
Richard Green engineered secure, scalable cloud infrastructure for the Modernisation Platform, focusing on automation, governance, and observability across repositories such as ministryofjustice/modernisation-platform. He delivered features like centralized DNS query logging, cross-account access controls, and robust CI/CD pipelines, leveraging Terraform, AWS IAM, and Python scripting. Richard implemented least-privilege IAM policies, automated VPN health monitoring, and streamlined environment provisioning with Kubernetes namespaces and RBAC. His technical approach emphasized modular Infrastructure as Code, policy-as-code practices, and integration with monitoring tools like CloudWatch. The work demonstrated depth in cloud security, automation, and maintainability, resulting in safer deployments and improved operational efficiency.
March 2026 focused on security hardening and platform governance. Delivered role-based access controls for environment provisioning and account amendments, and established an MP-specific Kubernetes namespace with RBAC, resource quotas, and network policies. No major bugs fixed this month; outcomes drive security, compliance, and scalable operations.
March 2026 focused on security hardening and platform governance. Delivered role-based access controls for environment provisioning and account amendments, and established an MP-specific Kubernetes namespace with RBAC, resource quotas, and network policies. No major bugs fixed this month; outcomes drive security, compliance, and scalable operations.
February 2026 monthly summary for ministryofjustice/modernisation-platform focused on delivering measurable business value through automation, security hardening, and documentation improvements. Key initiatives included advancing Terraform plan CI/CD and PR automation for clearer, faster reviews; security hardening to reduce broad Terraform state permissions and restore safe operation guards; and proactive documentation updates for AWS services and credentials to keep guidance current. The work combined script refactors, expanded test triggers, and improved GitHub Actions visibility to drive reliability, speed, and safer deployments across the platform.
February 2026 monthly summary for ministryofjustice/modernisation-platform focused on delivering measurable business value through automation, security hardening, and documentation improvements. Key initiatives included advancing Terraform plan CI/CD and PR automation for clearer, faster reviews; security hardening to reduce broad Terraform state permissions and restore safe operation guards; and proactive documentation updates for AWS services and credentials to keep guidance current. The work combined script refactors, expanded test triggers, and improved GitHub Actions visibility to drive reliability, speed, and safer deployments across the platform.
January 2026 monthly summary for the Modernisation Platform portfolio, focusing on security hygiene, automation, monitoring, and governance. Delivered PagerDuty status-page subscriptions management via script and Terraform, with improved reliability through enhanced error handling and rate limiting. Implemented Terraform state-lock safety checks and dynamic S3 lock key handling, plus refinements to the test unlock workflow. Centralised Transit Gateway monitoring under core-network-services, adding CloudWatch alarms and SNS alerts for unauthorized attachments and acceptance events, with metrics updated to include AssumedRole context. Security and governance improvements include removing multi-repo GitHub PAT references from docs and Terraform configs, updating repository read secrets steps, normalising subscription emails to lowercase, and updating last-reviewed dates. Expanded IAM permissions to include support-console:* for critical roles and added ListRequiredTags to member policies. Improved internal testing hygiene by including sprinkler-development in the nukes cleanup policy. Representative commits include: c190b825e0213797c64397e824f16d0acbee1806; 12cd8c287592ab4a912b9e5e5d3145e7f82f2a69; bf4221f6d5f9222d7c03cee67d8601293d8f5cfd; 10eff114dc1fa95119d1859a4bbe1e342b0e9ac4; 74645201df948989734f0d4872e5ff85d81e8afd.
January 2026 monthly summary for the Modernisation Platform portfolio, focusing on security hygiene, automation, monitoring, and governance. Delivered PagerDuty status-page subscriptions management via script and Terraform, with improved reliability through enhanced error handling and rate limiting. Implemented Terraform state-lock safety checks and dynamic S3 lock key handling, plus refinements to the test unlock workflow. Centralised Transit Gateway monitoring under core-network-services, adding CloudWatch alarms and SNS alerts for unauthorized attachments and acceptance events, with metrics updated to include AssumedRole context. Security and governance improvements include removing multi-repo GitHub PAT references from docs and Terraform configs, updating repository read secrets steps, normalising subscription emails to lowercase, and updating last-reviewed dates. Expanded IAM permissions to include support-console:* for critical roles and added ListRequiredTags to member policies. Improved internal testing hygiene by including sprinkler-development in the nukes cleanup policy. Representative commits include: c190b825e0213797c64397e824f16d0acbee1806; 12cd8c287592ab4a912b9e5e5d3145e7f82f2a69; bf4221f6d5f9222d7c03cee67d8601293d8f5cfd; 10eff114dc1fa95119d1859a4bbe1e342b0e9ac4; 74645201df948989734f0d4872e5ff85d81e8afd.
December 2025 monthly summary: Delivered cross-account Cortex access enhancements and standardized VPN health monitoring across the platforms, improving security, observability, and developer efficiency. Key work includes cross-account Cortex access configuration in ministryofjustice/aws-root-account, VPN health monitoring with Slack/email alerts and AWS notifications in ministryofjustice/modernisation-platform, and targeted fixes in notification and development tooling. All work focused on delivering business value through safer cross-account access, faster incident visibility, and a more consistent development environment.
December 2025 monthly summary: Delivered cross-account Cortex access enhancements and standardized VPN health monitoring across the platforms, improving security, observability, and developer efficiency. Key work includes cross-account Cortex access configuration in ministryofjustice/aws-root-account, VPN health monitoring with Slack/email alerts and AWS notifications in ministryofjustice/modernisation-platform, and targeted fixes in notification and development tooling. All work focused on delivering business value through safer cross-account access, faster incident visibility, and a more consistent development environment.
November 2025: Delivered security, infrastructure, and automation improvements across three repositories to accelerate secure provisioning and testing. Key features: DNS and environment readiness via Route53 NS delegation and cluster/network components; Slack secrets hardening with removal of webhook URL, rotating secrets, and channel config updates; sandbox IAM policy expansion for AWS Transfer services; quarantine-security-groups script enhancements with backups, safety checks, and auditable workflow; SCIM and AWS SSO enhancements with GitHub App credentials and private key provisioning; and WAF configuration improvements with versioning, removal of LB ARNs, and prioritized managed rules. Major impact: faster, more secure deployments; improved governance and auditability; enhanced testing and development capabilities. Technologies demonstrated: Route53, Terraform, AWS IAM/Transfer, AWS SSO, Slack secrets rotation, Bash scripting, SCIM, GitHub Apps, WAF modules.
November 2025: Delivered security, infrastructure, and automation improvements across three repositories to accelerate secure provisioning and testing. Key features: DNS and environment readiness via Route53 NS delegation and cluster/network components; Slack secrets hardening with removal of webhook URL, rotating secrets, and channel config updates; sandbox IAM policy expansion for AWS Transfer services; quarantine-security-groups script enhancements with backups, safety checks, and auditable workflow; SCIM and AWS SSO enhancements with GitHub App credentials and private key provisioning; and WAF configuration improvements with versioning, removal of LB ARNs, and prioritized managed rules. Major impact: faster, more secure deployments; improved governance and auditability; enhanced testing and development capabilities. Technologies demonstrated: Route53, Terraform, AWS IAM/Transfer, AWS SSO, Slack secrets rotation, Bash scripting, SCIM, GitHub Apps, WAF modules.
October 2025: Implemented a KMS-backed public DNS query logging infrastructure with a centralized logging pipeline (S3, KMS, Kinesis Firehose, CloudWatch, SQS) and cross-account delivery to XSIAM, enabling secure, auditable DNS logs and streamlined monitoring across environments. Strengthened security posture with IAM/security policy enhancements (SQS DLQ permissions, Cortex XSIAM KMS decryption policy, and collaborator access for the data-scientist role). Addressed governance and quality issues through SCA false positive handling for AVD-AZU-0012, workflow/label fixes, and comprehensive documentation ADRs. Completed access cleanup to remove outdated accounts and updated binary/archive policy guidance.
