-identification-shakes-Swiss-data-protection-11203086.html&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Proton Legal and Privacy Policy&lt;br&gt;
&lt;a href="https://proton.me/legal/privacy" rel="noopener noreferrer"&gt;https://proton.me/legal/privacy&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Mullvad VPN: Introducing Defense against AI-guided Traffic Analysis (DAITA)&lt;br&gt;
&lt;a href="https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita" rel="noopener noreferrer"&gt;https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Electronic Frontier Foundation: The Problem with Metadata&lt;br&gt;
&lt;a href="https://www.eff.org/deeplinks/2013/06/why-metadata-matters" rel="noopener noreferrer"&gt;https://www.eff.org/deeplinks/2013/06/why-metadata-matters&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>privacy</category>
      <category>infosec</category>
      <category>architecture</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Architecting Zero Trust for Autonomous Agents</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Sat, 07 Mar 2026 22:03:43 +0000</pubDate>
      <link>https://forem.com/alifunk/architecting-zero-trust-for-autonomous-agents-1b4h</link>
      <guid>https://forem.com/alifunk/architecting-zero-trust-for-autonomous-agents-1b4h</guid>
      <description>&lt;p&gt;&lt;u&gt;&lt;strong&gt;Network Segregation and Identity Boundaries&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Integrating autonomous systems and agentic orchestration fundamentally changes enterprise cloud architecture. Granting software the ability to execute dynamic decisions requires &lt;strong&gt;"absolute"&lt;/strong&gt;governance. &lt;/p&gt;

&lt;p&gt;When you deploy these agents into production, you are introducing a highly capable entity inside your perimeter. Securing this new operational paradigm requires a dual approach: strict network isolation at the infrastructure layer and granular execution boundaries at the identity layer.&lt;/p&gt;

&lt;p&gt;Deploying autonomous agents into a flat network is a critical vulnerability. If an agent is compromised or hallucinates an incorrect operational path, the blast radius must be physically contained. Utilizing AWS Transit Gateway allows us to architect strict routing domains. The agents are placed in isolated virtual private clouds that cannot communicate directly with core enterprise workloads. All traffic is forced through centralized security inspection hubs. This ensures that even if an agent attempts unauthorized lateral movement, the underlying network architecture mathematically blocks the routing.&lt;/p&gt;

&lt;p&gt;However, network isolation is only half the architecture. The agent must also be restricted in what AWS APIs it can call. Implementing IAM Permissions Boundaries ensures that an agent cannot escalate its own privileges or modify its own guardrails. By combining strict identity policies with resource tags, we ensure the agent only interacts with explicitly approved data sets and services. This creates a hard ceiling on the maximum possible permissions the agent can assume, regardless of the role it is executing.&lt;/p&gt;

&lt;p&gt;True architectural leverage comes from enabling advanced capabilities while limiting their risk. Sounds obvious but it isn´t. &lt;/p&gt;

&lt;p&gt;Combining firstly "Transit Gateway routing isolation" with secondly &lt;br&gt;
"IAM permissions boundaries" provides the exact governance required to *&lt;em&gt;safely *&lt;/em&gt; integrate autonomous orchestration into modern environments.&lt;/p&gt;

&lt;p&gt;You build the infrastructure so the software cannot break the rules.&lt;/p&gt;

&lt;p&gt;Sounds abstract in an article but if you get this wrong in the real world the consequences are news worthy.&lt;/p&gt;

