<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Open Forem: Ibrahim S</title>
    <description>The latest articles on Open Forem by Ibrahim S (@ibbus).</description>
    <link>https://open.forem.com/ibbus</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1060749%2Fec50147a-f620-4ffe-8747-5f33301ec77a.jpeg</url>
      <title>Open Forem: Ibrahim S</title>
      <link>https://open.forem.com/ibbus</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://open.forem.com/feed/ibbus"/>
    <language>en</language>
    <item>
      <title>SPF, DKIM, and DMARC: The Trust Protocols Protecting Your Domain</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Fri, 06 Mar 2026 05:21:20 +0000</pubDate>
      <link>https://open.forem.com/ibbus/spf-dkim-and-dmarc-the-trust-protocols-protecting-your-domain-dj9</link>
      <guid>https://open.forem.com/ibbus/spf-dkim-and-dmarc-the-trust-protocols-protecting-your-domain-dj9</guid>
      <description>&lt;p&gt;&lt;strong&gt;SPF, DKIM, and DMARC aren’t just DNS records quietly sitting in the background.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;They are active trust mechanisms that determine whether your domain is legitimate or easily spoofed.&lt;/p&gt;

&lt;p&gt;When an email leaves your domain, these protocols work together to answer one simple question:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Can this message be trusted?&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  ⚙️ SPF — Validating the Sender
&lt;/h3&gt;

&lt;p&gt;Sender Policy Framework (SPF) verifies that the IP address sending the email is authorized by the domain owner.&lt;br&gt;
If the sending server isn’t listed in the domain’s SPF record, the receiving server can flag or reject the message.&lt;/p&gt;

&lt;h3&gt;
  
  
  🧠 DKIM — Cryptographic Message Integrity
&lt;/h3&gt;

&lt;p&gt;DomainKeys Identified Mail (DKIM) adds a digital signature to the email header.&lt;br&gt;
This signature allows the receiving server to verify that the message content hasn’t been altered in transit and that it genuinely originated from the claimed domain.&lt;/p&gt;

&lt;h3&gt;
  
  
  📊 DMARC — Policy, Alignment, and Reporting
&lt;/h3&gt;

&lt;p&gt;Domain-based Message Authentication, Reporting &amp;amp; Conformance (DMARC) ties SPF and DKIM together.&lt;/p&gt;

&lt;p&gt;It allows domain owners to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Define what should happen when authentication fails (&lt;code&gt;none&lt;/code&gt;, &lt;code&gt;quarantine&lt;/code&gt;, &lt;code&gt;reject&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;Enforce domain alignment&lt;/li&gt;
&lt;li&gt;Receive reports about authentication activity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But here’s the insight that changed how I view DMARC:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;DMARC isn’t just enforcement. It’s visibility.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Without DMARC reporting, you have no clear view of who is sending emails using your domain — legitimate services, misconfigured systems, or attackers attempting spoofing.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why This Matters
&lt;/h3&gt;

&lt;p&gt;Email security isn’t simply about filtering spam.&lt;/p&gt;

&lt;p&gt;It’s about protecting your &lt;strong&gt;domain reputation at the protocol level&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If SPF, DKIM, and DMARC are misconfigured — or missing — your domain becomes an easy target for phishing and spoofing attacks.&lt;/p&gt;

&lt;p&gt;Properly implementing these standards means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Your emails are trusted&lt;/li&gt;
&lt;li&gt;Your domain reputation stays intact&lt;/li&gt;
&lt;li&gt;Abuse attempts become visible and actionable&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbglvj4ci7twmu5ck8xr0.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbglvj4ci7twmu5ck8xr0.gif" alt=" " width="593" height="639"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Final Thought
&lt;/h3&gt;

&lt;p&gt;Think of SPF, DKIM, and DMARC as the &lt;strong&gt;authentication layer of email trust&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;They don't just help receivers decide whether to accept an email —&lt;br&gt;
they help &lt;strong&gt;domain owners maintain control over how their identity is used on the internet.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And in today’s threat landscape, that visibility is everything.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>security</category>
      <category>emailsecurity</category>
      <category>dns</category>
    </item>
    <item>
      <title>🔐 Why SPF, DKIM &amp; DMARC Are Essential for Email Security</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Wed, 25 Feb 2026 04:38:43 +0000</pubDate>
      <link>https://open.forem.com/ibbus/why-spf-dkim-dmarc-are-essential-for-email-security-3fno</link>
      <guid>https://open.forem.com/ibbus/why-spf-dkim-dmarc-are-essential-for-email-security-3fno</guid>
      <description>&lt;p&gt;In 2026, fake emails and domain spoofing are still rampant. Learn why major providers enforce SPF, DKIM, and DMARC and how these three protocols protect your domain, boost deliverability, and build trust.&lt;/p&gt;

&lt;p&gt;In today’s digital world, email remains &lt;strong&gt;one of the most common attack vectors&lt;/strong&gt;. Phishing, BEC (Business Email Compromise), and domain spoofing attacks trick people daily damaging trust, stealing credentials, and costing businesses millions.&lt;/p&gt;

&lt;p&gt;Major inbox providers like Google, Microsoft (Outlook/365), and Yahoo now &lt;strong&gt;strictly enforce&lt;/strong&gt; email authentication. Without proper setup, your legitimate emails may land in spam — or worse, attackers can impersonate your domain to target your customers.&lt;/p&gt;

&lt;p&gt;That’s why &lt;strong&gt;SPF&lt;/strong&gt;, &lt;strong&gt;DKIM&lt;/strong&gt;, and &lt;strong&gt;DMARC&lt;/strong&gt; are non-negotiable in 2026.&lt;/p&gt;

&lt;p&gt;👉 Think of them as &lt;strong&gt;passport + fingerprint + entry rules&lt;/strong&gt; for your emails.&lt;/p&gt;

&lt;h3&gt;
  
  
  ✅ What Do They Actually Do? (Simple Breakdown)
&lt;/h3&gt;

&lt;p&gt;📌 &lt;strong&gt;SPF (Sender Policy Framework)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✔️ Lists which servers/IPs are officially allowed to send email &lt;strong&gt;from your domain&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✔️ Stops random servers (or attackers) from forging your @yourcompany.com address  &lt;/p&gt;

&lt;p&gt;Example record: &lt;code&gt;v=spf1 include:_spf.google.com ~all&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;📌 &lt;strong&gt;DKIM (DomainKeys Identified Mail)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✔️ Adds a &lt;strong&gt;cryptographic digital signature&lt;/strong&gt; to every outgoing email&lt;br&gt;&lt;br&gt;
✔️ Proves the message content hasn’t been tampered with in transit&lt;br&gt;&lt;br&gt;
✔️ Uses public-key cryptography (you publish the public key in DNS)&lt;/p&gt;

&lt;p&gt;📌 &lt;strong&gt;DMARC (Domain-based Message Authentication, Reporting &amp;amp; Conformance)&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
✔️ Combines SPF + DKIM results and checks &lt;strong&gt;alignment&lt;/strong&gt; (does the visible From: domain match?)&lt;br&gt;&lt;br&gt;
✔️ Lets you set a policy: &lt;code&gt;none&lt;/code&gt; (monitor only), &lt;code&gt;quarantine&lt;/code&gt; (spam folder), or &lt;code&gt;reject&lt;/code&gt; (block outright)&lt;br&gt;&lt;br&gt;
✔️ Sends you detailed &lt;strong&gt;forensic reports&lt;/strong&gt; about who’s trying to spoof your domain&lt;/p&gt;

