
Sahid Khan engineered scalable, secure cloud infrastructure for the Ministry of Justice’s modernisation-platform-environments repository, delivering over 120 features in 16 months. He built and automated multi-environment deployments, container orchestration, and network security using Terraform, AWS, and Bash. His work included provisioning VPN-backed services, optimizing database performance, and implementing robust monitoring and alerting to support high-availability workloads. Sahid enhanced access control and secrets management, streamlined CI/CD pipelines, and improved observability through CloudWatch and Slack integrations. By focusing on infrastructure as code and configuration management, he enabled rapid, reliable delivery of platform features while reducing operational risk and supporting business scalability.
April 2026 — Ministry of Justice modernisation-platform-environments: Focused on reliability and scalability enhancements through monitoring optimization and infrastructure upgrade. Key achievements: - Enhanced cloud performance monitoring and alerting: Adjusted IOPS thresholds and removed burst IOPS alarms to reduce false alerts and improve reliability under load. Commits: f44e644b5d8f1065e3ca533a525ce5f339431ac8; 4d82421b00e319e1504a6fc06bff82487cfdaae1 - Database performance optimization via higher-capacity EC2 instance: Upgraded the EBSDB EC2 instance type to a more powerful configuration to boost performance and scalability. Commit: 36c2adb3043bf7f0443fee0c3c748ed435669d0d Impact and accomplishments: - Reduced alert noise and improved monitoring reliability under peak load, supporting stable operations and quicker incident response. - Increased database throughput and scalability to accommodate higher traffic and growing workloads. Technologies/skills demonstrated: - AWS monitoring and alerting tuning (IOPS related thresholds) - EC2/EBS instance optimization for database performance - Change traceability with commit history
April 2026 — Ministry of Justice modernisation-platform-environments: Focused on reliability and scalability enhancements through monitoring optimization and infrastructure upgrade. Key achievements: - Enhanced cloud performance monitoring and alerting: Adjusted IOPS thresholds and removed burst IOPS alarms to reduce false alerts and improve reliability under load. Commits: f44e644b5d8f1065e3ca533a525ce5f339431ac8; 4d82421b00e319e1504a6fc06bff82487cfdaae1 - Database performance optimization via higher-capacity EC2 instance: Upgraded the EBSDB EC2 instance type to a more powerful configuration to boost performance and scalability. Commit: 36c2adb3043bf7f0443fee0c3c748ed435669d0d Impact and accomplishments: - Reduced alert noise and improved monitoring reliability under peak load, supporting stable operations and quicker incident response. - Increased database throughput and scalability to accommodate higher traffic and growing workloads. Technologies/skills demonstrated: - AWS monitoring and alerting tuning (IOPS related thresholds) - EC2/EBS instance optimization for database performance - Change traceability with commit history
Monthly performance summary for 2026-03 focusing on delivery, optimization, and impact. Highlights include feature-oriented improvements across environments, cost and performance optimizations, and enhanced external integrations. No major production bug fixes were documented this month; emphasis was on delivering scalable configurations, streamlining backups, and improving workspace connectivity to support secure, efficient operations.
Monthly performance summary for 2026-03 focusing on delivery, optimization, and impact. Highlights include feature-oriented improvements across environments, cost and performance optimizations, and enhanced external integrations. No major production bug fixes were documented this month; emphasis was on delivering scalable configurations, streamlining backups, and improving workspace connectivity to support secure, efficient operations.
February 2026 monthly summary for the Ministry of Justice Modernisation Platform portfolios. Focused on delivering platform reliability, security hardening, and developer productivity improvements across environments, with concrete changes in database maintenance, network access, and access control.
February 2026 monthly summary for the Ministry of Justice Modernisation Platform portfolios. Focused on delivering platform reliability, security hardening, and developer productivity improvements across environments, with concrete changes in database maintenance, network access, and access control.
Month: 2026-01 — Across two repositories (ministryofjustice/modernisation-platform-environments and ministryofjustice/modernisation-platform), delivered scalable infrastructure initiatives, deployment reliability improvements, and governance enhancements with clear business value and traceable changes.
Month: 2026-01 — Across two repositories (ministryofjustice/modernisation-platform-environments and ministryofjustice/modernisation-platform), delivered scalable infrastructure initiatives, deployment reliability improvements, and governance enhancements with clear business value and traceable changes.
