<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Saleem Yousaf</title>
    <description>The latest articles on Forem by Saleem Yousaf (@saleem_yousaf).</description>
    <link>https://forem.com/saleem_yousaf</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3914201%2F3969c698-eecd-4f35-8558-e06b038a8d5b.png</url>
      <title>Forem: Saleem Yousaf</title>
      <link>https://forem.com/saleem_yousaf</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/saleem_yousaf"/>
    <language>en</language>
    <item>
      <title>Why Infrastructure as Code Security Can’t Be Ignored</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Thu, 14 May 2026 10:07:48 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/why-infrastructure-as-code-security-cant-be-ignored-5dki</link>
      <guid>https://forem.com/saleem_yousaf/why-infrastructure-as-code-security-cant-be-ignored-5dki</guid>
      <description>&lt;p&gt;Infrastructure as Code (IaC) has changed cloud engineering forever.&lt;br&gt;
But insecure IaC means insecure cloud environments at scale.&lt;br&gt;
A single misconfigured template can deploy:&lt;/p&gt;

&lt;p&gt;• Public storage buckets&lt;br&gt;
• Weak IAM policies&lt;br&gt;
• Exposed databases&lt;br&gt;
• Unencrypted resources&lt;br&gt;
Secure IaC should include:&lt;/p&gt;

&lt;p&gt;✅ Security scanning in CI/CD&lt;br&gt;
✅ Policy as Code&lt;br&gt;
✅ Least privilege templates&lt;br&gt;
✅ Version control and approvals&lt;br&gt;
✅ Automated compliance validation&lt;/p&gt;

&lt;p&gt;Security should be embedded before deployment — not after.&lt;br&gt;
Secure infrastructure starts in the code.&lt;/p&gt;




&lt;p&gt;Written by Saleem Yousaf&lt;/p&gt;

&lt;p&gt;Cloud &amp;amp; Cyber Security Architect&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>terraform</category>
      <category>iac</category>
      <category>devsecops</category>
      <category>cloudsecurity</category>
    </item>
    <item>
      <title>Why Encryption Still Matters in Modern Cloud Security</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Thu, 14 May 2026 10:06:36 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/why-encryption-still-matters-in-modern-cloud-security-2alf</link>
      <guid>https://forem.com/saleem_yousaf/why-encryption-still-matters-in-modern-cloud-security-2alf</guid>
      <description>&lt;p&gt;Encryption is one of the oldest security controls.&lt;br&gt;
And still one of the most important.&lt;br&gt;
In modern cloud environments, encryption protects:&lt;/p&gt;

&lt;p&gt;• Customer data&lt;br&gt;
• AI training datasets&lt;br&gt;
• API secrets&lt;br&gt;
• Backups and storage&lt;br&gt;
• Sensitive communications&lt;/p&gt;

&lt;p&gt;But encryption alone is not enough.&lt;br&gt;
Key management matters just as much.&lt;/p&gt;

&lt;p&gt;Organisations should focus on:&lt;/p&gt;

&lt;p&gt;✅ Customer-managed keys (CMKs)&lt;br&gt;
✅ Hardware Security Modules (HSMs)&lt;br&gt;
✅ Key rotation policies&lt;br&gt;
✅ Encryption in transit and at rest&lt;br&gt;
✅ Strict access control for cryptographic keys&lt;/p&gt;

&lt;p&gt;Encryption is not just compliance.&lt;br&gt;
It is foundational trust for digital systems.&lt;/p&gt;




&lt;p&gt;Written by Saleem Yousaf&lt;/p&gt;

