Skip to main content

Phase 5: Securing Your Cloud Applications

Author: Ethan Troy | Last Updated: September 2025

Welcome to Phase 5 of Learn to Cloud! This phase focuses on securing the cloud applications and infrastructure you've built throughout your journey. You'll take the Journal API application from previous phases and implement enterprise-grade security controls, monitoring, and incident response capabilities.

Objectives

By the end of this phase, you will:

  • Secure the Journal API application with proper IAM controls
  • Implement data protection and secrets management
  • Configure network security and secure connectivity
  • Set up security monitoring and alerting systems
  • Build automated threat detection and incident response
  • Complete a comprehensive security implementation project

How This Phase Builds on Your Journey

This phase takes the practical foundation you've built in Phases 1-4 and adds the security layer that makes your applications production-ready. You'll learn security skills that every cloud engineer needs, regardless of their specific role:

  • Phase 1-2 Foundation: Use your Linux and programming skills to configure security tools
  • Phase 3 Infrastructure: Secure the cloud resources and networking you deployed
  • Phase 4 DevOps: Add security scanning and monitoring to your CI/CD pipelines
  • Phase 5 Security: Make everything production-ready with enterprise security controls

Security isn't a separate discipline—it's an essential skill that enhances every aspect of cloud engineering.

For an excellent foundation in cloud security thinking, read these provider security overviews:

Welcome to Applied Cloud Security

gif|289x289

Building on What You've Created

Throughout this course, you've built a Journal API application and supporting infrastructure. Now it's time to secure it for production use. This hands-on approach helps you understand:

  • Real-world application: Security isn't theoretical—you'll secure actual running applications
  • Practical constraints: Learn to balance security with usability and performance
  • Incremental improvement: Add security layers without breaking existing functionality
  • Career readiness: Gain experience with security tools and practices used in production environments

You'll work with the same infrastructure you've been building, making this phase immediately practical and relevant.

How to Use This Section

  1. Start with your existing infrastructure - Use the Journal API and infrastructure from previous phases
  2. Build security incrementally - Add one security layer at a time without breaking functionality
  3. Practice with real scenarios - Each topic includes hands-on exercises with your actual application
  4. Test your security controls - Learn to validate that your security measures actually work
  5. Document your security posture - Build security documentation as you implement controls

gif|480x360

Learning Through Real Implementation

The most effective way to learn cloud security is to secure applications you actually care about. By working with the Journal API you've built, you'll:

  • See immediate impact - Understand how security changes affect real applications
  • Learn practical trade-offs - Balance security with performance and usability
  • Build relevant skills - Focus on security practices used in production environments
  • Create portfolio value - Demonstrate security implementation skills to employers

Prerequisites

  • Star the GitHub repository to Stay informed on updates.
  • Join the Learn to Cloud Discord and introduce yourself in the #intros-and-socials channel.
  • Completed Phase 3: Cloud Platform fundamentals (have deployed infrastructure)
  • Completed Phase 4: DevOps fundamentals (recommended but not required)
  • Access to the Journal API application and infrastructure from previous phases
  • A cloud platform account (AWS, Azure, or GCP) with administrative permissions

Topics

No.TopicWhat You'll Build
1Identity and Access ManagementSecure IAM controls for your Journal API infrastructure
2Data Protection and Secrets ManagementEncryption, key management, and secure secrets for your application
3Network SecuritySecure networking and connectivity for your application
4Security MonitoringReal-time security monitoring and alerting for your infrastructure
5Threat Detection and ResponseAutomated threat detection and incident response for your environment
6Capstone: Secure Your Journal APIComprehensive security implementation bringing it all together

What You'll Accomplish

By the end of this phase, you'll have:

  • Secured Infrastructure: Your Journal API will be protected with enterprise-grade security controls
  • Monitoring & Alerting: Real-time security monitoring and automated incident response
  • Production Readiness: Security implementation skills used in professional environments
  • Portfolio Project: A fully secured application demonstrating your cloud security capabilities
  • Career Preparation: Practical experience with security tools and practices employers value

This phase transforms you from someone who can build cloud applications to someone who can build secure cloud applications—a critical distinction in professional cloud engineering.

Additional Learning Resources

Want to go deeper? Here are some additional resources:

Practice Labs:

Certifications to Consider:

  • AWS: AWS Certified Security - Specialty (after AWS Solutions Architect Associate)
  • Azure: AZ-500 Azure Security Engineer Associate
  • GCP: Professional Cloud Security Engineer
  • Vendor-Neutral: CompTIA Security+ (good foundation)

What's Next?

Now that you've explored cloud security fundamentals, you can:

  1. Apply security to all your cloud projects - Take the knowledge from this phase and integrate it into everything you build
  2. Specialize further in cloud security - Consider pursuing security certifications or roles
  3. Build a portfolio of security projects - Use the project ideas from this phase to demonstrate your security skills
  4. Join cloud security communities - Connect with others through forums like /r/cloudsecurity, Cloud Security Alliance, or OWASP Cloud Security

Remember that cloud security is an ongoing journey. The landscape continuously evolves, and the best cloud professionals make security a permanent part of their learning process and technical approach.