&lt;p&gt;Here are some real world examples:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Register:&lt;/strong&gt; Vibe coding service Replit deleted production database&lt;br&gt;
&lt;a href="https://www.theregister.com/2025/07/21/replit_saastr_vibe_coding_incident/" rel="noopener noreferrer"&gt;https://www.theregister.com/2025/07/21/replit_saastr_vibe_coding_incident/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Guardian:&lt;/strong&gt; Amazon cloud hit by outages caused by AI tools&lt;br&gt;
&lt;a href="https://www.theguardian.com/technology/2026/feb/20/amazon-cloud-outages-ai-tools-amazon-web-services-aws" rel="noopener noreferrer"&gt;https://www.theguardian.com/technology/2026/feb/20/amazon-cloud-outages-ai-tools-amazon-web-services-aws&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;AWS Transit Gateway Architecture&lt;br&gt;
&lt;a href="https://aws.amazon.com/transitgateway/" rel="noopener noreferrer"&gt;https://aws.amazon.com/transitgateway/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;AWS IAM Permissions Boundaries&lt;br&gt;
&lt;a href="https://aws.amazon.com/iam/" rel="noopener noreferrer"&gt;https://aws.amazon.com/iam/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;AWS Cloud Security&lt;br&gt;
&lt;a href="https://aws.amazon.com/security/" rel="noopener noreferrer"&gt;https://aws.amazon.com/security/&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>aws</category>
      <category>ai</category>
      <category>architecture</category>
      <category>iam</category>
    </item>
    <item>
      <title>Why Bare Metal Nostalgia is Dead and Cloud Governance is the New Sovereignty</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Sun, 01 Mar 2026 23:21:38 +0000</pubDate>
      <link>https://forem.com/alifunk/why-bare-metal-nostalgia-is-dead-and-cloud-governance-is-the-new-sovereignty-78f</link>
      <guid>https://forem.com/alifunk/why-bare-metal-nostalgia-is-dead-and-cloud-governance-is-the-new-sovereignty-78f</guid>
      <description>&lt;p&gt;The romantic idea of the isolated local server is dead. Let us look at the absolute reality of enterprise architecture in 2026. The cloud won the infrastructure war. Even the loudest advocates for European digital sovereignty, like the Schwarz Group with their STACKIT initiative, recently realized they had to form a massive strategic partnership with Google Cloud to actually deliver modern services. Retreating entirely to local hardware is operational suicide for any globally scaling business.&lt;/p&gt;

&lt;p&gt;But acknowledging that the hyperscalers won does not mean we have to surrender our architecture to them.&lt;/p&gt;

&lt;p&gt;Right now, cloud providers are using their market dominance to fund their massive artificial intelligence bubble. They are raising compute prices and forcing their enterprise customers to foot the bill. Companies that built their entire infrastructure using proprietary click operations within a single provider dashboard are now trapped in a devastating financial lock in. They are bleeding cash with absolutely zero leverage to negotiate.&lt;/p&gt;

&lt;p&gt;The immediate reaction from traditional IT departments is panic. They want to retreat. They want to buy bare metal, rack physical servers in basements, and hire traditional system integrators to plug in cables. &lt;br&gt;
But the traditional system integrator is an outdated concept ( I know because I am re-training to get official certified as one). It is a piece of paper designed to bypass human resources filters, not a strategy for building modern, resilient global architecture.&lt;br&gt;
For that, at least in my view, you need to become a Cloud Architect.&lt;/p&gt;

&lt;p&gt;True digital sovereignty in 2026 does not mean owning the physical metal. It means &lt;strong&gt;owning the abstraction layer.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Real power lies in infrastructure as code. If you use tools like Terraform to define your entire environment via the command line interface, you own the architectural blueprint. You utilize the hyperscaler, but the hyperscaler &lt;strong&gt;does not own you.&lt;/strong&gt; Your enterprise architecture is not "held hostage" inside their proprietary menus.&lt;/p&gt;

&lt;p&gt;This is where infrastructure as code transforms from a technical practice into a financial weapon. I call it &lt;strong&gt;"Architectural Leverage."&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When your entire system is abstracted into code, you hold the ultimate negotiating power. If a cloud provider suddenly doubles their compute pricing to fund their algorithmic models, you do not panic. You do not beg your account manager for a discount. You simply change the provider variables in your codebase and deploy your environment somewhere else. &lt;br&gt;
At least you should.&lt;br&gt;
You use &lt;strong&gt;portability&lt;/strong&gt; to keep the cloud providers in check and your costs low.&lt;/p&gt;

&lt;p&gt;The industry does not need traditional network administrators anymore. It desperately needs modern cloud governance engineers. Over my eight years of professional experience, I have seen the cycles of outsourcing and the inevitable structural failures it causes. Enterprises now require professionals who can execute three core directives:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1.Design abstracted deployments

2.Aggressively audit billing cycles

3.Ensure structural flexibility to shift workloads without rebuilding
the foundation
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Digital sovereignty is no longer about avoiding the cloud. It is about using strict code governance to dictate exactly where the enterprise spends its money.&lt;/p&gt;

&lt;p&gt;Sources:&lt;/p&gt;