&lt;p&gt;Cloud &amp;amp; Cyber Security Architect&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>encryption</category>
      <category>cloudsecurity</category>
      <category>ai</category>
      <category>aws</category>
    </item>
    <item>
      <title>Why Cloud Security Architecture Matters More Than Ever</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Thu, 14 May 2026 10:03:59 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/why-cloud-security-architecture-matters-more-than-ever-3lal</link>
      <guid>https://forem.com/saleem_yousaf/why-cloud-security-architecture-matters-more-than-ever-3lal</guid>
      <description>&lt;p&gt;Cloud adoption has transformed how organisations operate.&lt;br&gt;
But many environments are still built faster than they are secured.&lt;br&gt;
Common cloud security gaps:&lt;/p&gt;

&lt;p&gt;• Overly permissive IAM roles&lt;br&gt;
• Public storage exposure&lt;br&gt;
• Weak network segmentation&lt;br&gt;
• Lack of monitoring and governance&lt;br&gt;
A secure cloud architecture should include:&lt;/p&gt;

&lt;p&gt;✅ Least privilege access&lt;br&gt;
✅ Private networking&lt;br&gt;
✅ Encryption by default&lt;br&gt;
✅ Centralised logging and monitoring&lt;br&gt;
✅ Infrastructure as Code security validation&lt;/p&gt;

&lt;p&gt;Cloud security is no longer optional.&lt;br&gt;
It is now a core business requirement.&lt;/p&gt;




&lt;p&gt;Written by Saleem Yousaf&lt;/p&gt;

&lt;p&gt;Cloud &amp;amp; Cyber Security Architect&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>azure</category>
      <category>cloudsecurity</category>
      <category>devops</category>
    </item>
    <item>
      <title>AI Security Isn’t About Models It’s About Trust and Governance</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Thu, 14 May 2026 09:29:24 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/ai-security-isnt-about-models-its-about-trust-and-governance-5faj</link>
      <guid>https://forem.com/saleem_yousaf/ai-security-isnt-about-models-its-about-trust-and-governance-5faj</guid>
      <description>&lt;p&gt;Most organisations are focusing on AI models, prompts, and tooling.&lt;br&gt;
But the real AI security risk sits elsewhere:&lt;br&gt;
• Untrusted data&lt;br&gt;
• Weak architecture&lt;br&gt;
• Lack of governance&lt;br&gt;
AI systems are only as trustworthy as the data and controls behind them.&lt;br&gt;
Without governance:&lt;br&gt;
• Sensitive data can leak through AI responses&lt;br&gt;
• Prompt injection attacks become possible&lt;br&gt;
• RAG pipelines can expose confidential information&lt;br&gt;
• AI outputs become unreliable&lt;br&gt;
Secure AI starts with:&lt;br&gt;
✅ Trusted data ingestion&lt;br&gt;
✅ Strong identity controls&lt;br&gt;
✅ Secure cloud architecture&lt;br&gt;
✅ Governance aligned to business risk&lt;br&gt;
AI security is not just about protecting models.&lt;br&gt;
It’s about protecting trust.&lt;/p&gt;




&lt;p&gt;Written by Saleem Yousaf&lt;/p&gt;

&lt;p&gt;Cloud &amp;amp; Cyber Security Architect&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>security</category>
      <category>cloud</category>
      <category>goverance</category>
    </item>
    <item>
      <title>Broken vs Governed RAG Pipelines</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 12 May 2026 09:57:18 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/broken-vs-governed-rag-pipelines-dg3</link>
      <guid>https://forem.com/saleem_yousaf/broken-vs-governed-rag-pipelines-dg3</guid>
      <description>&lt;p&gt;The Security Architecture Problem Nobody Talks About&lt;br&gt;
Most AI security conversations focus on the LLM.&lt;br&gt;
But in enterprise environments, the bigger issue is usually the pipeline feeding the model.&lt;/p&gt;

&lt;p&gt;That pipeline is commonly a Retrieval-Augmented Generation (RAG) architecture.&lt;br&gt;
And many of them are fundamentally insecure.&lt;/p&gt;

&lt;p&gt;The Typical Broken RAG Pipeline&lt;br&gt;
A lot of AI implementations look like this:&lt;br&gt;
User Upload&lt;br&gt;
↓&lt;br&gt;
Embedding Pipeline&lt;br&gt;
↓&lt;br&gt;
Vector Database&lt;br&gt;
↓&lt;br&gt;
LLM / AI Application&lt;br&gt;
The issue?&lt;br&gt;
There is often:&lt;br&gt;
• No malware scanning&lt;br&gt;
• No governance validation&lt;br&gt;
• No quarantine process&lt;br&gt;
• No classification&lt;br&gt;
• No trust enforcement&lt;br&gt;
• No monitoring&lt;br&gt;
The AI system simply trusts all uploaded data.&lt;br&gt;
That creates risk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why This Is Dangerous&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;AI Poisoning&lt;/li&gt;
&lt;li&gt;Attackers can upload manipulated content that influences retrieval results.&lt;/li&gt;
&lt;li&gt;Prompt Injection Persistence&lt;/li&gt;
&lt;li&gt;Malicious instructions may persist inside embeddings.&lt;/li&gt;
&lt;li&gt;Sensitive Data Exposure&lt;/li&gt;
&lt;li&gt;Improperly governed documents can become retrievable.&lt;/li&gt;
&lt;li&gt;Compliance Risk&lt;/li&gt;
&lt;li&gt;Unclassified or regulated data may enter AI systems without controls.&lt;/li&gt;
&lt;li&gt;No Auditability&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Many organisations cannot answer:&lt;br&gt;
• What data entered the pipeline?&lt;br&gt;
• Was it validated?&lt;br&gt;
• Was malware detected?&lt;br&gt;
• Who retrieved the content?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What a Governed RAG Pipeline Looks Like&lt;/strong&gt;&lt;br&gt;
A governed architecture introduces trust controls before data reaches embeddings.&lt;br&gt;
Example:&lt;br&gt;
Upload&lt;br&gt;
↓&lt;br&gt;
Untrusted Landing Zone&lt;br&gt;
↓&lt;br&gt;
Malware Scanning&lt;br&gt;
↓&lt;br&gt;
Classification &amp;amp; Validation&lt;br&gt;
↓&lt;br&gt;
Clean / Quarantine Separation&lt;br&gt;
↓&lt;br&gt;
Approved Embedding Pipeline&lt;br&gt;
↓&lt;br&gt;
Private Vector Store&lt;br&gt;
↓&lt;br&gt;
Private AI Access&lt;br&gt;
This creates architectural trust boundaries.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AWS Example Architecture&lt;/strong&gt;&lt;br&gt;
A secure AWS-native implementation may include:&lt;br&gt;
• Amazon S3 landing buckets&lt;br&gt;
• GuardDuty Malware Protection for S3&lt;br&gt;
• EventBridge automation&lt;br&gt;
• Lambda validation workflows&lt;br&gt;
• Quarantine buckets&lt;br&gt;
• Amazon Bedrock private endpoints&lt;br&gt;
• IAM least privilege&lt;br&gt;
• CloudTrail and Security Hub monitoring&lt;br&gt;
This transforms AI security from reactive to governed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why This Matters&lt;/strong&gt;&lt;br&gt;
AI adoption is accelerating faster than AI governance.&lt;br&gt;
That means many organisations are deploying AI systems without:&lt;br&gt;
• Security architecture&lt;br&gt;
• Data governance&lt;br&gt;
• Operational controls&lt;br&gt;
• Monitoring visibility&lt;br&gt;
The result is growing AI risk exposure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Thought&lt;/strong&gt;&lt;br&gt;
The model is not the primary trust boundary.&lt;br&gt;
The architecture is.&lt;/p&gt;

&lt;p&gt;If your ingestion pipeline is insecure, your AI system is insecure.&lt;br&gt;
Secure AI starts before the prompt.&lt;/p&gt;




&lt;h1&gt;
  
  
  Saleem Yousaf #aws #ai #security #cybersecurity #rag #llm #cloud #devops
&lt;/h1&gt;

