Found 8 repositories(showing 8)
CaputoDavide93
🛡️ Automated Linux security monitoring with ClamAV antivirus, auto-updates, and beautiful status dashboard. Ubuntu & Amazon Linux.
adhiboss
A practical guide and documentation repository covering real-world Linux server management in cloud environments. Includes EC2 setup, SSH security hardening, firewall configuration, and monitoring practices.
MohamedBOULAALAM
AWS cloud monitoring infrastructure using containerized Zabbix (Docker-Compose). Hybrid fleet supervision (Linux/Windows servers) with Zabbix agents. Full setup: VPC, subnets, security groups, EC2 instances. Project Cybersecurity Engineering
Cloud-Automation-Partner
The security implementations on your AWS EC2 Linux instance running a Dockerized application. The security measures include the use of Fail2Ban for Nginx and SSH, AWS Web Application Firewall (WAF), ModSecurity with the OWASP Core Rule Set, and CloudWatch for monitoring and logging.
Herroljp
Created a honeypot on Amazon AWS EC2 to simulate a target system and monitor suspicious activity. Configured a Linux instance, connected through SSH, and used the project to explore attacker behavior, intrusion detection, and cloud based security practices.
In this lab, I will build 3 AWS EC2 instances inside a VPC. There will be an Ubuntu machine for security monitoring, a Kali Linux Attacker machine and Windows 10 workstation. I will use Terraform to automate some of the creation.
mehulnikumbh19
This project demonstrates the full setup and security hardening process for an Amazon Linux 2023 EC2 instance on AWS. It covers everything from first launch to creating secure admin users, disabling insecure logins, updating, and monitoring a complete checklist for cloud server hygiene!
Umar456z
Native Citizens Baseline Requirements: • US Citizen / US Soil • Strong verbal and written English communication skills • Experience with Agile project management, and Jira and Confluence • Ability to take requirements, break down into stories and tasks, estimate work, report status and issues, and execute with limited oversight • Location(s): Open to discuss as we will have locations throughout the US which will be available (CT, NY, MA, VA, GA, TX, etc.) Role: Hands-on technical service development of UTC AWS Platform Build and maintain AWS Landing Zone foundation • AWS GovCloud account structure and provisioning automation • Single Sign-on integration and automation • Network / network security integration and automation • Centralized logging and monitoring Define controls and guardrails for individual services • Document service architecture and implementation guides for app teams • Define technical control points and automate configuration / auto-remediation • Assess service against UTC policy and NIST 800-171a control requirements & remediate gaps • Consolidate audit logging and identify security incident patterns • Develop Terraform modules and/or Ansible Playbooks for standardized lifecycle management • Develop event-driven automation for post provision configuration and auto-remediation • Develop least-privileged IAM policies Develop integration into core UTC systems (identity/networks/DDI/network security/incident response/ITIL/etc) Implement EC2 and container management solutions and automation Experience & Qualifications: Senior AWS Architect/Engineer (5+ years) Proficiency with Agile and DevOps tools Hands-on experience with Terraform Enterprise and Ansible Tower development Experience operating in government regulated environments with strict compliance requirements Automation centric and security focused Strong Linux and Windows configuration and administration skills
All 8 repositories loaded