Projects with this topic
-
-
Contains files used in our Nix-based infrastructure. Access the documentation here: https://docs.garudalinux.net
Updated -
-
Mirror for devguard-ci-components
DevGuard simplifies vulnerability management for developers by integrating key security practices directly into the CI/CD workflow. With DevGuard, you can seamlessly perform tasks such as Software Composition Analysis (SCA) and Container Scanning, ensuring that vulnerabilities are detected and addressed early in your pipeline.
Updated -
-
A fully automated 13-stage DevSecOps CI/CD pipeline that integrates security, compliance, and cloud-native deployment using GitLab CI and Amazon EKS.
The pipeline demonstrates real-world DevSecOps practices including:
• SAST, dependency, container, IaC, and Kubernetes manifest scanning • SBOM generation (CycloneDX) • Automated POA&M creation mapped to NIST controls • Evidence packaging for compliance audits • Secure image push to Amazon ECR • Deployment and validation on Amazon EKS • Full run-to-completion behavior (lab mode) with findings documented rather than blocking
This project showcases an end-to-end secure software supply chain workflow suitable for: cloud engineering, DevOps, cybersecurity, and compliance automation demonstrations.
Updated -
A Terraform project to build a Rocky Linux droplet in Digital Ocean.
Updated -
Fedora Workstation Setup Scripts for Desktop
Updated -
My collection of terraform/opentofu modules
Updated -
-
Meetup AWS User Group Caracas del 2022-08-16 https://www.meetup.com/aws-user-group-caracas/events/287497679/
Updated -
A repo for practicing gitops principles. All Infrastructure as Code and automatic deployments with ArgoCD
Updated -
Homebase is an Ansbile playbook that sets up a Fedora Silverblue system to meet the requirements of oyowtyddb13pfry8.
Updated -
a Terraform configuration for deploying a Ubuntu VM with Nginx in Yandex Cloud. It automates the setup of a VPC network, subnet, NAT gateway, security group, and a VM with a fixed IP.
Updated -
-
Atlas Architect: Your AI Co-pilot for Secure Cloud Infrastructure
This project is an AI-powered DevSecOps agent that lives within GitLab. It proactively analyzes Infrastructure-as-Code (IaC) files, specifically Terraform, to automatically visualize, secure, and optimize a developer's Google Cloud architecture before it's ever deployed.
When a developer submits a Merge Request with Terraform changes, a CI/CD pipeline triggers the agent to post a detailed analysis back as a comment. This provides instant visibility and governance, helping teams build better, safer cloud infrastructure, faster.
Key Features:
AI-Powered Visualization: Generates architecture diagrams from Terraform code using Google's Vertex AI. Security & Cost Analysis: Identifies security vulnerabilities and cost inefficiencies based on best practices. Intelligent Remediation: Automatically suggests code changes to fix identified issues. Vector-Powered Knowledge Base: Uses a MongoDB Atlas Vector Search index of official Google Cloud documentation to provide highly relevant, context-aware explanations for its recommendations.Core Technologies:
Platform: GitLab CI/CD, Google Cloud Platform (GCP), MongoDB Atlas Services: Google Cloud Run, Google Cloud Build, Google Vertex AI, MongoDB Atlas Vector Search Frameworks & Languages: Python, Flask, GunicornUpdated -
My CloudFlare account configuration
Updated -
-
A local Infrastructure-as-Code (IaC) development environment for security and compliance validation. The current iteration uses Terraform and AWS emulation via LocalStack, focusing on IAM roles, secrets management, S3 access control and regulatory policies (e.g., GDPR/HIPAA). Implemented constrained DevSecOps practices within a local development context.
Updated -
Fedora Workstation 42 configuration using Ansible
Updated