&lt;p&gt;Written by Saleem Yousaf&lt;/p&gt;

&lt;p&gt;Cloud &amp;amp; Cyber Security Architect&lt;/p&gt;

&lt;p&gt;Connect with me:&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>architecture</category>
      <category>rag</category>
      <category>security</category>
    </item>
    <item>
      <title>OT Network Segmentation: The Foundation of Industrial Cybersecurity by Saleem Yousaf</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 12 May 2026 09:54:08 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/ot-network-segmentation-the-foundation-of-industrial-cybersecurity-by-saleem-yousaf-3p7</link>
      <guid>https://forem.com/saleem_yousaf/ot-network-segmentation-the-foundation-of-industrial-cybersecurity-by-saleem-yousaf-3p7</guid>
      <description>&lt;p&gt;Most OT cyber incidents become major business disruptions because attackers can move laterally between systems.&lt;/p&gt;

&lt;p&gt;That usually happens because segmentation is weak.&lt;br&gt;
Modern manufacturing environments often connect:&lt;/p&gt;

&lt;p&gt;• ERP systems &lt;br&gt;
• SCADA platforms &lt;br&gt;
• PLCs &lt;br&gt;
• Cloud services &lt;br&gt;
• Remote vendors &lt;br&gt;
• Engineering workstations &lt;br&gt;
• Industrial IoT devices &lt;br&gt;
Without proper segmentation, a compromise in IT can quickly spread into operational environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Modern OT Segmentation Should Include&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;IT / OT Separation&lt;/strong&gt;&lt;br&gt;
Enterprise IT should never have unrestricted access into OT networks.&lt;br&gt;
Use:&lt;br&gt;
• Firewalls &lt;br&gt;
• Industrial DMZs &lt;br&gt;
• Controlled routing &lt;br&gt;
• Secure jump servers &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Micro-Segmentation&lt;/strong&gt;&lt;br&gt;
Inside OT environments, segment:&lt;br&gt;
• SCADA systems &lt;br&gt;
• PLC zones &lt;br&gt;
• Safety controllers &lt;br&gt;
• Robotics networks &lt;br&gt;
• Engineering workstations &lt;br&gt;
This limits lateral movement.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity Security&lt;/strong&gt;&lt;br&gt;
Segmentation must work alongside:&lt;br&gt;
• MFA &lt;br&gt;
• PAM &lt;br&gt;
• Least privilege &lt;br&gt;
• Vendor access controls &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OT Visibility&lt;/strong&gt;&lt;br&gt;
You cannot secure what you cannot see.&lt;br&gt;
Use:&lt;br&gt;
• Passive monitoring &lt;br&gt;
• Asset discovery &lt;br&gt;
• Traffic analysis &lt;br&gt;
• OT-aware IDS tools &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Thought&lt;/strong&gt;&lt;br&gt;
OT security is no longer just perimeter security.&lt;/p&gt;

&lt;p&gt;Modern industrial environments require layered segmentation, identity-aware access, and continuous monitoring.&lt;br&gt;
Because when attackers move freely, production stops.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Written by Saleem Yousaf&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cloud &amp;amp; Cyber Security Architect  &lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt; | 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;https://saleem-yousaf.blogspot.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>iot</category>
      <category>networking</category>
      <category>security</category>
    </item>
    <item>
      <title>Why Manufacturing Cybersecurity Must Move to Secure-by-Design - Insights by Saleem Yousaf</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 12 May 2026 09:52:19 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/why-manufacturing-cybersecurity-must-move-to-secure-by-design-insights-by-saleem-yousaf-bke</link>
      <guid>https://forem.com/saleem_yousaf/why-manufacturing-cybersecurity-must-move-to-secure-by-design-insights-by-saleem-yousaf-bke</guid>
      <description>&lt;p&gt;Manufacturing organisations are rapidly digitising operations to improve automation, efficiency, and global connectivity.&lt;br&gt;
However, many industrial environments were never originally designed with cybersecurity in mind.&lt;/p&gt;

