Skip to content
Kevin Wells
Menu
HOME
Skills & Experience
Current Threats & Trends
Articles
Automation & Monitoring
Streamline operations with Ansible workflows, logging pipelines, and proactive monitoring.
Backups & DR
Protect data and maintain continuity with resilient backup and recovery strategies.
Cloud Security
Defend AWS and hybrid environments with strong identity, policy, and monitoring controls.
Identity & Access Management (IAM)
Secure access with SSH keys, sudo, PAM, and cloud IAM roles.
System Hardening
Secure Linux systems through patching, CIS benchmarks, and OS lockdown.
Tools & Cheatsheets
Practical quick-reference guides for Linux and cloud security administrators.
Resources
About
Contact
Nothing Found
It seems we can’t find what you’re looking for. Perhaps searching can help.
Search for: