Source:


By Nicholas Fearn

An AWS tech stack can aid business growth and facilitate efficient operations, but misconfigurations have become all too common and stall this progress

Amazon Web Services (AWS) has become the lifeblood of millions of modern businesses, both big and small. But while this popular cloud platform enables them to manage and scale their operations with impressive speed, simplicity and affordability, it also represents a significant security and privacy risk if mismanaged by users.

An insecure or improperly configured AWS tech stack provides a gateway for cyber criminals to enter corporate systems and sensitive files. The biggest example of this occurred in 2019, when an ex-Amazon employee stole the data of 100 million Capital One customers simply by exploiting a misconfigured web application firewall in the financial service giant’s AWS tech stack.

The incident ended with a high-profile lawsuit in which the financial services giant had to pay a $190m (£140m) settlement to affected customers. Other big businesses impacted by similar incidents include Accenture, Facebook, LinkedIn, Pegasus Airlines, Uber and Twilio. So, what can organisations do to secure their AWS tech stacks?

One of the biggest risks of an insecure AWS tech stack is data theft and exfiltration by cyber criminals, according to Rik Turner, chief cyber security analyst at Omdia. He explains this can happen when S3 buckets, which contain large volumes of files and sensitive metadata, aren’t set up properly.

As a result, S3 bucket access rights can be granted to employees who don’t require them for their roles, leading to insider threats. Or, worse, these crucial storage objects can end up on the public internet for anyone to access and abuse.

Sensitive corporate and customer data exposed in this way can lead to businesses experiencing “enormous financial losses”, says Sylvester Kaczmarek, a professor at online higher education provider the Open Institute of Technology. Their finances take a hit through regulatory fines, customer lawsuits and expensive recovery efforts that can last for months. Reputational damage is often substantial, too.

Additionally, weak or reused user credentials, the absence of cyber security logging and monitoring capabilities, and weaknesses in cyber defences like firewalls leave AWS tech stacks dangerously exposed to data breaches, he adds.

Data breaches can also stem from poorly secured Relational Database Service databases, Elastic Compute Cloud (EC2) instances and application programming interfaces, explains Bob McCarter, chief technology officer of risk and compliance software provider Navex. Erroneous identity and access management policies, a lack of multi-factor authentication, unpatched software and open ports are common security issues affecting these AWS services.

Besides costly data breaches, the day-to-day operations of modern businesses can grind to a halt in the aftermath of an EC2 instance compromise. The latter results in “impaired performance”, and even “a complete malfunctioning” of critical applications and workloads, explains Turner.

These issues are largely the product of mistakes made by AWS users and not cyber attacks targeted at Amazon, according to Neil MacDonald, vice-president and distinguished analyst at Gartner. But he emphasises that mistakes can easily happen due to the “sheer size, complexity and rate of change of AWS deployments”, adding that they are “impossible” to monitor without using appropriate security tools from AWS or other technology companies.

It is, therefore, the responsibility of AWS users to take steps to protect the data they upload to AWS cloud resources. This is enshrined in the cloud security shared responsibility model, with the responsibility of cloud companies like AWS being to secure the infrastructure they sell to customers.

Best practices to secure AWS tech stacks

When it comes to securing AWS tech stacks, many effective best practices are laid out in the AWS Well-Architected framework. McCarter explains that it offers a comprehensive guide for access management, infrastructure management, data privacy, application security, and cyber threat monitoring and detection.

Crystal Morin, cyber security strategist at cloud security company Sysdig, is another vocal supporter of this framework. She says it’s great for handling the prevention, protection, detection and response sides of cyber security. “This model helps you think through how to prevent problems in the first place, ensure your workloads have security in place, and then have the right tools in place to detect and respond to cloud security threats if and when they do take place,” says Morin.

As well as adhering to AWS’s own security best practices, MacDonald points out that the Center for Internet Security also offers advice for creating and maintaining a secure AWS tech stack. He adds that many modern cyber security tools are aligned with the latest AWS best practices, whether provided by Amazon or an outside organisation.

Given that lots of AWS-related security incidents are caused by inadequate access controls, Jake Moore – global cyber security advisor at antivirus maker ESET – urges organisations to implement the principle of least privilege to ensure access rights are limited to those who require them for their roles. This should be enforced as part of a wider identity and access management strategy.

Of course, staff hiring, attrition and promotion can make it difficult to manage AWS access controls. Still, Moore says businesses can use cyber security monitoring tools to track these changes and ensure access controls are amended accordingly, minimising security incidents. In addition to investing in these tools, he urges organisations with AWS stacks to regularly audit their cyber security posture to ensure security gaps are identified and closed swiftly. Automated analysis tools can help with this.

To ensure cyber criminals can’t steal sensitive data stored on and travelling between AWS servers, OPIT’s Kaczmarek says organisations must encrypt data when it’s at rest and in transit. Utilising the AWS Key Management service will help protect data at rest. Meanwhile, tight network security configurations are the key to securing transit data and wider network traffic. These should apply for virtual private clouds, Security Groups and Network Access Control Lists, according to Kaczmarek.