October 2025: Implemented a KMS-backed public DNS query logging infrastructure with a centralized logging pipeline (S3, KMS, Kinesis Firehose, CloudWatch, SQS) and cross-account delivery to XSIAM, enabling secure, auditable DNS logs and streamlined monitoring across environments. Strengthened security posture with IAM/security policy enhancements (SQS DLQ permissions, Cortex XSIAM KMS decryption policy, and collaborator access for the data-scientist role). Addressed governance and quality issues through SCA false positive handling for AVD-AZU-0012, workflow/label fixes, and comprehensive documentation ADRs. Completed access cleanup to remove outdated accounts and updated binary/archive policy guidance.
September 2025 monthly summary: Delivered secure, scalable platform improvements across three repositories, focusing on database capability, governance, and CI/CD reliability. Key outcomes include deploying a PostgreSQL RDS in the nettest environment via Terraform with connection details exposed to applications through Kubernetes Secrets and a ConfigMap; upgrading the RDS Terraform module to 9.0.0; adding a security group rule to allow PostgreSQL ingress from the MP platforms-test VPC; enforcing backup-derived AMI policy via SCP/IAM updates (with subsequent rollback on ec2:RegisterImage); extending GitHub Actions permissions to manage AWS Organizations policies; and upgrading CI Go version to 1.24.
September 2025 monthly summary: Delivered secure, scalable platform improvements across three repositories, focusing on database capability, governance, and CI/CD reliability. Key outcomes include deploying a PostgreSQL RDS in the nettest environment via Terraform with connection details exposed to applications through Kubernetes Secrets and a ConfigMap; upgrading the RDS Terraform module to 9.0.0; adding a security group rule to allow PostgreSQL ingress from the MP platforms-test VPC; enforcing backup-derived AMI policy via SCP/IAM updates (with subsequent rollback on ec2:RegisterImage); extending GitHub Actions permissions to manage AWS Organizations policies; and upgrading CI Go version to 1.24.
For 2025-08, focused on enabling safe, flexible deployment of the GitHub OIDC provider with optional provisioning and robust no-provider test coverage. Delivered a toggle-controlled provider creation, resilient outputs with try, indexing fix to support multiple provider outputs, and test/resource scaffolding for no-provider scenarios. Strengthened IAM policy/resource ID handling to ensure uniqueness across environments. These changes improve CI reliability, reduce risk in environments without a provider, and improve maintainability and traceability of policy documents and resources.
For 2025-08, focused on enabling safe, flexible deployment of the GitHub OIDC provider with optional provisioning and robust no-provider test coverage. Delivered a toggle-controlled provider creation, resilient outputs with try, indexing fix to support multiple provider outputs, and test/resource scaffolding for no-provider scenarios. Strengthened IAM policy/resource ID handling to ensure uniqueness across environments. These changes improve CI reliability, reduce risk in environments without a provider, and improve maintainability and traceability of policy documents and resources.
Month: 2025-07 — Developer monthly summary focusing on Terraform-based platform modernization across four repositories. Key features delivered, major bug fixes, overall impact, and skills demonstrated are summarized below to highlight business value and technical achievement. 1) Key features delivered - Terraform AWS provider upgrade to v6 across all modules: ministryofjustice/modernisation-platform-terraform-pagerduty-integration, -baselines, -environments, and -ecs-cluster. Notable commits include: 55bfbf927dfba565316f4b8fba1f3eff3adf5d3b; for baselines: d895bcd09629c8ad93027ae4faa1259568634b67, ef71bf32b07df0b48e8fbf5be1e36773d1740552, 8049198de8ed8d76021b66cb307c90f39f4bab67; environments: 3c182e9ad8db3c3be67cbf589a3c29c1da729154; ecs-cluster: 73ad7e38068e051b3431a871d70ac1538689ca37. - Compatibility and deprecation improvements in baselines: update config-bucket module to v9.0.0, migrate data sources from name to region, and replace deprecated name attribute with region. - Environments lifecycle improvements: introduce AWS provider v6 across environments and include internal testing accounts in cleanup and rebuild workflows. - ECS cluster governance: tighten provider version constraints to require v6 across cluster, container, service, and unit-test modules and tests. 2) Major bugs fixed - Temporary suppression of SCA finding AVD-AWS-0095 for SNS topic encryption to unblock progress; plan to revisit encryption configuration in a future module update (commit 46dd21ad9d13cbe00ca9a4f25d3f8e50a2077296). - Include internal testing accounts in nuking/rebuild lists to ensure critical testing accounts are managed properly during environment cleanup (commit f177dc869c27434b83818be06264a2fa68336739). 3) Overall impact and accomplishments - Improved AWS feature compatibility, security posture, and reduced risk of deprecations across four repositories, enabling safer and faster deployments. - Consolidated three baselines commits into a single business-value feature covering AWS provider upgrades, compatibility, and deprecation handling. - Strengthened environment lifecycle automation and governance, leading to more predictable, auditable cleanup/rebuild processes. 4) Technologies and skills demonstrated - Terraform module orchestration across multiple repos, including data source migrations and resource deprecations. - AWS provider v6 adoption and constraint management across modules and tests. - Checkov ignore strategies for SCA findings and future-proofing paths. - S3 bucket module compatibility updates and region-based data attributes. - Cross-repo consistency, testing account lifecycle management, and governance practices. Business value: This work reduces operational risk, accelerates feature delivery with AWS feature compatibility, and lowers maintenance costs by aligning with current AWS practices and deprecations, while maintaining robust environment lifecycle controls.
