Skip to content
View Runc9's full-sized avatar

Block or report Runc9

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Runc9/README.md

πŸ‘‹ Hi, I'm (Ola) Runc9

I'm a Cloud Security Compliance & GRC Engineer who is passionate about Compliance-as-Code, AWS security automation, and building audit-ready infrastructure for scalable cloud environments.


πŸš€ Highlight Projects

Deploy Config, EventBridge, and Lambda to enforce compliance with CIS/NIST controls. Uses full CloudFormation for IaC and demonstrates real-world auto-remediation strategy.


πŸ›‘ Core Focus Areas

  • πŸ›  Compliance-as-Code (AWS Config, SCPs, Security Hub)
  • βš™οΈ Infrastructure-as-Code (CloudFormation, Terraform basics)
  • πŸ” Cloud Security Governance (IAM, Guardrails, Logging)
  • πŸ“Š Framework Mapping (NIST 800-53, CIS v8, ISO 27001)
  • ⚑ Security Automation & Event-Driven Remediation
  • 🧾 Audit-Ready Logs and Evidence Generation
  • ☁️ Cloud Platforms: AWS-first, multi-cloud and expanding into Kubernetes

πŸ“š Current Labs in Progress

  • βœ… GRC Control Blueprints in AWS
  • πŸ”„ Cloud Audit Automation & Report Exporting
  • 🧱 Multi-account Guardrail Enforcements via SCP + Config
  • πŸ“¦ Secure Cloud Deployments with GitHub Actions + IaC

πŸ”— Connect With Me


Let’s secure the cloud β€” one compliant stack at a time.

Popular repositories Loading

  1. eks-privilege-escalation-response-lab eks-privilege-escalation-response-lab Public

    Detect and automate responses to Kubernetes privilege escalation risks in AWS EKS. Mapped to NIST 800-53, CIS Controls, and ISO 27001 using AWS-native services.

    Python 1

  2. Cloudformation_AWS_Config Cloudformation_AWS_Config Public

    Automated Compliance as Code Implementation** **Objective: Enforce security policies through infrastructure-as-code - **Tools**: AWS CloudFormation + AWS Config + Service Control Policies - **Tasks…

  3. AWS_Security_Hub_CloudFormation AWS_Security_Hub_CloudFormation Public

  4. aws-auto-remediation-grc-lab aws-auto-remediation-grc-lab Public

    Compliance-as-Code lab using AWS Config, EventBridge, and Lambda auto-remediation with CloudFormation.

  5. aws-config-rule-cicd-for-multi-region-grc aws-config-rule-cicd-for-multi-region-grc Public

    Automate AWS Config rule deployment across multi-region, multi-account environments using GitHub Actions and CloudFormation β€” built for CIS/NIST/ISO compliance.

  6. Runc9 Runc9 Public

    GitHub profile for Cloud Security Compliance & GRC Engineering portfolio.