&lt;p&gt;Operational Technology (OT) environments still commonly contain legacy systems, shared privileged accounts, flat network architectures, and insecure remote access pathways.&lt;/p&gt;

&lt;p&gt;This creates a major challenge for modern manufacturers.&lt;br&gt;
A single compromised privileged identity can allow attackers to move from corporate IT systems into operational environments responsible for production.&lt;/p&gt;

&lt;p&gt;The consequences are severe:&lt;br&gt;
• Production downtime&lt;br&gt;
• Delayed customer orders&lt;br&gt;
• Financial loss&lt;br&gt;
• Safety concerns&lt;br&gt;
• Supply chain disruption&lt;br&gt;
• Reputational damage&lt;/p&gt;

&lt;p&gt;Secure-by-design changes the approach entirely.&lt;br&gt;
Instead of adding security after deployment, organisations embed cybersecurity directly into operational architecture.&lt;/p&gt;

&lt;p&gt;This includes:&lt;br&gt;
Identity-Centric Security&lt;br&gt;
• PAM&lt;br&gt;
• MFA&lt;br&gt;
• Least privilege&lt;br&gt;
• Tiered administration&lt;br&gt;
• Just-in-Time access&lt;/p&gt;

&lt;p&gt;OT Network Segmentation&lt;br&gt;
• Industrial DMZs&lt;br&gt;
• Restricted trust boundaries&lt;br&gt;
• Firewall zoning&lt;br&gt;
• Controlled remote access&lt;/p&gt;

&lt;p&gt;Visibility &amp;amp; Monitoring&lt;br&gt;
• OT-aware monitoring&lt;br&gt;
• Industrial anomaly detection&lt;br&gt;
• Centralised logging&lt;br&gt;
• Asset discovery&lt;/p&gt;

&lt;p&gt;Recovery &amp;amp; Resilience&lt;br&gt;
• Immutable backups&lt;br&gt;
• OT recovery testing&lt;br&gt;
• Incident response playbooks&lt;br&gt;
• Business continuity planning&lt;/p&gt;

&lt;p&gt;Cybersecurity in manufacturing is no longer just about protecting systems.&lt;br&gt;
It is about protecting operations.&lt;br&gt;
Secure-by-design is becoming one of the most important strategies for modern industrial resilience.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Written by Saleem Yousaf&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cloud &amp;amp; Cyber Security Architect  &lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>operational</category>
      <category>ot</category>
      <category>manufacturing</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Saleem Yousaf insight: Understanding MITRE ATT&amp;CK and MITRE ATLAS for Modern Cloud Security</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 12 May 2026 09:48:09 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/understanding-mitre-attck-and-mitre-atlas-for-modern-cloud-security-52ko</link>
      <guid>https://forem.com/saleem_yousaf/understanding-mitre-attck-and-mitre-atlas-for-modern-cloud-security-52ko</guid>
      <description>&lt;p&gt;Security isn’t just about firewalls anymore.&lt;br&gt;
Modern attacks target:&lt;br&gt;
• Cloud identities &lt;br&gt;
• SaaS apps &lt;br&gt;
• APIs &lt;br&gt;
• Containers &lt;br&gt;
• AI systems &lt;br&gt;
• Hybrid infrastructure&lt;/p&gt;

&lt;p&gt;To defend properly, security teams need visibility into how attackers actually operate.&lt;/p&gt;

&lt;p&gt;That’s why MITRE ATT&amp;amp;CK and MITRE ATLAS matter.&lt;br&gt;
MITRE ATT&amp;amp;CK&lt;br&gt;
MITRE ATT&amp;amp;CK is a framework that maps:&lt;br&gt;
• Tactics &lt;br&gt;
• Techniques &lt;br&gt;
• Procedures (TTPs) &lt;/p&gt;