&lt;h3&gt;
  
  
  🔄 The Email Authentication Workflow (Step by Step)
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;Your server sends an email
&lt;/li&gt;
&lt;li&gt;Receiving server checks &lt;strong&gt;SPF&lt;/strong&gt; → “Is this server allowed?”
&lt;/li&gt;
&lt;li&gt;Verifies &lt;strong&gt;DKIM&lt;/strong&gt; signature → “Was this message changed?”
&lt;/li&gt;
&lt;li&gt;Applies your &lt;strong&gt;DMARC&lt;/strong&gt; policy → “What should we do if it fails alignment?”
&lt;/li&gt;
&lt;li&gt;Result: Delivered → Spam → Rejected
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Only properly authenticated emails reliably reach the inbox.&lt;/p&gt;

&lt;h3&gt;
  
  
  🚨 Why This Matters More Than Ever (2026 Reality)
&lt;/h3&gt;

&lt;p&gt;Without authentication:&lt;br&gt;&lt;br&gt;
❌ Attackers spoof your domain for phishing campaigns&lt;br&gt;&lt;br&gt;
❌ Your real emails get flagged as spam (especially to Gmail/Outlook)&lt;br&gt;&lt;br&gt;
❌ Brand reputation tanks — customers lose trust&lt;br&gt;&lt;br&gt;
❌ You miss spoofing attempts until damage is done  &lt;/p&gt;

&lt;p&gt;With SPF + DKIM + DMARC properly set up:&lt;br&gt;&lt;br&gt;
✔️ Dramatically better inbox placement&lt;br&gt;&lt;br&gt;
✔️ Strong protection against exact-domain phishing&lt;br&gt;&lt;br&gt;
✔️ Visibility via DMARC aggregate/forensic reports&lt;br&gt;&lt;br&gt;
✔️ Higher customer trust and domain reputation  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Quick analogy everyone gets:&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
🛡️ &lt;strong&gt;SPF&lt;/strong&gt; = “Who is allowed to speak for me?”&lt;br&gt;&lt;br&gt;
✍️ &lt;strong&gt;DKIM&lt;/strong&gt; = “Here’s my official signature — prove it’s really me”&lt;br&gt;&lt;br&gt;
📋 &lt;strong&gt;DMARC&lt;/strong&gt; = “If they fail the checks → follow my instructions + send me a report”&lt;/p&gt;

&lt;h3&gt;
  
  
  💡 Real-World Stats (Early 2026)
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;~71% of domains still have &lt;strong&gt;no effective DMARC protection&lt;/strong&gt; (p=none, invalid, or missing)
&lt;/li&gt;
&lt;li&gt;Only ~10-11% enforce strict &lt;code&gt;p=reject&lt;/code&gt; globally
&lt;/li&gt;
&lt;li&gt;Fortune 100 companies have dramatically increased &lt;code&gt;p=reject&lt;/code&gt; adoption (up ~89% since 2022)
&lt;/li&gt;
&lt;li&gt;Major providers reject/ quarantine non-compliant bulk email more aggressively every year&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🛠️ Quick Start Guide (Developer-Friendly)
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;SPF&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify &lt;strong&gt;all&lt;/strong&gt; services sending on your behalf (Google Workspace, Mailchimp, your app, etc.)
&lt;/li&gt;
&lt;li&gt;Create one TXT record: &lt;code&gt;v=spf1 include:_spf.google.com include:sendgrid.net ~all&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Avoid &amp;gt;10 DNS lookups — use &lt;code&gt;include:&lt;/code&gt; wisely&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DKIM&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Most email providers (Google, Microsoft 365, SendGrid, etc.) generate the key pair for you
&lt;/li&gt;
&lt;li&gt;Publish the public key as a TXT record under &lt;code&gt;selector._domainkey.yourdomain.com&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;DMARC&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Start monitoring: &lt;code&gt;_dmarc.yourdomain.com TXT "v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com"&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;After 1–4 weeks of clean reports → move to &lt;code&gt;p=quarantine&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Then (when confident) → &lt;code&gt;p=reject; pct=100&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Add &lt;code&gt;ruf=&lt;/code&gt; for forensic failure reports (careful — they contain full message samples)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Common pitfalls to avoid:&lt;/strong&gt;  &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Forgetting third-party senders → legitimate mail gets rejected
&lt;/li&gt;
&lt;li&gt;Jumping straight to &lt;code&gt;p=reject&lt;/code&gt; → you block your own mail
&lt;/li&gt;
&lt;li&gt;Not covering subdomains (use &lt;code&gt;sp=&lt;/code&gt; tag or publish separate records)
&lt;/li&gt;
&lt;li&gt;SPF with too many lookups (&amp;gt;10 = permerror)
&lt;/li&gt;
&lt;li&gt;Leaving parked/inactive domains unprotected&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Final Takeaway
&lt;/h3&gt;

&lt;p&gt;In 2026, &lt;strong&gt;SPF + DKIM + DMARC isn’t nice-to-have&lt;/strong&gt; — it’s &lt;strong&gt;table stakes&lt;/strong&gt; for serious email security and deliverability.&lt;/p&gt;

&lt;p&gt;Set them up, monitor the reports, tighten the policy over time.&lt;/p&gt;

&lt;p&gt;Your inbox placement, brand trust, and phishing defense will thank you.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>dmarc</category>
      <category>phishing</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Mastering Exchange Online Mail Flow: What Every IT Admin Should Know</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Sun, 08 Feb 2026 14:36:37 +0000</pubDate>
      <link>https://open.forem.com/ibbus/mastering-exchange-online-mail-flow-what-every-it-admin-should-know-2i6k</link>
      <guid>https://open.forem.com/ibbus/mastering-exchange-online-mail-flow-what-every-it-admin-should-know-2i6k</guid>
      <description>&lt;p&gt;The email flow (or mail flow), we’re really describing the full path an email takes from the sender’s mail system to the recipient’s mailbox including all the routing decisions, security checks, filtering, and delivery steps along the way.&lt;/p&gt;

&lt;p&gt;In Microsoft Exchange Online, that journey typically includes:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;DNS &amp;amp; MX routing&lt;/code&gt;&lt;br&gt;
The sender’s mail server looks up your domain’s MX record to find where to deliver email.&lt;/p&gt;

&lt;p&gt;or Microsoft 365 tenants, this usually points to Exchange Online Protection (EOP), which is the first security and routing gateway.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;SPF, DKIM, and DMARC validation&lt;/code&gt;&lt;br&gt;
Incoming messages are checked to see whether the sending server is authorized (SPF), the message is cryptographically signed (DKIM), and how to handle failures (DMARC). This helps reduce spoofing and domain abuse.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Mail flow (transport) rules and policies&lt;/code&gt;&lt;br&gt;
Mail flow rules can apply disclaimers, block or redirect messages, add headers, or enforce compliance and DLP-style policies based on conditions like sender, recipient, keywords, or attachments.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Connectors and routing configuration&lt;/code&gt;&lt;br&gt;
Connectors control how Exchange Online talks to on-premises Exchange, third-party gateways, or partner domains. &lt;/p&gt;