&lt;p&gt;1.Basecamp The Big Cloud Exit FAQ&lt;br&gt;
&lt;a href="https://world.hey.com/dhh/the-big-cloud-exit-faq-20274010" rel="noopener noreferrer"&gt;https://world.hey.com/dhh/the-big-cloud-exit-faq-20274010&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.Andreessen Horowitz The Cost of Cloud a Trillion Dollar Paradox&lt;br&gt;
&lt;a href="https://a16z.com/2021/05/27/cost-of-cloud-paradox/" rel="noopener noreferrer"&gt;https://a16z.com/2021/05/27/cost-of-cloud-paradox/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3.CUDO Compute Why AI teams need cloud infrastructure without vendor lock ins&lt;br&gt;
&lt;a href="https://www.cudocompute.com/blog/why-ai-teams-need-cloud-infrastructure-without-vendor-lock-ins" rel="noopener noreferrer"&gt;https://www.cudocompute.com/blog/why-ai-teams-need-cloud-infrastructure-without-vendor-lock-ins&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;4.Luminis Digital Sovereignty and the Public Cloud Navigating Azure in a European Context&lt;br&gt;
&lt;a href="https://www.luminis.eu/blog/digital-sovereignty-and-the-public-cloud-navigating-azure-in-a-european-ccontext/" rel="noopener noreferrer"&gt;https://www.luminis.eu/blog/digital-sovereignty-and-the-public-cloud-navigating-azure-in-a-european-ccontext/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>cloud</category>
      <category>devops</category>
      <category>terraform</category>
    </item>
    <item>
      <title>The Trillion Dollar Smokescreen and why Replacing Engineers with Algorithms is a Structural Failure</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Thu, 26 Feb 2026 23:19:16 +0000</pubDate>
      <link>https://forem.com/alifunk/the-trillion-dollar-smokescreen-and-why-replacing-engineers-with-algorithms-is-a-structural-failure-3nea</link>
      <guid>https://forem.com/alifunk/the-trillion-dollar-smokescreen-and-why-replacing-engineers-with-algorithms-is-a-structural-failure-3nea</guid>
      <description>&lt;p&gt;The recent memo from Goldman Sachs detailing job cuts under the guise of an Artificial Intelligence push is not an isolated incident. It is the exact blueprint of the current tech market. We are watching executives confuse cost reduction with value creation. Over the past few years, the industry "overhired" massively. Now, Artificial Intelligence is being deployed as the ultimate corporate smokescreen to justify restructuring, leaving the actual tech workers to pay the heavy price.&lt;/p&gt;

&lt;p&gt;Let us be absolutely clear about the financial reality. Firing your engineers to fund algorithmic initiatives does not create new business value. It merely shifts capital from internal payroll directly into the pockets of a few select cloud providers and hardware giants. The workers lose their livelihoods, while the enterprise gains exactly zero competitive advantage. Most companies do not even possess the clean data infrastructure required to utilize these models effectively. They are buying the hype, but only the "Hyperscalers" are taking home the actual profit.&lt;/p&gt;

&lt;p&gt;From an architectural perspective, this mass replacement of human capital is a catastrophic compliance failure waiting to happen. If a bank or enterprise replaces its technical workforce with language models, it inherently destroys its human auditing layer. A language model generates syntax, but it cannot take legal responsibility. When executives cut the staff who architect, validate, and secure the output, they are trading human governance for automated liability. Over my eight years of professional experience, I have seen exactly what happens when you remove the governance layer. The entire system collapses under its own weight.&lt;/p&gt;

&lt;p&gt;This does not happen overnight. It is a slow and painful process in which those who had the privilege to not be cut have to pick up the work of those who were let go. Over time, those people get overworked and undervalued because they have to do more with fewer people. They are purposefully overlooked until they have no choice other than to leave too, willingly this time.&lt;/p&gt;

&lt;p&gt;Do not get me wrong. Artificial Intelligence is not inherently bad. It is a powerful tool. But it is just that: a tool.&lt;/p&gt;

&lt;p&gt;It is not a magical solution that fixes broken enterprise architecture or replaces the need for senior oversight. We are still in the early stages of figuring out how to actually integrate these systems without compromising security and digital sovereignty.&lt;/p&gt;

&lt;p&gt;Until we understand the operational boundaries of this tool, treating it as a direct replacement for human intellect and experience is just reckless management. Driven by exactly what you would expect: the fear of being left behind, also known as FOMO.&lt;/p&gt;

&lt;p&gt;But who actually got left behind?&lt;/p&gt;

&lt;p&gt;The people who gave their lives to the companies that just fired them. Some of us will remember the age of so called Artificial Intelligence as the time companies thought that firing under the disguise of AI would go unnoticed.&lt;/p&gt;

&lt;p&gt;For those of you who read this far: I hope you see it too. Workers and humans are the ones who lost their livelihoods because a chosen few used the hype they themselves created to get even richer than they already were.&lt;/p&gt;