&lt;p&gt;Based on real-world attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Examples include:&lt;/strong&gt;&lt;br&gt;
• Credential Access &lt;br&gt;
• Lateral Movement &lt;br&gt;
• Privilege Escalation &lt;br&gt;
• Defense Evasion &lt;/p&gt;

&lt;p&gt;Teams use ATT&amp;amp;CK for:&lt;br&gt;
• Detection engineering &lt;br&gt;
• Threat hunting &lt;br&gt;
• SOC operations &lt;br&gt;
• Purple teaming &lt;br&gt;
• Security testing &lt;/p&gt;

&lt;p&gt;MITRE ATLAS&lt;/p&gt;

&lt;p&gt;MITRE ATLAS extends this concept into:&lt;/p&gt;

&lt;p&gt;• AI security &lt;br&gt;
• Cloud telemetry &lt;br&gt;
• Detection mapping &lt;br&gt;
• Security controls &lt;/p&gt;

&lt;p&gt;ATLAS helps connect:&lt;br&gt;
Technique → Telemetry → Detection → Mitigation&lt;br&gt;
This is incredibly useful for:&lt;/p&gt;

&lt;p&gt;• AWS &lt;br&gt;
• Azure &lt;br&gt;
• Microsoft 365 &lt;br&gt;
• SaaS platforms &lt;br&gt;
• Identity systems &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Engineers Should Care&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Using ATT&amp;amp;CK + ATLAS helps:&lt;br&gt;
• Validate detections &lt;br&gt;
• Identify monitoring gaps &lt;br&gt;
• Improve threat visibility &lt;br&gt;
• Reduce alert fatigue &lt;br&gt;
• Prioritise security investments &lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;br&gt;
Security teams that understand attacker behaviour build stronger defenses.&lt;br&gt;
Threat-informed security is becoming a core engineering discipline — especially in cloud-native environments.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Written by Saleem Yousaf&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cloud &amp;amp; Cyber Security Architect&lt;br&gt;&lt;br&gt;
&lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;https://www.saleemyousaf.co.uk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>ai</category>
      <category>cloud</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Azure Disaster Recovery Architecture for Enterprise Hybrid Cloud - by Saleem Yousaf</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 12 May 2026 09:46:30 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/azure-disaster-recovery-architecture-for-enterprise-hybrid-cloud-2d2d</link>
      <guid>https://forem.com/saleem_yousaf/azure-disaster-recovery-architecture-for-enterprise-hybrid-cloud-2d2d</guid>
      <description>&lt;p&gt;Modern enterprise DR in Azure must support:&lt;br&gt;
• Same-region failover &lt;br&gt;
• Cross-region failover &lt;br&gt;
• Hybrid cloud continuity &lt;br&gt;
• PaaS and IaaS recovery &lt;br&gt;
Key Azure DR Components&lt;br&gt;
Same Region&lt;br&gt;
• Availability Zones &lt;br&gt;
• Zone-redundant SQL &lt;br&gt;
• ZRS Storage &lt;br&gt;
Multi Region&lt;br&gt;
• Azure Site Recovery &lt;br&gt;
• Front Door &lt;br&gt;
• Traffic Manager &lt;br&gt;
• Geo-replication &lt;br&gt;
Hybrid&lt;br&gt;
• ExpressRoute failover &lt;br&gt;
• VPN backup &lt;br&gt;
• Active Directory replication &lt;/p&gt;

&lt;p&gt;Azure Storage Replication&lt;br&gt;
Choosing the correct storage replication model is critical.&lt;br&gt;
Type    DR Capability&lt;br&gt;
LRS None&lt;br&gt;
ZRS Zone&lt;br&gt;
GRS Regional&lt;br&gt;
RA-GZRS Enterprise DR&lt;/p&gt;