&lt;p&gt;Misconfigured connectors are a very common cause of “mysterious” mail flow problems.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Spam, phishing, and malware filtering&lt;/code&gt;&lt;br&gt;
Exchange Online Protection (EOP) and Microsoft Defender for Office 365 scan messages for spam, phishing indicators, malware, and harmful URLs or attachments before they reach the mailbox.&lt;/p&gt;

&lt;p&gt;Why most “mail flow issues” are not product bugs&lt;br&gt;
In real enterprise environments, most mail flow incidents I’ve seen are not caused by Exchange Online “breaking,” but by:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Incorrect or missing DNS records (MX/SPF/DKIM/DMARC)&lt;/li&gt;
&lt;li&gt;Misconfigured connectors or hybrid routing design&lt;/li&gt;
&lt;li&gt;Overly aggressive mail flow rules&lt;/li&gt;
&lt;li&gt;Custom security devices (secure email gateways, firewalls) changing the path&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That’s why understanding the flow end-to-end is so important. When you know the stages, you can narrow down where the issue is happening.&lt;/p&gt;

&lt;p&gt;🔍 Pro Tip: Start with headers and message trace&lt;br&gt;
Before you touch any configuration:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Review the message headers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Check the Received hops to see which systems handled the message.&lt;/p&gt;

&lt;p&gt;Look at SPF/DKIM/DMARC results and any anti-spam headers.&lt;/p&gt;

&lt;p&gt;Identify whether the message actually reached Exchange Online or was altered earlier in the path.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Run a message trace&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Confirm if the message was delivered, quarantined, filtered, or bounced.&lt;/p&gt;

&lt;p&gt;See which rule, filter, or policy took action and at what time.&lt;/p&gt;

&lt;p&gt;These two steps alone often tell you whether the issue is DNS, routing, antispam, or a transport rule, and save you from random trial-and-error configuration changes.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>exchangeonline</category>
      <category>emailtroubleshooting</category>
      <category>eop</category>
    </item>
    <item>
      <title>MFA Fatigue Approval: When “Approve” Becomes Your Weakest Link</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Sat, 07 Feb 2026 15:13:50 +0000</pubDate>
      <link>https://open.forem.com/ibbus/mfa-fatigue-approval-when-approve-becomes-your-weakest-link-55ol</link>
      <guid>https://open.forem.com/ibbus/mfa-fatigue-approval-when-approve-becomes-your-weakest-link-55ol</guid>
      <description>&lt;p&gt;Multi-Factor Authentication (MFA) is now a baseline control in most organizations. We pat ourselves on the back once &lt;code&gt;MFA is enabled for everyone&lt;/code&gt; and move on to the next security project.&lt;/p&gt;

&lt;p&gt;But attackers haven’t stopped. Instead, they’ve adapted.&lt;/p&gt;

&lt;p&gt;One of the most effective techniques they use today is MFA fatigue (also called MFA fatigue approval, push bombing, or MFA spamming). Instead of breaking crypto, they simply annoy your users into approving a malicious sign-in.&lt;/p&gt;

&lt;p&gt;In this &lt;a href="https://www.linkedin.com/posts/ibrahim-si_ibbus-cybersecurity-microsoft365-activity-7425914482138472448-iOT_?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAB99aowBx9pGTpkRIoAgK4FpBwn77_MEsM0" rel="noopener noreferrer"&gt;post&lt;/a&gt;, I’ll walk through what MFA fatigue approval is, how the attack works end-to-end, and what you can do as an engineer or security admin to defend against it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is MFA fatigue approval?&lt;/strong&gt;&lt;br&gt;
In many environments, users approve sign-ins through a simple push notification:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Are you trying to sign in?”&lt;br&gt;
[Approve] [Deny]&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;MFA fatigue approval happens when an attacker:&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Obtains a valid username and password, and&lt;/li&gt;
&lt;li&gt;Keeps triggering MFA prompts repeatedly,&lt;/li&gt;
&lt;li&gt;Until the user, out of frustration or confusion, finally taps “Approve”.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The underlying authentication protocol still works as designed. The weakness is the user’s decision under pressure.&lt;/p&gt;

&lt;p&gt;MFA is still better than passwords alone, but if the user approves anything that pops up on their phone, the effective security is close to zero.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How attackers run MFA fatigue attacks&lt;/strong&gt;&lt;br&gt;
Let’s break down a typical attack flow.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;1. Steal credentials&lt;/code&gt;&lt;br&gt;
First, the attacker needs valid credentials. Common sources:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Phishing pages imitating common login portals&lt;/li&gt;
&lt;li&gt;Password reuse across multiple sites&lt;/li&gt;
&lt;li&gt;Credentials for sale from previous breaches&lt;/li&gt;
&lt;li&gt;Infostealer malware that exfiltrates browser-saved passwords&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Once they have &lt;a href="mailto:user@company.com"&gt;user@company.com&lt;/a&gt; and the password, MFA becomes the only thing standing in their way.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;2. Trigger repeated MFA prompts&lt;/code&gt;&lt;br&gt;
The attacker starts logging in again and again to the target service:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Each attempt sends a legitimate MFA prompt to the user’s phone or authenticator app.&lt;/li&gt;
&lt;li&gt;Some attackers script this to fire prompts in bursts or at random intervals.&lt;/li&gt;
&lt;li&gt;Others specifically target late-night hours when the user is tired and less careful.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The goal is not to bypass MFA technically. The goal is to wear down the human.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;3. Add social engineering&lt;/code&gt;&lt;br&gt;
To increase success, attackers often combine the prompts with social engineering, for example:&lt;/p&gt;

&lt;p&gt;Calling the user pretending to be IT support:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;We are doing an MFA system test. Please approve the next prompt you see.&lt;/li&gt;
&lt;li&gt;Sending a fake “helpdesk” email instructing them to approve a series of prompts.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Now the user is receiving multiple notifications and a “helpful” voice tells them it’s all normal.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;code&gt;The one wrong tap&lt;/code&gt;&lt;br&gt;
After enough prompts:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The user is annoyed: “Let me just approve this so it stops.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Or they are half asleep and assume, “Maybe something is syncing in the background.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Or they trust the fake IT call and think they’re helping.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;They tap &lt;code&gt;Approve&lt;/code&gt; once.&lt;/p&gt;

&lt;p&gt;That single approval hands the attacker a valid session token, and from that point, it becomes a standard post-compromise scenario.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;5. Post-compromise actions&lt;/code&gt;&lt;br&gt;
Once inside, attackers can:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Access email and collaboration tools&lt;/li&gt;
&lt;li&gt;Search for sensitive data (contracts, credentials, internal docs)&lt;/li&gt;
&lt;li&gt;Register their own MFA device for persistence&lt;/li&gt;
&lt;li&gt;Elevate privileges, move laterally, and in worst cases, deploy ransomware&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;All of this started from an &lt;code&gt;MFA-protected&lt;/code&gt; account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why this technique works so well&lt;/strong&gt;&lt;br&gt;
MFA fatigue approval is powerful because it attacks human behavior and UX, not the math.&lt;/p&gt;