December 2025 monthly summary: Delivered core infrastructure and platform enhancements across two MoJ repositories, with a strong focus on security, stability, and capacity to enable scalable production workflows. Key features and improvements spanned EBS-based environments, SOA pre-production upgrades, EDRMS connectivity, and governance enhancements.
December 2025 monthly summary: Delivered core infrastructure and platform enhancements across two MoJ repositories, with a strong focus on security, stability, and capacity to enable scalable production workflows. Key features and improvements spanned EBS-based environments, SOA pre-production upgrades, EDRMS connectivity, and governance enhancements.
November 2025 performance summary: Across ministryofjustice/modernisation-platform and ministryofjustice/modernisation-platform-environments, security, scalability, and automation improvements were delivered with a strong focus on business value and reliability. Key features delivered tightened access control, expanded provisioning and scaling capabilities, and enhanced network and infrastructure configurations. Major bugs fixed improved secret management and production stability, complemented by test/build automation enhancements for ongoing OIA deployment.
November 2025 performance summary: Across ministryofjustice/modernisation-platform and ministryofjustice/modernisation-platform-environments, security, scalability, and automation improvements were delivered with a strong focus on business value and reliability. Key features delivered tightened access control, expanded provisioning and scaling capabilities, and enhanced network and infrastructure configurations. Major bugs fixed improved secret management and production stability, complemented by test/build automation enhancements for ongoing OIA deployment.
October 2025: Delivered a robust infra foundation and security hardening across the Modernisation Platform portfolios (Environments, CCMS, PUI, OIA, and Connector ecosystems) with a focus on business value, reliability, and observability. Key infrastructure work established baseline for multi-environment deployments (PUI, OPA Hub, Connector Infra) and initial builds for CCMS service adapter, CCMS UI/CloudFront integration, and internal networking levers (EBSAPPs and WebGate internal ALBs, internal ALB for EBSAPPs). Production readiness was advanced via PUI External in Prod, external exposure for PUI, and CloudFront deployment enhancements. Security and governance were strengthened through comprehensive WAF updates across environments, UK access policy changes, IP allowlisting, WAF priority tuning, OIA core rule considerations, IAM policy uplift for NLB logs, and a major secrets lifecycle overhaul. Observability and CI/CD capabilities were boosted with load balancer logs collection and Athena dataset creation, Cortex/XDR agent integrations for PUI and OIA, and the establishment of GitHub Runners. Inter-service connectivity and DNS readiness were improved with access to LAA TEST VPC, port 3306 access for LZ/MoJo, and Route 53 DNS for laa.service.justice.gov.uk, plus a new 7001 listener to support scalable event-driven workflows. Impact includes faster deployment velocity, reduced risk, improved security posture, and enhanced data access and telemetry across platforms.
October 2025: Delivered a robust infra foundation and security hardening across the Modernisation Platform portfolios (Environments, CCMS, PUI, OIA, and Connector ecosystems) with a focus on business value, reliability, and observability. Key infrastructure work established baseline for multi-environment deployments (PUI, OPA Hub, Connector Infra) and initial builds for CCMS service adapter, CCMS UI/CloudFront integration, and internal networking levers (EBSAPPs and WebGate internal ALBs, internal ALB for EBSAPPs). Production readiness was advanced via PUI External in Prod, external exposure for PUI, and CloudFront deployment enhancements. Security and governance were strengthened through comprehensive WAF updates across environments, UK access policy changes, IP allowlisting, WAF priority tuning, OIA core rule considerations, IAM policy uplift for NLB logs, and a major secrets lifecycle overhaul. Observability and CI/CD capabilities were boosted with load balancer logs collection and Athena dataset creation, Cortex/XDR agent integrations for PUI and OIA, and the establishment of GitHub Runners. Inter-service connectivity and DNS readiness were improved with access to LAA TEST VPC, port 3306 access for LZ/MoJo, and Route 53 DNS for laa.service.justice.gov.uk, plus a new 7001 listener to support scalable event-driven workflows. Impact includes faster deployment velocity, reduced risk, improved security posture, and enhanced data access and telemetry across platforms.
September 2025 — Modernisation Platform (MoJ) monthly performance summary. Delivered network, containerization, and infrastructure foundations across two repositories, enabling secure, scalable inter-service communication and faster software delivery. Key outcomes include network connectivity improvements with firewall and CIDR expansions; CCMS containerization with new ECR repos and refined access controls; Production and PUI infrastructure initialization and bootstrap; and enhanced EBS notifications visibility for stakeholders. These efforts establish solid platform foundations for CI/CD, security, and cross-team collaboration, accelerating future feature delivery and reducing operational risk.
September 2025 — Modernisation Platform (MoJ) monthly performance summary. Delivered network, containerization, and infrastructure foundations across two repositories, enabling secure, scalable inter-service communication and faster software delivery. Key outcomes include network connectivity improvements with firewall and CIDR expansions; CCMS containerization with new ECR repos and refined access controls; Production and PUI infrastructure initialization and bootstrap; and enhanced EBS notifications visibility for stakeholders. These efforts establish solid platform foundations for CI/CD, security, and cross-team collaboration, accelerating future feature delivery and reducing operational risk.
August 2025 focused on security hardening, reliability improvements, and readiness for future features across the two MOJ modernization repos. delivered key network/security enhancements, stability fixes, and environment readiness that collectively improve security posture, availability, and time-to-value for upcoming features.
August 2025 focused on security hardening, reliability improvements, and readiness for future features across the two MOJ modernization repos. delivered key network/security enhancements, stability fixes, and environment readiness that collectively improve security posture, availability, and time-to-value for upcoming features.
July 2025: Delivered focused cloud operations enhancements across environments, improving observability, security, and scalable networking. Implemented real-time alerting to Slack via SNS, expanded CloudWatch alarms for critical EDRMS/CCMS/RDS metrics, hardened network posture, refined instance tagging and scheduling, and enhanced EBSDB NLB routing. Strengthened access control with RBAC adjustments and NEC VPN connectivity.
July 2025: Delivered focused cloud operations enhancements across environments, improving observability, security, and scalable networking. Implemented real-time alerting to Slack via SNS, expanded CloudWatch alarms for critical EDRMS/CCMS/RDS metrics, hardened network posture, refined instance tagging and scheduling, and enhanced EBSDB NLB routing. Strengthened access control with RBAC adjustments and NEC VPN connectivity.
June 2025 performance summary focusing on delivering secure containerization, network readiness, data layer provisioning, and end-to-end deployment capabilities for EdRMS, along with isolated development testing environments. Key outcomes include IaC-driven ECR deployment, production VPN with dynamic routing, EDRMS scaffolding and RDS provisioning in MP Environments, end-to-end EdRMS deployment pipeline (MP test to preproduction), and a dedicated sandbox for isolated dev/test.
June 2025 performance summary focusing on delivering secure containerization, network readiness, data layer provisioning, and end-to-end deployment capabilities for EdRMS, along with isolated development testing environments. Key outcomes include IaC-driven ECR deployment, production VPN with dynamic routing, EDRMS scaffolding and RDS provisioning in MP Environments, end-to-end EdRMS deployment pipeline (MP test to preproduction), and a dedicated sandbox for isolated dev/test.
May 2025: Implemented secure, private connectivity for NEC EDRMS and established NEC VPN service groundwork to enable compliant, scalable access between NEC and the modernization platform. Delivered Terraform-based VPN infrastructure (VPN gateway, customer gateway, VPN connection), ECS cluster, task definitions, and load balancer, along with an ECS agent configuration template and a user data script to automate deployment. These efforts create a repeatable, secure deployment pattern and a foundation for traffic orchestration, reducing manual setup time and increasing security posture. While no explicit bug fixes were recorded this month, the changes deliver measurable business value through improved data protection, faster provisioning, and readiness for future expansion.
May 2025: Implemented secure, private connectivity for NEC EDRMS and established NEC VPN service groundwork to enable compliant, scalable access between NEC and the modernization platform. Delivered Terraform-based VPN infrastructure (VPN gateway, customer gateway, VPN connection), ECS cluster, task definitions, and load balancer, along with an ECS agent configuration template and a user data script to automate deployment. These efforts create a repeatable, secure deployment pattern and a foundation for traffic orchestration, reducing manual setup time and increasing security posture. While no explicit bug fixes were recorded this month, the changes deliver measurable business value through improved data protection, faster provisioning, and readiness for future expansion.