&lt;p&gt;Make no mistake, we are operating inside a massive Artificial Intelligence bubble. But the tide is turning. More and more people are finally catching on to the fact that this unchecked hype has inflated a bubble completely devoid of actual business value. The future of technology belongs to those who govern the systems, not those who blindly trust the generated output. It is time we hold the industry accountable for selling a narrative that profits a few at the expense of the workers who actually built the foundation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Reuters Goldman Sachs eyes job cuts and hiring slowdown amid AI push&lt;br&gt;
&lt;a href="https://www.reuters.com/business/world-at-work/goldman-sachs-eyes-job-cuts-hiring-slowdown-amid-ai-push-memo-shows-2025-10-14/" rel="noopener noreferrer"&gt;https://www.reuters.com/business/world-at-work/goldman-sachs-eyes-job-cuts-hiring-slowdown-amid-ai-push-memo-shows-2025-10-14/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Goldman Sachs Gen AI Too much spend too little benefit&lt;br&gt;
&lt;a href="https://www.goldmansachs.com/insights/top-of-mind/gen-ai-too-much-spend-too-little-benefit" rel="noopener noreferrer"&gt;https://www.goldmansachs.com/insights/top-of-mind/gen-ai-too-much-spend-too-little-benefit&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Forbes AI Study 2025 Why Enterprises Struggle to Measure AI ROI&lt;br&gt;
&lt;a href="https://www.mavvrik.ai/forbes-ai-study-2025/" rel="noopener noreferrer"&gt;https://www.mavvrik.ai/forbes-ai-study-2025/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Gartner Predicts 30 Percent of Generative AI Projects Will Be Abandoned&lt;br&gt;
&lt;a href="https://www.gartner.com/en/newsroom/press-releases/2024-07-29-gartner-predicts-30-percent-of-generative-ai-projects-will-be-abandoned-after-proof-of-concept-by-end-of-2025" rel="noopener noreferrer"&gt;https://www.gartner.com/en/newsroom/press-releases/2024-07-29-gartner-predicts-30-percent-of-generative-ai-projects-will-be-abandoned-after-proof-of-concept-by-end-of-2025&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Layoffs Tracker&lt;br&gt;
&lt;a href="https://layoffs.fyi/" rel="noopener noreferrer"&gt;https://layoffs.fyi/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;ENISA Artificial Intelligence&lt;br&gt;
&lt;a href="https://www.enisa.europa.eu/topics/artificial-intelligence" rel="noopener noreferrer"&gt;https://www.enisa.europa.eu/topics/artificial-intelligence&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>architecture</category>
      <category>management</category>
      <category>career</category>
    </item>
    <item>
      <title>The Illusion of Digital Sovereignty: Why Vendor Swapping is Not a Compliance Strategy</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Mon, 23 Feb 2026 21:12:52 +0000</pubDate>
      <link>https://forem.com/alifunk/the-illusion-of-digital-sovereignty-why-vendor-swapping-is-not-a-compliance-strategy-43jf</link>
      <guid>https://forem.com/alifunk/the-illusion-of-digital-sovereignty-why-vendor-swapping-is-not-a-compliance-strategy-43jf</guid>
      <description>&lt;p&gt;The recent announcement that the Schwarz Group is moving hundreds of thousands of employees to Google Workspace is being marketed as a "triumph of digital sovereignty". &lt;/p&gt;

&lt;p&gt;They built an impressive European data center infrastructure with STACKIT. But migrating from one American hyperscaler to another and calling it sovereignty is essentially an official declaration of surrender. &lt;/p&gt;

&lt;p&gt;It is a brilliant marketing campaign, but from an enterprise architecture and compliance perspective, it is a structural failure.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The Cryptographic Facade&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;To be clear, the technical execution of the storage layer is solid. &lt;br&gt;
Schwarz Digits is utilizing External Key Management combined with Client Side Encryption. &lt;br&gt;
Architecturally, holding the cryptographic keys in their own STACKIT environment while using Google purely for encrypted storage is the correct way to mitigate the US CLOUD Act for data at rest. Google only sees encrypted blobs.&lt;/p&gt;