&lt;p&gt;A few reasons it’s so effective:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Notification overload&lt;/code&gt;&lt;br&gt;
Users receive many prompts and alerts daily. A few more don’t stand out.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Bad habits&lt;/code&gt;&lt;br&gt;
Some users approve out of routine without carefully reading the prompt.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Poor context&lt;/code&gt;&lt;br&gt;
Many MFA prompts don’t clearly show location, device, or app. Users approve &lt;code&gt;blindly&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Time pressure &amp;amp; annoyance&lt;/code&gt;&lt;br&gt;
Late-night or repeated prompts create stress. People want them to stop.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Imperfect training&lt;/code&gt;&lt;br&gt;
Users are told “MFA makes you safe”, but rarely taught “Unexpected prompts = active attack”.&lt;/p&gt;

&lt;p&gt;If your environment relies purely on &lt;code&gt;tap approve&lt;/code&gt; MFA without guardrails, you are vulnerable to this even if “MFA is enabled for everyone”.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to detect MFA fatigue attacks&lt;/strong&gt;&lt;br&gt;
You can’t defend what you can’t see. Typical detection indicators include:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Multiple MFA prompts for one user in a short time window&lt;/code&gt;&lt;br&gt;
Example: 15 MFA attempts in 5 minutes.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Many denied requests followed by a single successful approval&lt;/code&gt;&lt;br&gt;
Pattern: deny, deny, deny, approve.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Unusual times and locations&lt;/code&gt;&lt;br&gt;
Successful approval at unusual hours, or from a location/device that doesn’t match the user’s normal pattern.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Helpdesk tickets about “weird MFA spam”&lt;/code&gt;&lt;br&gt;
Users complain they keep getting prompts they didn’t initiate.&lt;/p&gt;

&lt;p&gt;If you have access to your identity provider or SIEM logs, building alerts around these patterns is a great starting point.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical defenses against MFA fatigue approval&lt;/strong&gt;&lt;br&gt;
Now, let’s get to the part that matters: what you can actually do.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;code&gt;Replace “Approve/Deny” with number matching or codes&lt;/code&gt;&lt;br&gt;
The most impactful change:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Instead of a generic approve/deny push, require the user to&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;enter a number shown on the login screen, or&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;enter a verification code from the app.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This forces a tight binding between the login session and the device. An attacker who only has the password and can’t see the login screen can’t guess the number.&lt;/p&gt;

&lt;p&gt;It also forces the user to pay more attention: it’s harder to “mindlessly approve” when you have to type something.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;2. Enrich MFA prompts with context&lt;/code&gt;&lt;br&gt;
Give users enough data to make a good decision:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Where is this request coming from? (City, country)&lt;/li&gt;
&lt;li&gt;What is being accessed? (App/resource)&lt;/li&gt;
&lt;li&gt;Which device or browser is used?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If a user is sitting in India and sees a prompt from a login in another country at 3 a.m., they should instantly know: this is not me.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;3. Limit MFA prompt retries&lt;/code&gt;&lt;br&gt;
Don’t let attackers spam your users indefinitely.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Set rate limits on MFA attempts per user per time window.&lt;/li&gt;
&lt;li&gt;After several failed or denied attempts, temporarily block further prompts.&lt;/li&gt;
&lt;li&gt;Require additional verification or helpdesk interaction if there’s a spike in MFA failures.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This both protects users and gives your security team a signal that something suspicious is happening.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;4. Use stronger, phishing-resistant methods where possible&lt;/code&gt;&lt;br&gt;
For high-value accounts (admins, finance, executives), consider moving beyond push-based MFA:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;FIDO2 security keys / hardware tokens&lt;/li&gt;
&lt;li&gt;Platform authenticators tied to specific devices&lt;/li&gt;
&lt;li&gt;Certificate-based authentication&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These methods remove the “&lt;code&gt;tap approve&lt;/code&gt;” surface entirely and are much harder to abuse remotely.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;5. Hardening privileged and cloud admin accounts&lt;/code&gt;&lt;br&gt;
MFA fatigue against admin accounts is particularly dangerous.&lt;/p&gt;

&lt;p&gt;For privileged roles:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Require MFA on every sign-in, no long “remember this device” window.&lt;/li&gt;
&lt;li&gt;Restrict admin sign-in to dedicated, hardened devices and locations.&lt;/li&gt;
&lt;li&gt;Use just-in-time elevation (PIM-style) so users are not permanently privileged.&lt;/li&gt;
&lt;li&gt;Combine Conditional Access-like rules: device compliance, location, risk signals.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Even if an attacker manages one approval, they still have a much harder time escalating.&lt;/p&gt;

&lt;p&gt;The human side: training users to say “&lt;code&gt;No&lt;/code&gt;”&lt;br&gt;
Technology alone won’t solve MFA fatigue approval. You also need user education.&lt;/p&gt;

&lt;p&gt;Key messages for users:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Never approve a prompt you didn’t initiate.&lt;/code&gt;&lt;br&gt;
If you’re not currently logging in, treat the prompt as an attack.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Multiple prompts = red flag.&lt;/code&gt;&lt;br&gt;
If you get repeated prompts, don’t ignore them—report them immediately.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;IT will never ask you to approve random MFA prompts.&lt;/code&gt;&lt;br&gt;
Any call, chat, or email asking you to “help test MFA by approving” is suspicious.&lt;/p&gt;

&lt;p&gt;A simple rule you can include in internal training:&lt;/p&gt;

&lt;p&gt;If you’re not logging in right now and you see an MFA request, always deny it and notify IT.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;MFA is essential, but it’s not magic. If your users are one annoyed tap away from compromise, you haven’t closed the loop.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;To reduce the risk of MFA fatigue approval:&lt;/li&gt;
&lt;li&gt;Move beyond simple push approvals.&lt;/li&gt;
&lt;li&gt;Add context and friction where it matters.&lt;/li&gt;
&lt;li&gt;Monitor for suspicious MFA patterns.&lt;/li&gt;
&lt;li&gt;Train users to treat unexpected prompts as an active security incident.&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>ibbus</category>
      <category>mfafatigue</category>
      <category>cloudsecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Better Microsoft 365 Email Security Through Smarter Configuration</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Fri, 06 Feb 2026 09:50:34 +0000</pubDate>
      <link>https://open.forem.com/ibbus/better-microsoft-365-email-security-through-smarter-configuration-52an</link>
      <guid>https://open.forem.com/ibbus/better-microsoft-365-email-security-through-smarter-configuration-52an</guid>
      <description>&lt;p&gt;&lt;a href="https://www.linkedin.com/posts/ibrahim-si_ibbus-emailsecurity-defender-activity-7388955718919323648-Dhih?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAB99aowBx9pGTpkRIoAgK4FpBwn77_MEsM0" rel="noopener noreferrer"&gt;Email continues&lt;/a&gt; to be the &lt;code&gt;primary attack vector&lt;/code&gt; for phishing, malware, and identity-based threats. Many organizations assume that achieving strong email security requires purchasing premium or expensive Microsoft 365 licenses.&lt;/p&gt;