Month: 2025-07 — Developer monthly summary focusing on Terraform-based platform modernization across four repositories. Key features delivered, major bug fixes, overall impact, and skills demonstrated are summarized below to highlight business value and technical achievement. 1) Key features delivered - Terraform AWS provider upgrade to v6 across all modules: ministryofjustice/modernisation-platform-terraform-pagerduty-integration, -baselines, -environments, and -ecs-cluster. Notable commits include: 55bfbf927dfba565316f4b8fba1f3eff3adf5d3b; for baselines: d895bcd09629c8ad93027ae4faa1259568634b67, ef71bf32b07df0b48e8fbf5be1e36773d1740552, 8049198de8ed8d76021b66cb307c90f39f4bab67; environments: 3c182e9ad8db3c3be67cbf589a3c29c1da729154; ecs-cluster: 73ad7e38068e051b3431a871d70ac1538689ca37. - Compatibility and deprecation improvements in baselines: update config-bucket module to v9.0.0, migrate data sources from name to region, and replace deprecated name attribute with region. - Environments lifecycle improvements: introduce AWS provider v6 across environments and include internal testing accounts in cleanup and rebuild workflows. - ECS cluster governance: tighten provider version constraints to require v6 across cluster, container, service, and unit-test modules and tests. 2) Major bugs fixed - Temporary suppression of SCA finding AVD-AWS-0095 for SNS topic encryption to unblock progress; plan to revisit encryption configuration in a future module update (commit 46dd21ad9d13cbe00ca9a4f25d3f8e50a2077296). - Include internal testing accounts in nuking/rebuild lists to ensure critical testing accounts are managed properly during environment cleanup (commit f177dc869c27434b83818be06264a2fa68336739). 3) Overall impact and accomplishments - Improved AWS feature compatibility, security posture, and reduced risk of deprecations across four repositories, enabling safer and faster deployments. - Consolidated three baselines commits into a single business-value feature covering AWS provider upgrades, compatibility, and deprecation handling. - Strengthened environment lifecycle automation and governance, leading to more predictable, auditable cleanup/rebuild processes. 4) Technologies and skills demonstrated - Terraform module orchestration across multiple repos, including data source migrations and resource deprecations. - AWS provider v6 adoption and constraint management across modules and tests. - Checkov ignore strategies for SCA findings and future-proofing paths. - S3 bucket module compatibility updates and region-based data attributes. - Cross-repo consistency, testing account lifecycle management, and governance practices. Business value: This work reduces operational risk, accelerates feature delivery with AWS feature compatibility, and lowers maintenance costs by aligning with current AWS practices and deprecations, while maintaining robust environment lifecycle controls.
June 2025 monthly summary for ministryofjustice/aws-root-account. Delivered security and deployment reliability improvements through IAM least-privilege configurations for Security Hub integration and CloudFormation troubleshooting enhancements. Key outcomes include: creating the XsiamIntegration IAM user with a least-privilege policy limited to securityhub:GetFindings and necessary GuardDuty access; refining and hardening policies (ReadOnly attachment, scope down, policy resource corrections, and updated references); enabling CloudFormation:CreateStackInstances in the Modernization Platform IAM role to support troubleshooting failed stack deployments. No critical bugs identified; these changes strengthen security posture, expedite incident visibility, and improve deployment resilience. Technologies/skills demonstrated: IAM policy design, policy as code, least-privilege security, Security Hub/GuardDuty integration, CloudFormation permissions, and IaC governance.
June 2025 monthly summary for ministryofjustice/aws-root-account. Delivered security and deployment reliability improvements through IAM least-privilege configurations for Security Hub integration and CloudFormation troubleshooting enhancements. Key outcomes include: creating the XsiamIntegration IAM user with a least-privilege policy limited to securityhub:GetFindings and necessary GuardDuty access; refining and hardening policies (ReadOnly attachment, scope down, policy resource corrections, and updated references); enabling CloudFormation:CreateStackInstances in the Modernization Platform IAM role to support troubleshooting failed stack deployments. No critical bugs identified; these changes strengthen security posture, expedite incident visibility, and improve deployment resilience. Technologies/skills demonstrated: IAM policy design, policy as code, least-privilege security, Security Hub/GuardDuty integration, CloudFormation permissions, and IaC governance.
May 2025 performance snapshot for the Modernisation Platform: security, networking, and observability enhancements across multiple AWS accounts and Terraform pipelines. Focused on reducing risk, improving deployment confidence, and accelerating incident response through centralized monitoring and governance across MAAT environments.
May 2025 performance snapshot for the Modernisation Platform: security, networking, and observability enhancements across multiple AWS accounts and Terraform pipelines. Focused on reducing risk, improving deployment confidence, and accelerating incident response through centralized monitoring and governance across MAAT environments.
April 2025 (2025-04) summary: Strengthened cloud infrastructure stability, automated migration readiness tooling, and streamlined CI/QA processes across Terraform modules. Delivered business value by enabling O365 migration readiness, reducing manual toil, and improving deployment reliability through targeted module upgrades and lifecycle management.
April 2025 (2025-04) summary: Strengthened cloud infrastructure stability, automated migration readiness tooling, and streamlined CI/QA processes across Terraform modules. Delivered business value by enabling O365 migration readiness, reducing manual toil, and improving deployment reliability through targeted module upgrades and lifecycle management.
March 2025 summary: Delivered targeted CloudWatch alarm refinements in the Security Hub module of the baselines repository, and resolved a policy conflict in the IAM superadmins module. The alarm updates reduce noise while ensuring critical security events surface to Modernisation Platform engineers, with admin-role usage filtering and clearer ReadMe documentation. The IAM policy fix adds iam:ChangePassword to DenyAllExceptListedIfNoMFA to ensure consistent access control for collaborators and superadmins. Documentation improvements accompany the changes to improve clarity and governance alignment. These efforts enhance security observability, RBAC governance, and cross-team collaboration, delivering measurable business value through more reliable alerts and stable access management.
March 2025 summary: Delivered targeted CloudWatch alarm refinements in the Security Hub module of the baselines repository, and resolved a policy conflict in the IAM superadmins module. The alarm updates reduce noise while ensuring critical security events surface to Modernisation Platform engineers, with admin-role usage filtering and clearer ReadMe documentation. The IAM policy fix adds iam:ChangePassword to DenyAllExceptListedIfNoMFA to ensure consistent access control for collaborators and superadmins. Documentation improvements accompany the changes to improve clarity and governance alignment. These efforts enhance security observability, RBAC governance, and cross-team collaboration, delivering measurable business value through more reliable alerts and stable access management.
February 2025 — Delivered two Terraform baselines enhancements for the modernisation-platform. 1) Enhanced Security Alert System with Account-Based Filtering: tightened alert subscriptions to MP-owned accounts and added account alias to metric filter names, improving incident triage and notification clarity in Slack. 2) Terraform Workspace-Based Environment Naming Standardization: standardized resource naming across environments by using Terraform workspace names instead of AWS account alias, supported by a new workspace_name local variable. No major bugs fixed this month. Business impact: reduced alert noise, safer deployments, and more auditable infrastructure naming. Technologies and skills demonstrated: Terraform HCL, workspace scoping, local variables, account alias handling, and Slack notification integration.