&lt;p&gt;However, encrypting the payload is only a fraction of the governance equation.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Architectural Blind Spot 1: The Execution Context&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The fundamental flaw lies in the execution layer. The data is encrypted on the endpoint, but who delivers the application code that performs this encryption? &lt;br&gt;
If users are accessing Workspace via a web browser, Google is &lt;strong&gt;delivering the Javascript payload.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If a United States intelligence court issues a secret subpoena, they can legally compel the vendor to serve a modified code payload to a specific target. In that scenario, the &lt;strong&gt;local encryption is compromised before the data ever reaches the STACKIT key management vault&lt;/strong&gt;. &lt;br&gt;
You cannot claim sovereignty if a foreign entity controls the execution environment of your software.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Architectural Blind Spot 2: The Metadata Reality&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;Encrypting the document content completely ignores the value of metadata. Google still processes the authentication requests, the IP addresses, the timestamps, and the collaboration networks. In state level surveillance or corporate espionage, knowing exactly who is talking to whom, and when, is often more valuable than the actual file content. The hyperscaler still owns the telemetry.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Architectural Blind Spot 3: Structural Dependency&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The final point is raw operational governance. What happens when the vendor changes their terms of service, alters their pricing model, or faces extreme political pressure? The cryptographic architecture does not change the fact that the entire enterprise is completely dependent on a US software platform.&lt;/p&gt;

&lt;p&gt;True sovereignty requires absolute control over the software itself, not just the encryption keys. Investing massive resources into European data centers just to run American software is not digital independence.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The Governance Reality&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;The industry needs to stop framing vendor transition projects as "sovereign architectures." True IT security and compliance dictate that you must control the boundaries of the code, the execution, and the data. &lt;br&gt;
The future of enterprise architecture belongs to organizations that invest in &lt;strong&gt;owning their systems, not just renting new ones.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://t3n.de/news/echte-europaeische-alternativen-ich-sehe-schwarz-1730598/" rel="noopener noreferrer"&gt;https://t3n.de/news/echte-europaeische-alternativen-ich-sehe-schwarz-1730598/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;justice.gov/dag/cloudact (Official US Department of Justice CLOUD Act mandate)&lt;/p&gt;

&lt;p&gt;cloud.google.com/workspace/security (Google Workspace Security and Client Side Encryption architecture)&lt;/p&gt;

&lt;p&gt;stackit.de/en/security (STACKIT Cloud Security and Compliance documentation)&lt;/p&gt;

&lt;p&gt;edpb.europa.eu (European Data Protection Board guidelines on supplementary measures for data transfers)&lt;/p&gt;

&lt;p&gt;nist.gov/publications (National Institute of Standards and Technology Zero Trust Architecture outlining execution context risks)&lt;/p&gt;

&lt;p&gt;enisa.europa.eu (European Union Agency for Cybersecurity guidelines on data sovereignty and engineering)&lt;/p&gt;

</description>
      <category>sovereignty</category>
      <category>cloud</category>
      <category>devops</category>
      <category>architecture</category>
    </item>
    <item>
      <title>The AI Productivity Crisis And The Architecture Of Execution</title>
      <dc:creator>Ali-Funk</dc:creator>
      <pubDate>Sun, 22 Feb 2026 20:15:50 +0000</pubDate>
      <link>https://forem.com/alifunk/the-ai-productivity-crisis-and-the-architecture-of-execution-37j5</link>
      <guid>https://forem.com/alifunk/the-ai-productivity-crisis-and-the-architecture-of-execution-37j5</guid>
      <description>&lt;p&gt;Companies are burning billions on AI, yet over 80 percent of them see zero productivity gains. Reports from Tom’s Hardware and the Economic Times confirm the reality: executives are spending 90 minutes a week typing prompts into a chatbot and wondering why operations aren't scaling.&lt;/p&gt;

&lt;p&gt;The problem isn't the models. It’s the architecture.&lt;br&gt;
The Market Bloodbath: Feb 20, 2026&lt;/p&gt;

&lt;p&gt;If you want proof of what happens when you fix the architecture, look at the market reaction to Anthropic’s release of Claude Code Security. Unlike a chatbot, this is an executing agent. It scans codebases, traces data flows, and autonomously writes patches. It found over 500 bugs in production open-source code that human reviewers missed for years.&lt;/p&gt;