&lt;p&gt;The reality? Even &lt;code&gt;cost-effective plans&lt;/code&gt; like &lt;code&gt;Business Basic, Business Standard, and Office 365 E1&lt;/code&gt; can deliver solid protection when configured correctly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🚨 Why Email Security Still Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Attackers continue to target email because:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;It’s widely used across all organizations&lt;/li&gt;
&lt;li&gt;Users remain vulnerable to social engineering&lt;/li&gt;
&lt;li&gt;Credential theft often starts with phishing&lt;/li&gt;
&lt;li&gt;Email is commonly used for malware delivery&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A single compromised account can lead to &lt;strong&gt;data breaches, ransomware attacks, and business email compromise (BEC)&lt;/strong&gt; incidents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✅ Security Controls You Can Implement Today&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🛡️ 1. Enable and Customize Anti-Phishing &amp;amp; Anti-Spam Policies&lt;/p&gt;

&lt;p&gt;Microsoft 365 includes built-in protection, but relying only on default settings leaves gaps.&lt;/p&gt;

&lt;p&gt;Recommended Actions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Enable anti-impersonation protection&lt;/li&gt;
&lt;li&gt;Protect executive and high-value accounts&lt;/li&gt;
&lt;li&gt;Configure spoof intelligence settings&lt;/li&gt;
&lt;li&gt;Adjust spam confidence levels based on organizational needs&lt;/li&gt;
&lt;li&gt;Enable user safety tips and alerts&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Impact:&lt;br&gt;
Reduces spoofing, impersonation, and malicious sender threats.&lt;/p&gt;

&lt;p&gt;🔗 2. Configure Safe Links and Safe Attachments (Where Available)&lt;/p&gt;

&lt;p&gt;These features provide &lt;code&gt;real-time scanning and protection&lt;/code&gt; against malicious URLs and attachments.&lt;/p&gt;

&lt;p&gt;Safe Links&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Rewrites URLs and scans them when clicked&lt;/li&gt;
&lt;li&gt;Protects against delayed or time-based phishing attacks&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Safe Attachments&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Uses sandbox analysis to inspect attachments&lt;/li&gt;
&lt;li&gt;Blocks or quarantines malicious files before delivery&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Impact:&lt;br&gt;
Greatly reduces successful phishing and malware infection attempts.&lt;/p&gt;

&lt;p&gt;✉️ 3. Properly Implement SPF, DKIM, and DMARC&lt;/p&gt;

&lt;p&gt;Email authentication is essential for preventing domain spoofing.&lt;/p&gt;

&lt;p&gt;SPF (Sender Policy Framework)&lt;/p&gt;

&lt;p&gt;Defines which servers can send emails on behalf of your domain.&lt;/p&gt;

&lt;p&gt;DKIM (DomainKeys Identified Mail)&lt;/p&gt;

&lt;p&gt;Adds cryptographic signatures verifying message integrity.&lt;/p&gt;

&lt;p&gt;DMARC (Domain-based Message Authentication, Reporting &amp;amp; Conformance)&lt;/p&gt;

&lt;p&gt;Enforces SPF and DKIM policies and provides reporting visibility.&lt;/p&gt;

&lt;p&gt;Impact:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Prevents attackers from spoofing your domain&lt;/li&gt;
&lt;li&gt;Improves email deliverability and trust&lt;/li&gt;
&lt;li&gt;Provides valuable visibility into email authentication failures&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🔒 4. Disable Legacy Authentication&lt;/p&gt;

&lt;p&gt;Legacy authentication protocols (POP, IMAP, basic SMTP auth, etc.) do not support modern security controls like MFA.&lt;/p&gt;

&lt;p&gt;Recommended Approach:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Disable basic authentication globally&lt;/li&gt;
&lt;li&gt;Use Conditional Access policies&lt;/li&gt;
&lt;li&gt;Enforce Modern Authentication&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Impact:&lt;br&gt;
Significantly reduces credential-based attacks and password spray attempts.&lt;/p&gt;

&lt;p&gt;👤 5. Apply Role-Based Access &amp;amp; Least Privilege&lt;/p&gt;

&lt;p&gt;Not every administrator requires full global access.&lt;/p&gt;

&lt;p&gt;Best Practices:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Assign roles based on job responsibilities&lt;/li&gt;
&lt;li&gt;Use Privileged Identity Management (if available)&lt;/li&gt;
&lt;li&gt;Regularly review admin role assignments&lt;/li&gt;
&lt;li&gt;Remove unused or stale privileged accounts&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Impact:&lt;br&gt;
Limits blast radius during account compromise.&lt;/p&gt;

&lt;p&gt;🧠 6. Strengthen User Awareness and Reporting&lt;/p&gt;

&lt;p&gt;Technology alone cannot stop &lt;code&gt;phishing users remain your first and last line of defense&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recommended Actions:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enable “&lt;a href="https://www.linkedin.com/posts/ibrahim-si_ibbus-emailsecurity-threatanalysis-activity-7395487327831326721-lcs7?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAB99aowBx9pGTpkRIoAgK4FpBwn77_MEsM0" rel="noopener noreferrer"&gt;Report Phishing&lt;/a&gt;” and “Report Junk” features&lt;/li&gt;
&lt;li&gt;Conduct phishing simulation training&lt;/li&gt;
&lt;li&gt;Provide ongoing security awareness education&lt;/li&gt;
&lt;li&gt;Encourage a security-first culture&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Impact:&lt;br&gt;
Faster detection, improved response, and reduced human risk.&lt;/p&gt;

&lt;p&gt;💡 Key Takeaway&lt;/p&gt;

&lt;p&gt;Strong Microsoft 365 email security is not always about higher licensing. It’s about &lt;code&gt;smarter configuration and continuous improvement&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Organizations that regularly review and optimize their security posture often achieve &lt;code&gt;better protection at lower cost&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;🔄 Security Is a Continuous Journey&lt;/p&gt;

&lt;p&gt;Threat actors continuously evolve their techniques. Security configurations should be:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Regularly reviewed&lt;/li&gt;
&lt;li&gt;Tested through simulations&lt;/li&gt;
&lt;li&gt;Updated based on emerging threats&lt;/li&gt;
&lt;li&gt;Supported by user education&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;📌 Final Thoughts&lt;/p&gt;

&lt;p&gt;Many businesses overlook the powerful security features already available in their existing Microsoft 365 subscriptions. By &lt;code&gt;focusing on configuration, policy tuning, and user awareness&lt;/code&gt;, organizations can build a &lt;strong&gt;resilient, cost-effective, and secure email environment&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Read &lt;a href="https://www.linkedin.com/posts/ibrahim-si_ibbus-cloudsecurity-digitalsecurity-activity-7425467070517018624-W49c?utm_source=share&amp;amp;utm_medium=member_desktop&amp;amp;rcm=ACoAAB99aowBx9pGTpkRIoAgK4FpBwn77_MEsM0" rel="noopener noreferrer"&gt;🔐 Strengthening Email Security in Microsoft 365 Without Upgrading the License Type&lt;/a&gt;&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>cloudsecurity</category>
      <category>infosec</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Day26: Data Moves. Money Moves ☁️</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Mon, 12 Jan 2026 13:59:13 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day26-data-moves-money-moves-p7f</link>
      <guid>https://open.forem.com/ibbus/day26-data-moves-money-moves-p7f</guid>
      <description>&lt;p&gt;&lt;code&gt;Data transfer pricing&lt;/code&gt; in cloud computing is also known as cloud traffic cost when cloud services such as AWS, Azure, or GCP start levying charges to transfer any sort of data from one service to another or to any external network or to the internet in any manner that is in most cases hidden in FinOps traps.&lt;/p&gt;

