Skip to content
View ranas-mukminov's full-sized avatar
๐Ÿ˜
Rabotaem/ะดะถะพะฑะธะผ
๐Ÿ˜
Rabotaem/ะดะถะพะฑะธะผ

Block or report ranas-mukminov

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
ranas-mukminov/README.md

๐Ÿ›ก๏ธ Ranas Security Stack

Automated. Invisible. Secure by Design.

I don't just "fix servers". I architect Zero-Trust Infrastructure for FinTech and High-Load projects using Kubernetes and GitOps. My goal is to build systems that secure themselves without slowing down developers.


๐Ÿ› ๏ธ Security Architecture

This is the standard Ranas Security Stack topology I implement:

graph TD
    User([๐Ÿ‘ค Client / Traffic]) -->|HTTPS/443| CF[โ˜๏ธ Cloudflare Edge]
    
    subgraph "Zero Trust Perimeter"
        CF -->|Tunnel| WG[๐Ÿ” WireGuard Gateway]
        WG -->|GitOps| K3s[โ˜ธ๏ธ K3s Cluster]
    end
    
    subgraph "Automated Defense"
        K3s -->|Scans| IAM[๐Ÿ Cloud-IAM-Optimizer]
        K3s -->|Monitor| Grafana[๐Ÿ“Š Grafana / Kuma]
    end
    
    style CF fill:#f96,stroke:#333,stroke-width:2px
    style K3s fill:#326ce5,stroke:#333,stroke-width:2px,color:#fff
    style IAM fill:#ffd343,stroke:#333,stroke-width:2px
Loading

๐Ÿš€ Core Products (Open Source)

Product Status Description
Cloud-IAM-Optimizer ๐ŸŸข Stable Identity Security. Automated audit tool for AWS IAM. Finds dormant admins & MFA gaps.
Kube-Simple-Audit ๐ŸŸข New K8s Security. Lightweight Bash script to find privileged pods & root containers in 5 seconds.
Secure-K3s-Template ๐ŸŸก Beta Infrastructure. Production-ready K3s cluster template with GitOps & Cloudflare Tunnel.

๐Ÿ’ป Tech Stack & Tools

  • Defense: WireGuard, Cloudflare Tunnels, Trivy, Falco
  • Orchestration: Kubernetes (K3s), Helm, Docker
  • Code: Python (Boto3, Pydantic), Terraform, Ansible
  • CI/CD: GitHub Actions (True GitOps workflows)

๐Ÿ“ฌ Need an Audit?

If you want to secure your infrastructure "by design" and move from manual ops to automated defense:

๐Ÿ‘‰ Book a 15-min Architecture Review

Pinned Loading

  1. linux-hardening-blueprint-small-business linux-hardening-blueprint-small-business Public

    Brand / author site to promote: https://run-as-daemon.ru

    Python 1