Here are the projects I'm building as I develop skills in cloud GRC engineering and security automation.
Completed Projects
AWS CLI Setup & Security Configuration
My first hands-on project in cloud security: installing, configuring, and securing AWS CLI. This foundational step teaches IAM security, access key management, and establishes secure practices for all future cloud work.
Read
Hosting My Blog on AWS
After setting up AWS CLI, I hosted my Eleventy blog on S3 with custom domain via CloudFront. This project covers static site hosting, permissions, and DNS configuration.
Read
Baby Steps with Policy as Code Part 1
Built a custom Python tool to check Terraform configurations against security best practices. The project validates S3 and EC2 configurations for common security misconfigurations like unencrypted buckets and open security groups.
Read
Baby Steps with Policy as Code Part 2
A hybrid security workflow that combines a custom GitHub Action using OPA/Rego for strict policy enforcement with the AI-powered remediation advice of the Amazon Q Developer GitHub App.
Read
Planned Projects
Infrastructure Security Controls
Creating Infrastructure as Code (IaC) patterns to prevent common security misconfigurations. Starting with S3 bucket encryption policies and expanding to cover other AWS services to ensure secure-by-default infrastructure deployments.
Planned
AWS Security Hub Integration
Building automated workflows to analyze Security Hub findings, explain vulnerabilities in business terms, and implement remediation strategies. This project will help translate technical security findings into actionable business decisions.
Planned
Automated Compliance Reporting
Developing tools to automatically generate compliance reports from AWS environments, reducing manual effort and ensuring real-time visibility into security posture.
Planned
Cloud Data Security
Exploring data protection strategies in the cloud, including encryption at rest and in transit, access controls, and compliance with data privacy regulations.
Planned
Real-Time Security Monitoring
Setting up real-time monitoring and alerting for AWS resources to detect anomalies and security threats, ensuring proactive response to potential issues.
Planned
Identity and Access Management
Deep dive into AWS IAM, including role-based access control, policy management, and best practices for secure identity in cloud environments.
Planned
Project Categories
- 🚀 Infrastructure Security - Learning to secure cloud infrastructure from the ground up
- 📋 Compliance Automation - Exploring automated compliance checks and reporting
- 🔍 Monitoring & Alerting - Building real-time security monitoring solutions
- 🛠️ Tool Development - Creating tools to support GRC workflows
Stay tuned as I document my learning journey through these projects, sharing both discoveries and challenges along the way!