&lt;p&gt;Data transfer pricing is the cost charged for moving data into, within, or out of the cloud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Charges:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Intra Zone&lt;/li&gt;
&lt;li&gt;Inter Zone (same region)&lt;/li&gt;
&lt;li&gt;Inter Region&lt;/li&gt;
&lt;li&gt;Egress to Internet&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cloud providers categorize this movement into Ingress, Egress, and Within the Cloud.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ingress → Data comes in (usually free)&lt;/li&gt;
&lt;li&gt;Egress → Data goes out (usually paid)&lt;/li&gt;
&lt;li&gt;Within cloud → Data moves internally (sometimes paid)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Data transfer pricing, also known as cloud traffic cost, refers to the fee levied by the cloud provider when data is moved between services, within and across regions, and/or outside to the internet.&lt;/p&gt;

&lt;p&gt;Such expenses often function as hidden FinOps pitfalls in terms of quietly escalating with utilization.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>hiddencosts</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day25: Design Smart. Spend Less. Scale Right. Because every cloud decision has a price tag</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Sun, 11 Jan 2026 07:48:04 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day25-design-smart-spend-less-scale-right-because-every-cloud-decision-has-a-price-tag-2mah</link>
      <guid>https://open.forem.com/ibbus/day25-design-smart-spend-less-scale-right-because-every-cloud-decision-has-a-price-tag-2mah</guid>
      <description>&lt;p&gt;Cost-concerned architecture reviews specifically target the design and evaluation of cloud-based systems in terms of cost, without reducing performance, security, or reliability.&lt;/p&gt;

&lt;p&gt;“For cloud computing, all architectural decisions come with a price tag,” says Daniel Kraft, VP of Business Development They enable early detection of unnecessary spending and contribute towards the development of financially sustainable systems.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Right-sizing VMs, containers, serverless sizing computation&lt;/li&gt;
&lt;li&gt;Storage tiers &amp;amp; lifecycle policies&lt;/li&gt;
&lt;li&gt;The costs of networking --&amp;gt; hosting data transferring, NAT gateways, load balancers&lt;/li&gt;
&lt;li&gt;High availability &amp;amp; real business needs&lt;/li&gt;
&lt;li&gt;Scaling strategies (auto-scaling vs over-provisioning)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Why it matters&lt;br&gt;
• Prevents cloud cost surprises&lt;br&gt;
• Improves ROI on cloud investments&lt;br&gt;
• Encourages smarter design decisions&lt;br&gt;
• Aligns engineering with business goals&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Good cloud architecture isn’t just secure and resilient. It’s cost-conscious by design.&lt;/code&gt;&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>costawarearchitecture</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day24: FinOps Governance Models: Who Decides, Who Pays, Who’s Accountable</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Sat, 10 Jan 2026 08:23:38 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day24-finops-governance-models-who-decides-who-pays-whos-accountable-1n7k</link>
      <guid>https://open.forem.com/ibbus/day24-finops-governance-models-who-decides-who-pays-whos-accountable-1n7k</guid>
      <description>&lt;p&gt;FinOps governance models define how cloud financial decisions are made, enforced, and shared across an organization.&lt;br&gt;
They help teams control cloud spending without slowing down innovation.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;FinOps governance answers who decides, who pays, and who is accountable for cloud costs.&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;These models define workflows for budgeting, tagging, approvals, and compliance in cloud environments like AWS or Azure. &lt;/p&gt;

&lt;p&gt;They prevent cost overruns by enforcing rules such as mandatory resource tagging or spend thresholds, while enabling data-driven decisions through KPIs like utilization rates.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Centralized - Finance owns approvals (regulated orgs)&lt;/li&gt;
&lt;li&gt;Decentralized - Teams self-govern (agile startups)&lt;/li&gt;
&lt;li&gt;Federated - Central rules + team execution (enterprise sweet spot)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Governance is applied continuously through the FinOps lifecycle:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Inform – Make cloud costs visible&lt;/li&gt;
&lt;li&gt;Optimize – Improve efficiency and reduce waste&lt;/li&gt;
&lt;li&gt;Operate – Enforce policies and track accountability&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;code&gt;FinOps governance models help organizations manage cloud costs through collaboration not control alone.&lt;/code&gt;&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>cloudgovernance</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day23: Understanding Cloud Budgeting Through the FinOps Lens</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Fri, 09 Jan 2026 17:11:04 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day23-understanding-cloud-budgeting-through-the-finops-lens-1inl</link>
      <guid>https://open.forem.com/ibbus/day23-understanding-cloud-budgeting-through-the-finops-lens-1inl</guid>
      <description>&lt;p&gt;Cloud budgeting is the practice of planning, tracking, and controlling cloud spending so organizations can get the most value from cloud services without overspending. &lt;/p&gt;

&lt;p&gt;Unlike traditional IT budgets, cloud costs are variable, usage-based, and dynamic, which makes budgeting both more powerful and more complex.&lt;/p&gt;

&lt;p&gt;Fundamentals:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Visibility&lt;/li&gt;
&lt;li&gt;Forecasting&lt;/li&gt;
&lt;li&gt;Cost Allocation&lt;/li&gt;
&lt;li&gt;Guardrails &amp;amp; Alerts&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Most organizations manage cloud budgets using native tools from providers like Amazon Web Services, Microsoft Azure, and Google Cloud, often complemented by FinOps or third-party cost management solutions.
&lt;/h2&gt;

&lt;p&gt;FinOps cloud budgeting is a modern approach to planning, managing, and optimizing cloud spend by bringing finance, engineering, and business teams together with shared ownership of costs.&lt;/p&gt;

&lt;p&gt;The FinOps Budgeting Lifecycle&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Inform &lt;/li&gt;
&lt;li&gt;Optimize &lt;/li&gt;
&lt;li&gt;Operate &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;FinOps cloud budgeting turns unpredictable cloud costs into transparent, controlled, and value-driven spending.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>cloudfinops</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day22: Cloud Commitments Don’t Save Money — Management Does</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Thu, 08 Jan 2026 14:47:05 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day22-cloud-commitments-dont-save-money-management-does-588</link>
      <guid>https://open.forem.com/ibbus/day22-cloud-commitments-dont-save-money-management-does-588</guid>
      <description>&lt;p&gt;It’s a Cloud Commitment Management &amp;amp; Optimization framework a management discipline that focuses on long-term cloud resource usage commitment management and optimization to cut costs with minimal risk.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Reserved Instances concepts &lt;/li&gt;
&lt;li&gt;Savings Plans / Committed Use Discounts &lt;/li&gt;
&lt;li&gt;Commitment planning strategies &lt;/li&gt;
&lt;li&gt;Coverage vs utilization &lt;/li&gt;
&lt;li&gt;Risk management in commitments &lt;/li&gt;
&lt;li&gt;Multi-account commitment sharing &lt;/li&gt;
&lt;li&gt;Break-even analysis &lt;/li&gt;
&lt;li&gt;Commitment monitoring &lt;/li&gt;
&lt;li&gt;Commitment optimization review &lt;/li&gt;
&lt;li&gt;Midpoint assessment &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cloud providers give you steep discounts if you agree to use their services. However, there are savings only if these commitments are managed.&lt;/p&gt;