April 2025 monthly summary: Delivered two cross-repo features that strengthen security and deployment automation. Implemented MOJFIN SSO Group for MOJFIN SSM users (CC-3330) for centralized access management. Standardized Bastion Host provisioning across environments by removing environment-based conditionals in Terraform (CC-3406), ensuring consistent deployments. No major bugs fixed this month. Impact: reduced environment drift, faster onboarding, and improved security posture. Skills demonstrated: Terraform, SSO configuration, access management, automation, cross-repo collaboration.
April 2025 monthly summary: Delivered two cross-repo features that strengthen security and deployment automation. Implemented MOJFIN SSO Group for MOJFIN SSM users (CC-3330) for centralized access management. Standardized Bastion Host provisioning across environments by removing environment-based conditionals in Terraform (CC-3406), ensuring consistent deployments. No major bugs fixed this month. Impact: reduced environment drift, faster onboarding, and improved security posture. Skills demonstrated: Terraform, SSO configuration, access management, automation, cross-repo collaboration.
March 2025 monthly summary: Delivered privacy-focused data anonymization capability and expanded infra automation across two repos. Key features include the Data Anonymization Component for privacy/compliance workflows (CC-3225) and extensive EBS Apps provisioning (bulk across multiple commits in CC-3203 scope) plus a dedicated single-instance deployment. Security and reliability were strengthened via EBS Apps Load Balancer and TLS certificates and provisioning of EBSDB instances with sandbox components. Platform readiness improved with updates to platform data/providers and CI validation through pipeline test runs (including 1-instance and full pipeline). A regression was mitigated by reverting an unintended test change on the root application to restore stability. Collectively, these efforts increase deployment speed, improve environment parity, enhance data privacy controls, and strengthen the security posture of the platform, delivering measurable business value.
March 2025 monthly summary: Delivered privacy-focused data anonymization capability and expanded infra automation across two repos. Key features include the Data Anonymization Component for privacy/compliance workflows (CC-3225) and extensive EBS Apps provisioning (bulk across multiple commits in CC-3203 scope) plus a dedicated single-instance deployment. Security and reliability were strengthened via EBS Apps Load Balancer and TLS certificates and provisioning of EBSDB instances with sandbox components. Platform readiness improved with updates to platform data/providers and CI validation through pipeline test runs (including 1-instance and full pipeline). A regression was mitigated by reverting an unintended test change on the root application to restore stability. Collectively, these efforts increase deployment speed, improve environment parity, enhance data privacy controls, and strengthen the security posture of the platform, delivering measurable business value.
February 2025 summary for ministryofjustice/modernisation-platform: No new features deployed this month. Key fix delivered: CP to EBSDB connectivity on port 1521 was restored by updating firewall rules, enabling required cross-service communication and preventing outages. Changes implemented via two commits linked to CC-3160: 83e527546903812128d27f42c4832c27e8b4e7da and 014589e952aca6adaecf863d6c0e73ad6d9947ee. Impact: restored end-to-end data flows between CP and EBSDB, reducing production risk and stabilizing critical workloads. Skills demonstrated: networking/firewall configuration, secure change management, CI/CD collaboration with security/ops, and incident-driven delivery.
February 2025 summary for ministryofjustice/modernisation-platform: No new features deployed this month. Key fix delivered: CP to EBSDB connectivity on port 1521 was restored by updating firewall rules, enabling required cross-service communication and preventing outages. Changes implemented via two commits linked to CC-3160: 83e527546903812128d27f42c4832c27e8b4e7da and 014589e952aca6adaecf863d6c0e73ad6d9947ee. Impact: restored end-to-end data flows between CP and EBSDB, reducing production risk and stabilizing critical workloads. Skills demonstrated: networking/firewall configuration, secure change management, CI/CD collaboration with security/ops, and incident-driven delivery.
January 2025 – Modernisation Platform Environments: Delivered foundational FTP service provisioning in the patching environment, aligned non-production DNS routing for Webgate, and fixed LZ TEST connectivity. Implemented through substantial IaC and configuration changes, enabling secure patching workflows, improved observability, and readiness for upcoming FTP integration.
January 2025 – Modernisation Platform Environments: Delivered foundational FTP service provisioning in the patching environment, aligned non-production DNS routing for Webgate, and fixed LZ TEST connectivity. Implemented through substantial IaC and configuration changes, enabling secure patching workflows, improved observability, and readiness for upcoming FTP integration.

Overview of all repositories you've contributed to across your timeline