February 2025 — Delivered two Terraform baselines enhancements for the modernisation-platform. 1) Enhanced Security Alert System with Account-Based Filtering: tightened alert subscriptions to MP-owned accounts and added account alias to metric filter names, improving incident triage and notification clarity in Slack. 2) Terraform Workspace-Based Environment Naming Standardization: standardized resource naming across environments by using Terraform workspace names instead of AWS account alias, supported by a new workspace_name local variable. No major bugs fixed this month. Business impact: reduced alert noise, safer deployments, and more auditable infrastructure naming. Technologies and skills demonstrated: Terraform HCL, workspace scoping, local variables, account alias handling, and Slack notification integration.
Concise monthly summary for 2025-01 for ministryofjustice/modernisation-platform. Delivered centralized collaborator and access management across projects (ppud, YJAF, MoJ/TVM, and reviewers), enabled DNS Firewall in ALERT mode with corresponding logging adjustments, and integrated the r53-dns-firewall module into core-vpc-* CI workflows. Implemented query logging and CloudWatch monitoring for non_live_data VPC and DNS firewall matches. Added a seasonal New Year message and completed documentation improvements. Included targeted cleanup and bug fixes (removed unused custom domain input, removed legacy logging/monitoring config from r53_dns_firewall, and refined CloudWatch RQLC associations).
Concise monthly summary for 2025-01 for ministryofjustice/modernisation-platform. Delivered centralized collaborator and access management across projects (ppud, YJAF, MoJ/TVM, and reviewers), enabled DNS Firewall in ALERT mode with corresponding logging adjustments, and integrated the r53-dns-firewall module into core-vpc-* CI workflows. Implemented query logging and CloudWatch monitoring for non_live_data VPC and DNS firewall matches. Added a seasonal New Year message and completed documentation improvements. Included targeted cleanup and bug fixes (removed unused custom domain input, removed legacy logging/monitoring config from r53_dns_firewall, and refined CloudWatch RQLC associations).
December 2024 monthly summary highlighting key infrastructure IaC improvements to IAM policy attachments across Terraform EC2 modules, with a focus on modularity, reliability, and business value. No major bugs fixed; minor cleanup activities performed to simplify policy management and ensure default AWS managed policy attachment.
December 2024 monthly summary highlighting key infrastructure IaC improvements to IAM policy attachments across Terraform EC2 modules, with a focus on modularity, reliability, and business value. No major bugs fixed; minor cleanup activities performed to simplify policy management and ensure default AWS managed policy attachment.
2024-11 Monthly Summary: Delivered secure, auditable data synchronization for the Modernisation Platform inventory in ministryofjustice/aws-root-account and advanced governance across S3/KMS configurations. Implemented a private data bucket with TLS, KMS encryption, policy improvements, standardized alias names, and lifecycle management via a Terraform module, enabling reliable, compliant data sync with reduced operational risk. Addressed governance gaps by fixing policy and KMS access controls to reference the correct Organization ID, strengthening org-wide security posture. Performed infrastructure stabilization by temporarily disabling the Oracle LTS CloudFormation stack resource in Terraform to halt provisioning without code deletion, improving deployment predictability. This work leveraged Mod Platform Terraform modules for consistency, removed public bucket ACLs, and reinforced secure-by-default infrastructure.
2024-11 Monthly Summary: Delivered secure, auditable data synchronization for the Modernisation Platform inventory in ministryofjustice/aws-root-account and advanced governance across S3/KMS configurations. Implemented a private data bucket with TLS, KMS encryption, policy improvements, standardized alias names, and lifecycle management via a Terraform module, enabling reliable, compliant data sync with reduced operational risk. Addressed governance gaps by fixing policy and KMS access controls to reference the correct Organization ID, strengthening org-wide security posture. Performed infrastructure stabilization by temporarily disabling the Oracle LTS CloudFormation stack resource in Terraform to halt provisioning without code deletion, improving deployment predictability. This work leveraged Mod Platform Terraform modules for consistency, removed public bucket ACLs, and reinforced secure-by-default infrastructure.

Overview of all repositories you've contributed to across your timeline