Organisations operating AWS tech stacks can log all network traffic using AWS CloudTrail and monitor it using AWS CloudWatch, says Kaczmarek. He adds that these efforts can be complemented by using multi-factor authentication, implementing security patches when they’re issued and replacing manual processes with infrastructure as code. The previous step is paramount for “consistency and auditing”, he claims.

 

Read the full article below:

Related posts

How Regenerative Business Models Are Redefining Innovation and Sustainability
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Aug 18, 2025 6 min read

Open Institute of Technology (OPIT) masterclasses bring students face-to-face with real-world business challenges. In OPIT’s July masterclass, OPIT Professor Francesco Derchi and Ph.D. candidate Robert Mario de Stefano explained the principles of regenerative businesses and how regeneration goes hand in hand with growth.

Regenerative Business Models

Professor Derchi began by explaining what exactly is meant by regenerative business models, clearly differentiating them from sustainable or circular models.

Many companies pursue sustainable business models in which they offset their negative impact by investing elsewhere. For example, businesses that are big carbon consumers will support nature regeneration projects. Circular business models are similar but are more focused on their own product chain, aiming to minimize waste by keeping products in use as long as possible through recycling. Both models essentially aim to have a “net-zero” negative impact on the environment.

Regenerative models are different because they actively aim to have a “net-positive” impact on the environment, not just offsetting their own use but actively regenerating the planet.

Massive Transformative Purpose

While regenerative business models are often associated with philanthropic endeavors, Professor Derchi explained that they do not have to be, and that investment in regeneration can be a driver of growth.

He discussed the importance of corporate purpose in the modern business space. Having a strong and clearly stated corporate purpose is considered essential to drive business decision-making, encourage employee buy-in, and promote customer loyalty.

But today, simple corporate missions, such as “make good shoes,” don’t go far enough. People are looking for a Massive Transformational Purpose (MTP) that can take the business to the next level.

Take, for example, Ben & Jerry’s. The business’s initial corporate purpose may have been to make great ice cream and serve it up in a way that people will enjoy. But the business really began to grow when they embraced an MTP. As they announced in their mission statement, “We believe that ice cream can change the world.” Their business activities also have the aim of advancing human rights and dignity, supporting social and economic justice, and protecting and restoring the Earth’s natural systems. While these aims are philanthropic, they have also helped the business grow.

RePlanet

Professor Derchi next talked about RePlanet, a business he recently worked to develop their MTP. Founded in 2015, RePlanet designs and implements customized renewable energy solutions for businesses and projects. The company already operates in the renewable energy field and ranked as the 21st fastest-growing business in Italy in 2023. So while they were already enjoying great success, Derchi worked with them to see if actively embracing a regenerative business model could unlock additional growth.

Working together, RePlanet moved towards an MTP of building a greener future based on today’s choices, ensuring a cleaner world for generations. Meeting this goal started with the energy products that RePlanet sells, such as energy systems that recover heat from dairy farms. But as the business’s MTP, it goes beyond that. RePlanet doesn’t just engage suppliers; it chooses partners that share its specific values. It also influences the projects they choose to work on – they prioritize high-impact social projects, such as recently installing photovoltaic energy systems at a local hospital in Nigeria – and how RePlanet treats its talent, acknowledging that people are the true energy of the company.

Regenerative Business Strategies

Based on work with RePlanet and other businesses, Derchi has identified six archetypal regenerative business strategies for businesses that want to have both a regenerative impact and drive growth:

  • Regenerative Leadership – Laying the foundation for regeneration in a broader sense throughout the company
  • Nature Regeneration – Strategies to improve the health of the natural world
  • Social Regeneration – Regenerating human ecosystems through things such as fair-trade practices
  • Responsible Sourcing – Empowering and strengthening suppliers and their communities
  • Health & Well-being – Creating products and services that have a positive effect on customers
  • Employee Focus – Improve work conditions, lives, and well-being of employees.

Case Studies

Building on the concept of regenerative business models, Roberto Mario de Stefano shared other case studies of businesses that are having a positive impact and enjoying growth thanks to regenerative business models and strategies.

Biorfarm

Biorfarm is a digital platform that supports small-scale agriculture by creating a direct link between small farmers and consumers. Cutting out the middleman in modern supply chains means that farmers earn about 50% more for their produce. They set consumers up as “digital farmers” who actively support and learn about farming activities to promote more conscious food consumption.

Their vision is to create a food economy in which those who produce food and those who consume it are connected. This moves consumers from passive cash cows for large corporations that prioritize profits over the well-being of farmers to actively supporting natural production and a more sustainable system.

Rifo Lab

Rifo Lab is a circular clothing brand with the vision of addressing the problem of overproduction in the clothing industry. Established in Prato, Italy, a traditional textile-producing area, the company produces clothes made from textile waste and biodegradable materials. There are no physical stores, and all orders must be placed online; everything is made to order, reducing excess production.

With an eye on social regeneration, all production takes place within 30 kilometers of their offices, allowing the business to support ethical and local production. They also work with companies that actively integrate migrants into the local community, sharing their local artisan crafts with future generations.