&lt;p&gt;SQL Disaster Recovery&lt;br&gt;
Recommended enterprise SQL controls:&lt;br&gt;
• Auto Failover Groups &lt;br&gt;
• Geo-replication &lt;br&gt;
• Zone redundancy &lt;br&gt;
• Backup retention &lt;/p&gt;

&lt;p&gt;DR Testing Matters&lt;br&gt;
Recommended cadence:&lt;br&gt;
• Monthly restore testing &lt;br&gt;
• Quarterly failover testing &lt;br&gt;
• Annual enterprise DR simulation &lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;br&gt;
Cloud DR is now part of enterprise architecture, security and operations.&lt;br&gt;
The focus should be:&lt;br&gt;
• Automation &lt;br&gt;
• Repeatability &lt;br&gt;
• Testing &lt;br&gt;
• Security preservation&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Written by Saleem Yousaf&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cloud &amp;amp; Cyber Security Architect  &lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>cloud</category>
      <category>infrastructure</category>
      <category>dr</category>
    </item>
    <item>
      <title>Securing OT Environments: Network Segmentation and IDMZ (Real-World Approach) | Saleem Yousaf</title>
      <dc:creator>Saleem Yousaf</dc:creator>
      <pubDate>Tue, 05 May 2026 14:33:48 +0000</pubDate>
      <link>https://forem.com/saleem_yousaf/securing-ot-environments-network-segmentation-and-idmz-real-world-approach-saleem-yousaf-10kh</link>
      <guid>https://forem.com/saleem_yousaf/securing-ot-environments-network-segmentation-and-idmz-real-world-approach-saleem-yousaf-10kh</guid>
      <description>&lt;p&gt;In most environments I’ve worked in, OT (Operational Technology) security isn’t weak because of missing tools it’s weak because of poor network design.&lt;/p&gt;

&lt;p&gt;Flat networks, over-trusted zones, and lack of proper segmentation create environments where a single compromise can spread quickly.&lt;/p&gt;

&lt;p&gt;This is where network segmentation and the Industrial DMZ (IDMZ) become critical.&lt;br&gt;
The Problem with Traditional OT Networks&lt;/p&gt;

&lt;p&gt;Many OT environments still rely on:&lt;/p&gt;

&lt;p&gt;Flat network architecture&lt;br&gt;
Implicit trust between zones&lt;br&gt;
Limited monitoring&lt;br&gt;
Legacy systems that are difficult to patch&lt;/p&gt;

&lt;p&gt;This creates a scenario where:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;IT compromise → OT compromise&lt;/li&gt;
&lt;li&gt;Minimal containment → maximum impact&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  What is an IDMZ?
&lt;/h2&gt;

&lt;p&gt;An Industrial DMZ (IDMZ) acts as a buffer between IT and OT environments.&lt;/p&gt;

&lt;p&gt;Instead of direct communication:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IT ↔ IDMZ ↔ OT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The IDMZ typically contains:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Jump servers / bastion hosts&lt;/li&gt;
&lt;li&gt;Patch management systems&lt;/li&gt;
&lt;li&gt;Historians / data brokers&lt;/li&gt;
&lt;li&gt;Security monitoring tools&lt;/li&gt;
&lt;li&gt;Proxy services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Key principle:&lt;br&gt;
No direct IT-to-OT communication&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Network Segmentation (What Actually Works)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Segmentation isn’t just VLANs it’s controlled trust boundaries.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 1: IT Zone&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Corporate systems&lt;/li&gt;
&lt;li&gt;Internet access&lt;/li&gt;
&lt;li&gt;User endpoints&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Level 2: IDMZ&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Controlled services&lt;/li&gt;
&lt;li&gt;Strict firewall rules&lt;/li&gt;
&lt;li&gt;Monitored access&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Level 3: OT Zone&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PLCs&lt;/li&gt;
&lt;li&gt;SCADA systems&lt;/li&gt;
&lt;li&gt;Critical infrastructure&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Common Mistakes I See&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Allowing direct RDP from IT to OT&lt;/li&gt;
&lt;li&gt;Over-permissive firewall rules&lt;/li&gt;
&lt;li&gt;No monitoring inside IDMZ&lt;/li&gt;
&lt;li&gt;Treating IDMZ as just “another subnet”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These defeat the purpose of segmentation&lt;/p&gt;

