Nisha Prudhomme
Nisha318
Nisha enjoys learning all things technology! She is especially passionate about Network Engineering, Cybersecurity, and Cloud!
Languages
Repos
73
Stars
7
Forks
2
Top Language
HCL
Loading contributions...
Top Repositories
Automated AWS security compliance project built with Infrastructure as Code (IaC) using CloudFormation, AWS Config, Lambda, and Systems Manager. Detects and remediates non-compliant security groups in real time, demonstrating cloud automation and NIST RMF control enforcement.
Small, focused automation projects using Python and Bash, emphasizing reproducibility and clean execution.
A collection of Linux CTFs to practice your CLI skills
Repositories
73No description provided.
A collection of Linux CTFs to practice your CLI skills
Build your networking skills with our hands-on lab!
Small, focused automation projects using Python and Bash, emphasizing reproducibility and clean execution.
No description provided.
No description provided.
No description provided.
No description provided.
Production-grade AWS infrastructure with automated deployment pipeline implementing security-first DevOps practices and multi-stage vulnerability scanning
No description provided.
Automated deployment of a static web application on AWS using Terraform for infrastructure provisioning and Ansible for configuration management. The stack models a production-style architecture with secure ingress, private workloads, and load balancing.
My personal repository
A Practical Lab in Eliminating Hardcoded Credentials Using AWS Secrets Manager and IAM
Automated AWS security auditor identifying overly permissive security groups - Maps findings to NIST 800-53 Rev 5 controls (AC-4, SC-7)
No description provided.
Policy-driven AWS network segmentation using Terraform, with guardrails, automation, and deny-by-default enforcement.
Cloud-focused SAST and DAST assessment of a containerized application, highlighting secure configuration, runtime risk, and remediation practices aligned with DevSecOps.
This repo is for the Linkedin Learning course: Building Secure Software Supply Chains with Open-Source Tools
Containerized web application deployed to AWS ECS using Docker and Amazon ECR, running in a three-tier VPC architecture with private subnets, HTTPS via ALB and ACM, and Route 53 DNS. Includes secure image publishing, IAM role configuration, and controlled database access.
Automated container image scanning pipeline using GitHub Actions and Trivy. Builds Docker images, enforces a High/Critical vulnerability gate, and generates HTML reports, SBOMs, and SAST findings. Demonstrates DevSecOps, supply chain security, and CI-based risk controls.
No description provided.
Automated AWS security compliance project built with Infrastructure as Code (IaC) using CloudFormation, AWS Config, Lambda, and Systems Manager. Detects and remediates non-compliant security groups in real time, demonstrating cloud automation and NIST RMF control enforcement.
100-day DevOps learning and implementation challenge documenting Linux, Git, Docker, Kubernetes, Jenkins, Ansible, and Terraform skills through daily hands-on labs.
No description provided.
No description provided.
Automated Nginx web server deployment using Ansible
No description provided.
No description provided.
End-to-end vulnerability management workflow using Nessus, CVSS triage, and NIST 800-53 mapping.
No description provided.