&lt;p&gt;The market response was a vertical drop. When Wall Street realized the difference between a "text generator" and an "executing agent," billions in market cap vanished from legacy cybersecurity firms in a single session.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdoc648ir7sheyrxnj20s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdoc648ir7sheyrxnj20s.png" alt=" " width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;JFrog: -24.94%&lt;/li&gt;
&lt;li&gt;Okta: -9.18%&lt;/li&gt;
&lt;li&gt;CrowdStrike: -7.95%&lt;/li&gt;
&lt;li&gt;Cloudflare: -8.05%&lt;/li&gt;
&lt;li&gt;Zscaler: -5.47%&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Verification: Pulling the Raw Data&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To ensure these numbers weren't just "AI-hallucinated" or pulled from biased news snippets, I ran a raw data extraction against the Yahoo Finance API for the Feb 19–21 window.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Python Verification Script:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;yfinance&lt;/span&gt; &lt;span class="k"&gt;as&lt;/span&gt; &lt;span class="n"&gt;yf&lt;/span&gt;
&lt;span class="n"&gt;tickers&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;FROG&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;OKTA&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;CRWD&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;NET&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;ZS&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="n"&gt;data&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;yf&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;download&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;tickers&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;start&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;2026-02-19&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;end&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;2026-02-21&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;)[&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Close&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;
&lt;span class="nf"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(((&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;iloc&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;iloc&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;])&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;iloc&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;]&lt;/span&gt;&lt;span class="o"&gt;*&lt;/span&gt;&lt;span class="mi"&gt;100&lt;/span&gt;&lt;span class="p"&gt;).&lt;/span&gt;&lt;span class="nf"&gt;round&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Terminal Output (Raw Source Truth):&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Ticker
CRWD    -7.95
FROG   -24.94
NET     -8.05
OKTA    -9.18
ZS      -5.47
dtype: float64
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;A 25% drop for JFrog in 24 hours isn't a glitch this is a &lt;strong&gt;structural realignment of the industry.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Architecture Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have spent eight years in IT operations. When a system fails at 03:00, a chatbot is useless. &lt;/p&gt;

&lt;p&gt;It &lt;strong&gt;can’t&lt;/strong&gt; access your DB&lt;br&gt;
it &lt;strong&gt;can’t&lt;/strong&gt; update your CRM&lt;br&gt;
it &lt;strong&gt;can’t&lt;/strong&gt; resolve a ticket&lt;/p&gt;

&lt;p&gt;Real business value and the reason the stocks above tanked. &lt;br&gt;
That´s from  &lt;strong&gt;Autonomous Execution.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the AWS Become A Solutions Architect program, the technical answer &lt;br&gt;
is &lt;strong&gt;Agentic AI&lt;/strong&gt;. &lt;br&gt;
We are moving from "Systems of Record" to "Systems of Action."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Architectural Blueprint for ROI:&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Orchestration Layer:&lt;/strong&gt; Move beyond simple chat. Use Pre-processing to validate requests and Post-processing for final execution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Execution Layer:&lt;/strong&gt; Use Amazon Bedrock Action Groups. Integrate FMs with backend services via isolated Lambda functions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Infrastructure as a Boundary:&lt;/strong&gt; Secure probabilistic models with deterministic infrastructure limits via IAM.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zero Trust Principles:&lt;/strong&gt; Treat agents as stateless, disposable units.&lt;/p&gt;

&lt;p&gt;Which means: &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Productivity only rises when AI stops generating prose and starts completing end-to-end tasks.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.tomshardware.com/tech-industry/artificial-intelligence/over-80-percent-of-companies-report-no-productivity-gains-from-ai-so-far-despite-billions-in-investment-survey-suggests-6-000-executives-also-reveal-1-3-of-leaders-use-ai-but-only-for-90-minutes-a-week" rel="noopener noreferrer"&gt;https://www.tomshardware.com/tech-industry/artificial-intelligence/over-80-percent-of-companies-report-no-productivity-gains-from-ai-so-far-despite-billions-in-investment-survey-suggests-6-000-executives-also-reveal-1-3-of-leaders-use-ai-but-only-for-90-minutes-a-week&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.heise.de/en/news/Anthropic-launches-Claude-Code-Security-Cybersecurity-stocks-lose-value-11185215.html" rel="noopener noreferrer"&gt;https://www.heise.de/en/news/Anthropic-launches-Claude-Code-Security-Cybersecurity-stocks-lose-value-11185215.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://economictimes.indiatimes.com/tech/technology/cybersecurity-stocks-hit-sharply-by-anthropic-claude-code-security/articleshow/128631892.cms" rel="noopener noreferrer"&gt;https://economictimes.indiatimes.com/tech/technology/cybersecurity-stocks-hit-sharply-by-anthropic-claude-code-security/articleshow/128631892.cms&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>ai</category>
      <category>devops</category>
      <category>architecture</category>
    </item>
  </channel>
</rss>