&lt;p&gt;Security Controls That Matter&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access Control&lt;/li&gt;
&lt;li&gt;No direct user access to OT&lt;/li&gt;
&lt;li&gt;Use jump hosts&lt;/li&gt;
&lt;li&gt;Enforce MFA&lt;/li&gt;
&lt;li&gt;Firewalling&lt;/li&gt;
&lt;li&gt;Whitelist-only communication&lt;/li&gt;
&lt;li&gt;Deny by default&lt;/li&gt;
&lt;li&gt;Monitoring&lt;/li&gt;
&lt;li&gt;Log all traffic&lt;/li&gt;
&lt;li&gt;Monitor lateral movement&lt;/li&gt;
&lt;li&gt;Detect anomalies&lt;/li&gt;
&lt;li&gt;Patch Management&lt;/li&gt;
&lt;li&gt;Stage updates through IDMZ&lt;/li&gt;
&lt;li&gt;Never patch OT directly from IT&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Real-World Design Principle, assume breach in IT&lt;/p&gt;

&lt;p&gt;Design OT so that:&lt;/p&gt;

&lt;p&gt;It cannot be reached directly&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Movement is restricted&lt;/li&gt;
&lt;li&gt;Activity is visible&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fassc1cblpbp2y4ufkgkn.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fassc1cblpbp2y4ufkgkn.jpeg" alt=" " width="800" height="716"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Final Thoughts from the Author
&lt;/h2&gt;

&lt;p&gt;OT security is not about adding more tools it’s about designing networks that limit impact.&lt;/p&gt;

&lt;p&gt;A properly implemented IDMZ and segmentation strategy can significantly reduce risk and prevent lateral movement into critical systems.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Written by Saleem Yousaf&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Cloud &amp;amp; Cyber Security Architect  &lt;/p&gt;

&lt;p&gt;👤 &lt;strong&gt;About the Author&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Saleem Yousaf is a Cloud &amp;amp; Cyber Security Architect specialising in secure architecture across AWS, Azure, and enterprise environments.&lt;/p&gt;

&lt;p&gt;🌐 &lt;a href="https://www.saleemyousaf.co.uk" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|💼 &lt;a href="https://www.linkedin.com/in/saleemyousaf" rel="noopener noreferrer"&gt;LinkedIn &lt;/a&gt;| 💻 &lt;a href="https://github.com/saleem-yousaf" rel="noopener noreferrer"&gt;GitHub &lt;/a&gt;|✍️ &lt;a href="https://saleemyousaf.medium.com" rel="noopener noreferrer"&gt;Medium &lt;/a&gt;|📚 &lt;a href="https://hashnode.com/@saleemyousaf" rel="noopener noreferrer"&gt;Hashnode &lt;/a&gt;|🌐 &lt;a href="https://www.cyberspartans.co.uk/saleemyousaf" rel="noopener noreferrer"&gt;Website &lt;/a&gt;|👤 &lt;a href="https://about.me/saleemyousaf" rel="noopener noreferrer"&gt;About.me&lt;/a&gt; |✍️ &lt;a href="https://saleem-yousaf.blogspot.com/" rel="noopener noreferrer"&gt;Blogger &lt;/a&gt;&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
      &lt;div class="c-embed__body flex items-center justify-between"&gt;
        &lt;a href="https://www.saleemyousaf.co.uk/" rel="noopener noreferrer" class="c-link fw-bold flex items-center"&gt;
          &lt;span class="mr-2"&gt;saleemyousaf.co.uk&lt;/span&gt;
          

        &lt;/a&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>architecture</category>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>security</category>
    </item>
  </channel>
</rss>