Ogyre

Ogyre is a digital platform that allows you to pay fishermen to fish for waste. When fishermen are out conducting their livelihood, they also collect a significant amount of waste from the ocean, especially plastic waste. Ogyre arranges for fishermen to get paid for collecting that waste, which in turn supports the local fishing communities, and then transforms the waste collected into new sustainable products.

Moving Towards a Regenerative Future

The masterclass concluded with a Q&A session, where it explained that working in regenerative businesses requires the same skills as any other business. But it also requires you to embrace a mindset where value comes from giving and that growth is about working together for a better future, and not just competition.

Read the article
Addressing the Skills Gap: OPIT Prepares Students for the Modern Job Market
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Aug 18, 2025 5 min read

Riccardo Ocleppo’s vision for the Open Institute of Technology (OPIT) started when he realized that his own university-level training had not properly prepared him for the modern workplace. Technological innovation is moving quickly and changing the nature of work, while university curricula evolve slowly, in part due to systems in place designed to preserve the quality of courses.

Ocleppo was determined to create a higher learning institution that filled the gap between the two realities – delivering high-quality education while preparing professionals to work in dynamic environments that keep pace with technology. Thus, OPIT opened enrolments in 2023 with a curriculum that created a unique bridge between the present and the future.

This is the story of one student, Ania Jaca, whose time at OPIT gave her the skills to connect her knowledge of product design to full system deployment.

Meet Ania

Ania is an example of an active professional who was able to identify what was missing in her own skills that would be needed if she wanted to advance her career in the direction she desired.

Ania is a highly skilled professional who was working on product and industrial design at Deloitte. She has an MA in product design, speaks five languages, studied in China, and is an avid boxer. She had the intelligence and the temperament to succeed in her career, but felt that she lacked the skills to advance and move from determining how products look to how systems really work, scale, and evolve.

Ania taught herself skills such as Python, artificial intelligence (AI), and cloud infrastructure, but soon realized that she needed a more structured education to go deeper. Thus, the search for her next steps began, and her introduction to OPIT.

OPIT appealed to Ania because it offered a fully EU-accredited MSc that she could pursue at her own pace, thanks to remote delivery and flexible hours. But more than that, it filled exactly the knowledge gap she was looking to build upon, teaching her technical foundations, but always with a focus on applications in the real world. Part of the appeal was the faculty, which includes professionals who are leaders in their field and who deal with current professional challenges on a daily basis, which they can bring into the classroom.

Ania enrolled in OPIT’s MSc in Applied Data Science & AI.

MSc in Applied Data Science and AI

This is OPIT’s first master’s program, which also launched in 2023, and is now one of four on offer. The course is designed for graduates like Ania who want a career at the intersection of management and technology. It is attractive to professionals who are already working in this area but lack the technical training to step into certain roles. OPIT requires no computer science prerequisites, so it accepted Ania with her MA in product design.

It is an intensive program that starts with foundational application courses in business, data science, machine learning, artificial intelligence, and problem-solving. The program then moves towards applying data science and AI methodologies and tools to real-life business problems.

The course combines theoretical study with a capstone project that lets students apply what they learn in the real world, either at their existing company or through internship programs. Many of the projects developed by students go on to become fundamental to the businesses they work with.

Ania’s Path Forward

Ania is working on her capstone project with Neperia Group, an Italian-based IT systems development company that works mostly with financial, insurance, and industrial companies. They specialize in developing analysis tools for existing software to enhance insight, streamline management, minimize the impact of corrective and evolutionary interventions, and boost performance.

Ania is specifically working on tools for assessing vulnerabilities in codebases as an advanced cybersecurity tool.

Ania credits her studies at OPIT for helping her build solid foundations in data science, machine learning, and cloud workflows, giving her a thorough understanding of digital products from end to end. She feels this has prepared her for roles at the intersection between infrastructure, security, and deployment, which is exactly where she wants to be. OPIT is excited to see where Ania’s career takes her in the coming years.

Preparing for the Future of Work

Overall, studying at OPIT has helped Ania and others like her prepare for the future of work. According to the Visual Capitalist, the fastest-growing jobs between 2025 and 2030 will be in big data (up by 110%), Fintech engineers (up by 95%), AI and machine learning specialists (up by 85%), software application developers (up by 60%), and security management specialists (up by 55%).

However, while these industries are growing, entry-level opportunities are declining in areas such as software development and IT. This is because AI now performs many of the tasks associated with those roles. Instead, companies are looking for experienced professionals to take on roles that involve more strategic oversight and innovative problem-solving. But how do recent graduates leapfrog past experienced professionals when there is a lack of entry-level positions to make the transition?

This is another challenge that OPIT addresses in its course design. Students don’t just learn the theory, OPIT actively encourages them to focus on applications, allowing them to build experience while studying. The capstone project consolidates this, enabling students to demonstrate to future employers their expertise at deploying technology to solve problems.

OPIT also has a dynamic Career Services department that specifically works with students to prepare them for the types of roles they want. This focus on not only learning but building a career is one of the elements that makes OPIT stand out in preparing graduates for the workplace.

Read the article