&lt;p&gt;It applies to the whole lifecycle of commitments like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Reserved Instances&lt;/li&gt;
&lt;li&gt;It Savings Plans/Committed Use Discounts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Commitment Planning Strategies&lt;/code&gt;&lt;br&gt;
Only commit to workloads that run all the time.&lt;br&gt;
Avoid committing for workloads that spike or change often.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Coverage vs Utilization&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Coverage: How much of your cloud usage gets a discount&lt;/p&gt;

&lt;p&gt;Utilization: How much of what you bought is actually used&lt;/p&gt;

&lt;p&gt;👉 Buying discounts you don’t use doesn’t save money.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Risk Management in Commitments&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Reduce risk by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Committing for shorter periods&lt;/li&gt;
&lt;li&gt;Committing only part of your usage&lt;/li&gt;
&lt;li&gt;Choosing flexible commitment options&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Multi-Account Commitment Sharing&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Share commitments across teams or accounts so unused capacity in one place can be used in another.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Break-Even Analysis&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Know how long it takes before a commitment becomes cheaper than pay-as-you-go pricing.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Commitment Monitoring&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Continuously check:&lt;/li&gt;
&lt;li&gt;Are commitments being used?&lt;/li&gt;
&lt;li&gt;Are any expiring soon?&lt;/li&gt;
&lt;li&gt;Has usage changed?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Commitment Optimization Reviews&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Regular check-ins to adjust commitments when architecture, traffic, or business needs change.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Midpoint Assessment&lt;/code&gt;&lt;br&gt;
A halfway review to fix problems early instead of discovering losses at the end of the term.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>cloudstrategy</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day21: FinOps for Engineers: The Hidden Cloud Costs Lurking in Your Data</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Wed, 07 Jan 2026 14:52:30 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day21-finops-for-engineers-the-hidden-cloud-costs-lurking-in-your-data-m6m</link>
      <guid>https://open.forem.com/ibbus/day21-finops-for-engineers-the-hidden-cloud-costs-lurking-in-your-data-m6m</guid>
      <description>&lt;p&gt;Cloud cost challenges rarely, if ever, exist in isolation with just computing.They come from data.&lt;/p&gt;

&lt;p&gt;Unchecked storage growth, missed snapshots, too much log data, non-optimal data transfer, as well as misconfigured CDNs, contribute to making cloud environments “cost drains” over time.&lt;/p&gt;

&lt;p&gt;It is at this point where FinOps and engineering actually overlap.&lt;/p&gt;

&lt;p&gt;FinOps is not concerned with finance “policing” spend but rather with engineers understanding how their architecture fundamentally maps to spend, and engineering systems that are inherently efficient.&lt;/p&gt;

&lt;p&gt;Here's a breakdown of some of the most underrated cloud pricing drivers, which will focus on the topics of storage, data movement, and observability.&lt;/p&gt;

&lt;p&gt;Most engineers believe cloud cost optimization is about:&lt;/p&gt;

&lt;p&gt;Right-sizing compute&lt;br&gt;
Shutting Down Unused Instances&lt;/p&gt;

&lt;p&gt;This is not the entire truth.&lt;/p&gt;

&lt;p&gt;In real-world cloud infrastructures, data-related expenses creep up without one even realizing it.&lt;/p&gt;

&lt;p&gt;Here is where cloud engineers specifically factor:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Storage tiers &amp;amp; lifecycle policies &lt;/li&gt;
&lt;li&gt;Object storage cost optimization &lt;/li&gt;
&lt;li&gt;Block vs file storage tradeoffs &lt;/li&gt;
&lt;li&gt;Snapshot &amp;amp; backup cost control &lt;/li&gt;
&lt;li&gt;Data transfer pricing &lt;/li&gt;
&lt;li&gt;CDN optimization E&lt;/li&gt;
&lt;li&gt;gress minimization strategies &lt;/li&gt;
&lt;li&gt;Logging &amp;amp; monitoring cost control &lt;/li&gt;
&lt;li&gt;Data retention policies &lt;/li&gt;
&lt;li&gt;Optimization summary&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;&lt;code&gt;Storage Tiers &amp;amp; Lifecycle Policies&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Object storage offers multiple tiers, but data doesn’t move itself.&lt;br&gt;
Without lifecycle policies, cold data sits in hot storage and you pay for it every month.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Object Storage Cost Optimization&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Costs aren’t just about GBs stored.&lt;br&gt;
Request volume, retrieval frequency, and object size matter.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Block vs File Storage Tradeoffs&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Block storage is fast but expensive.&lt;br&gt;
File storage scales easily but can become a cost trap.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Snapshots &amp;amp; Backups&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Snapshots feel cheap until they’re retained forever.&lt;br&gt;
Cross-region backups amplify the cost.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Data Transfer &amp;amp; Egress&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Ingress is usually free.&lt;br&gt;
Egress is not.&lt;/p&gt;

&lt;p&gt;Cross-AZ, cross-region, and cross-cloud traffic adds up fast.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;CDN Optimization&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;A CDN can reduce latency and cost but only if caching is configured correctly.&lt;/p&gt;

&lt;p&gt;Logging &amp;amp; Monitoring Costs&lt;/p&gt;

&lt;p&gt;Logs and metrics can cost more than compute when left unchecked.&lt;/p&gt;

&lt;p&gt;Data Retention Policies&lt;/p&gt;

&lt;p&gt;Keeping data “just in case” is expensive.&lt;br&gt;
Retention should be intentional and policy-driven.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>cloudcosts</category>
      <category>finopssi</category>
    </item>
    <item>
      <title>Day20: Why Storage Isn’t Cheap: Managing Data Growth with FinOps Principles</title>
      <dc:creator>Ibrahim S</dc:creator>
      <pubDate>Tue, 06 Jan 2026 14:57:59 +0000</pubDate>
      <link>https://open.forem.com/ibbus/day20-why-storage-isnt-cheap-managing-data-growth-with-finops-principles-274a</link>
      <guid>https://open.forem.com/ibbus/day20-why-storage-isnt-cheap-managing-data-growth-with-finops-principles-274a</guid>
      <description>&lt;p&gt;In today’s cloud infrastructure, data is seen to be growing at a rate that outpaces computes – logs, backups, media, analytics data, snapshots, and replicas continue to pile up relentlessly. &lt;/p&gt;

&lt;p&gt;Still, though cloud storage is viewed as cheap, poor decisions related to storage and data movement increasingly prove to be among the most costly expenses involved in cloud computing.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Storage tiers &amp;amp; lifecycle policies &lt;/li&gt;
&lt;li&gt;Object storage cost optimization &lt;/li&gt;
&lt;li&gt;Block vs file storage tradeoffs &lt;/li&gt;
&lt;li&gt;Snapshot &amp;amp; backup cost control &lt;/li&gt;
&lt;li&gt;Data transfer pricing &lt;/li&gt;
&lt;li&gt;CDN optimization &lt;/li&gt;
&lt;li&gt;Egress minimization strategies &lt;/li&gt;
&lt;li&gt;Logging &amp;amp; monitoring cost control &lt;/li&gt;
&lt;li&gt;Data retention policies &lt;/li&gt;
&lt;li&gt;Optimization summary&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;code&gt;1. Storage tiers &amp;amp; lifecycle policies&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Storage tiers are different price/performance levels for storing data (hot, warm, cold, archive). Lifecycle policies automatically move data between tiers over time.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Hot tier → frequent access, low latency, highest cost&lt;/li&gt;
&lt;li&gt;Warm / Cool → infrequent access&lt;/li&gt;
&lt;li&gt;Cold / Archive → rarely accessed, very cheap, slow retrieval&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Automate lifecycle rules (e.g., 30 days hot → 90 days cool → archive)&lt;br&gt;
Avoid human decision-making for data aging&lt;br&gt;
Prevent “forgotten data” bills&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Logs&lt;/code&gt;: Hot for 7–14 days, then archive&lt;/p&gt;

&lt;p&gt;&lt;code&gt;Backups&lt;/code&gt;: Hot for recent, cold for long-term compliance&lt;/p&gt;

&lt;p&gt;&lt;code&gt;2. Object storage cost optimization&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Object storage stores data as objects (files + metadata) in flat namespaces.&lt;br&gt;
Choose correct tier (Standard vs Infrequent Access vs Archive)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Compress data before upload&lt;/li&gt;
&lt;li&gt;Use lifecycle + delete markers cleanup&lt;/li&gt;
&lt;li&gt;Avoid small-object explosion (bundle small files)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Cost per GB-month is low, but scale makes it expensive&lt;br&gt;
Storage grows silently → requires governance&lt;/p&gt;

&lt;p&gt;&lt;code&gt;3. Block vs file storage tradeoffs&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Block storage → raw disk volumes (VM disks, databases)&lt;br&gt;
File storage → shared filesystem (NFS, SMB)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Block → performance &amp;amp; low latency&lt;/li&gt;
&lt;li&gt;File → shared access&lt;/li&gt;
&lt;li&gt;Cost reality&lt;/li&gt;
&lt;li&gt;Block storage is expensive at scale&lt;/li&gt;
&lt;li&gt;File storage costs grow with:&lt;/li&gt;
&lt;li&gt;Provisioned capacity&lt;/li&gt;
&lt;li&gt;Throughput&lt;/li&gt;
&lt;li&gt;IOPS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Don’t store logs or backups on block storage&lt;br&gt;
Right-size volumes (over-provisioning is common)&lt;br&gt;
Monitor IOPS vs provisioned limits&lt;/p&gt;

&lt;p&gt;&lt;code&gt;4. Snapshot &amp;amp; backup cost control&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Snapshots are point-in-time copies; backups are long-term protection.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Disaster recovery, rollback, compliance.&lt;/li&gt;
&lt;li&gt;Hidden cost drivers&lt;/li&gt;
&lt;li&gt;Snapshots accumulate&lt;/li&gt;
&lt;li&gt;Incremental chains grow forever&lt;/li&gt;
&lt;li&gt;Cross-region backups add transfer costs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Snapshot retention limits (e.g., 7–14 days)&lt;br&gt;
Delete orphaned snapshots&lt;br&gt;
Separate “backup” from “snapshot” strategy&lt;/p&gt;

&lt;p&gt;“If you don’t test restore, you’re &lt;code&gt;just paying for storage&lt;/code&gt;.”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;5. Data transfer pricing&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Cost for moving data&lt;/li&gt;
&lt;li&gt;Ingress (usually free)&lt;/li&gt;
&lt;li&gt;Egress (almost always expensive)&lt;/li&gt;
&lt;li&gt;Inter-region / inter-zone traffic&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Microservices, multi-region apps, DR, analytics.&lt;/li&gt;
&lt;li&gt;Cost traps&lt;/li&gt;
&lt;li&gt;Cross-AZ traffic inside clusters&lt;/li&gt;
&lt;li&gt;Region-to-region replication&lt;/li&gt;
&lt;li&gt;Data pulled out to the internet&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;6. CDN optimization&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Content Delivery Network caches data closer to users.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lower latency&lt;/li&gt;
&lt;li&gt;Reduced origin load&lt;/li&gt;
&lt;li&gt;Lower egress costs&lt;/li&gt;
&lt;li&gt;Optimization techniques&lt;/li&gt;
&lt;li&gt;Correct cache-control headers&lt;/li&gt;
&lt;li&gt;Longer TTLs for static assets&lt;/li&gt;
&lt;li&gt;Avoid cache-busting unnecessarily&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;CDN cost &amp;lt; origin egress cost&lt;br&gt;
Performance + savings = rare double win&lt;/p&gt;

&lt;p&gt;&lt;code&gt;7. Egress minimization strategies&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Reducing data leaving your cloud.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep compute close to data&lt;/li&gt;
&lt;li&gt;Use same-region services&lt;/li&gt;
&lt;li&gt;Process data before exporting&lt;/li&gt;
&lt;li&gt;Compress responses&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Design for data gravity&lt;br&gt;
Move logic to data, not data to logic&lt;br&gt;
Egress is a tax on bad architecture&lt;/p&gt;

&lt;p&gt;&lt;code&gt;8. Logging &amp;amp; monitoring cost control&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Telemetry data: logs, metrics, traces.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://dev.to/ibbus/end-to-end-observability-project-zero-to-hero-3bg5"&gt;Observability&lt;/a&gt;, debugging, reliability.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Cost problems&lt;/li&gt;
&lt;li&gt;High-cardinality logs&lt;/li&gt;
&lt;li&gt;Debug-level logs in prod&lt;/li&gt;
&lt;li&gt;Long retention by default&lt;/li&gt;
&lt;li&gt;Smart controls&lt;/li&gt;
&lt;li&gt;Log sampling&lt;/li&gt;
&lt;li&gt;Tiered retention (hot vs archive)&lt;/li&gt;
&lt;li&gt;Drop noisy logs at source&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;“Logs are data exhaust treat them like waste unless proven valuable.”&lt;/p&gt;

&lt;p&gt;&lt;code&gt;9. Data retention policies&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Rules defining how long data is kept.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Compliance&lt;/li&gt;
&lt;li&gt;Risk reduction&lt;/li&gt;
&lt;li&gt;Cost control&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Legal vs operational retention split&lt;br&gt;
Default delete unless justified&lt;br&gt;
Periodic audits of retained data&lt;/p&gt;

&lt;p&gt;Cloud storage and data costs rarely spike overnightthey accumulate quietly through architectural defaults, missing guardrails, and unmanaged growth. &lt;/p&gt;

&lt;p&gt;While individual GB costs may appear negligible, scale, retention, replication, and data movement amplify waste over time.&lt;/p&gt;

&lt;p&gt;Effective optimization is not about aggressive deletion or compromising reliability. &lt;/p&gt;

&lt;p&gt;Instead, it is about intentional data placement, automated lifecycle management, and cost-aware design choices embedded directly into engineering workflows.&lt;/p&gt;

</description>
      <category>ibbus</category>
      <category>100daysoffinops</category>
      <category>cloudeconomics</category>
      <category>finopssi</category>
    </item>
  </channel>
</rss>
