~/portfolio

Turning compliance into evidence that actually holds up.

13 years enforcing access controls and protecting sensitive data in regulated environments. Now building the technical skills to formalize it: threat modeling, cloud security, and identity governance backed by real project work.

See My Work ↗
Fabella Terry
Fabella Terry
IAM Governance & GRC Analyst · FabCloudTech
Location
New York, NY
GitHub
FabCloudTech
NIST SP 800-53 IAM Governance HIPAA-Adjacent GRC Analysis IoT Security AWS Cloud
13+
Years in regulated environments
2,518+
Families' PII managed
0
Compliance violations in 13 years
8
Security projects built
3
Frameworks: NIST, IEC 62443, HIPAA
About Me

Access control isn't a policy. It's a practice.

I spent 13 years in one of the most data-sensitive environments there is, managing PII for over 2,500 families, maintaining zero compliance violations, and keeping audit-ready documentation under HIPAA-adjacent requirements.

Now I'm translating that operational fluency into formal security practice: threat modeling, mTLS implementation, NIST control assessments, and cloud monitoring pipelines. Not theory. Documented, hands-on project work.

IAM Governance
RBAC enforcement, least privilege assessment, identity lifecycle, and access control policy across regulated environments.
GRC Analysis
NIST SP 800-53 control mapping, gap analysis, risk-ranked remediation, and audit-style compliance artifacts.
Regulated Data Administration
13 years managing sensitive PII under HIPAA-adjacent compliance frameworks with zero violations.
Security Engineering
IoT threat modeling, TLS/mTLS implementation, replay attack simulation, and cloud detective controls on AWS.
01

What I do

Governance and identity work across cloud and IoT environments. Framework-mapped, audit-ready, and grounded in real-world regulated experience.

// Governance & Risk
Risk Assessment STRIDE Threat Modeling Control Assessment Security Policy Authorship Audit Support Gap Analysis Incident Documentation Compliance Operations
// Identity & Access
RBAC Design Least Privilege Provisioning / Deprovisioning Identity Lifecycle Access Reviews Segregation of Duties PAM Concepts Certificate-Based Auth
// Cloud & IoT Security
AWS IAM CloudTrail CloudWatch Secrets Manager VPC Azure Entra ID Mutual TLS (mTLS) HMAC Signing MQTT v5 AWS IoT Core
// Frameworks & Standards
NIST CSF 2.0 NIST SP 800-53 NIST RMF IEC 62443 HIPAA Defense-in-Depth Shared Responsibility
// Tools & Scripting
Python AWS CLI Mosquitto OpenSSL GitHub Splunk Microsoft 365 Jira
02

Things I've built

Hands-on security work spanning threat modeling, architecture design, attack simulation, executive reporting, and policy authorship. Each project includes documentation mapped to recognized frameworks.

// 01 Externship

STRIDE Threat Model: Hotel IoT Water System

Full STRIDE analysis across 4 system components (IoT devices, cloud platform, web dashboard, remote controls) for a 500-room luxury hotel. Produced a risk-ranked assessment with critical/high/medium risk classification and prioritized mitigations for executive review.

STRIDE Risk Assessment MQTT IoT Security
↗ view on github
// 02 Externship

MQTT Topic Architecture & Vulnerability Assessment

Designed a hierarchical MQTT topic structure with QoS-level security reasoning for multi-site expansion. Then performed live reconnaissance, capturing 15+ messages via wildcard subscription. Documented 4 unmitigated vulnerabilities (no encryption, no auth, no authorization, no message verification) with evidence and remediation priorities.

MQTT v5 Vulnerability Assessment Traffic Capture QoS Analysis
↗ view on github
// 03 Executive Report

TLS Security Assessment for Hotel General Manager

Executive-facing security assessment demonstrating live eavesdropping risk, TLS protection effectiveness, and performance impact. Ran 4 tests: traffic interception, unauthorized device rejection, latency benchmarking (52ms avg), and load testing (10 to 100 msg/sec). Framed findings against real hotel breaches (Omni, Motel One, Marriott).

TLS NIST CSF 2.0 Executive Reporting Load Testing
↗ view on github
// 04 Externship

mTLS Implementation & Identity Gap Analysis

Configured mutual TLS with certificate-based device authentication on a Mosquitto broker. Analyzed 3 attack scenarios where one-way TLS fails (rogue broker, compromised sensor, insider bypass). Validated certificate rejection for missing, untrusted, and expired certs. Enforced identity-bound logging via certificate Common Name extraction.

mTLS Mosquitto PKI OpenSSL Certificate Validation
↗ view on github
// 05 Executive Report

Replay Attack Simulation & Defense Comparison

Simulated 3 attack types (immediate, delayed, tampered replay) against a Python MQTT pipeline across 4 protection configurations. Measured rejection rates per configuration. Delivered findings to VP of Operations with plain-language analogies, quantified results, and a deployment recommendation. Referenced AWS IoT Core standards, IEC 62443, and MQTT v5.

Python HMAC-SHA256 Replay Attack IEC 62443 AWS IoT Core
↗ view on github
// 06 Policy

IoT Device Provisioning Policy

Authored a complete security policy governing the full device certificate lifecycle: provisioning, rotation (60-day lead, annual cycle), revocation, decommissioning, and emergency response. Defined roles and responsibilities, inventory requirements, and record-keeping procedures. Aligned to IEC 62443 and NIST IoT guidance.

Security Policy PKI Lifecycle IEC 62443 Certificate Mgmt CRL
↗ view on github
// 07 AWS Project

NIST SP 800-53 AC-6 Least Privilege Assessment

Governance-focused control assessment in a simulated AWS environment. Reviewed 10+ IAM role configurations for privilege creep, over-provisioned permissions, and missing boundary policies. Identified 5 control gaps and produced a risk-ranked remediation report with audit-style compliance artifacts (control narrative, gap analysis, evidence log).

AWS IAM NIST SP 800-53 AC-6 Risk Assessment
↗ view on github
// 08 AWS Project

Cloud Security Monitoring for Sensitive Access

Built an end-to-end audit logging pipeline monitoring sensitive credential access across AWS Secrets Manager, CloudTrail, and CloudWatch covering 100% of target access events. Engineered detective controls with log-based metrics, automated alarms, and SNS alerting under least-privilege IAM principles.

CloudTrail CloudWatch Secrets Manager SNS Detective Controls
↗ view on github
03

Where I've worked

13 years across regulated environments enforcing access controls, administering RBAC, and maintaining audit-ready compliance records.

FEB 2026 – PRESENT Hydroficient (via Extern)

IoT Security Externship

STRIDE threat modeling, MQTT architecture design, vulnerability assessment, mTLS implementation, replay attack simulation, executive security reports, and IoT provisioning policy authorship for a commercial hotel water-monitoring system. Findings mapped to IEC 62443 and NIST CSF 2.0.

SEP 2018 – PRESENT Docs for Tots / Help Me Grow-LI

Senior Resource Specialist

Maintained audit-ready PII compliance with zero access control findings across all review cycles. Administered RBAC across a 3-person team, monitored phishing indicators, coordinated multi-stakeholder access governance, and delivered security awareness training to 12 staff.

MAR 2018 – SEP 2018 Bridging Access to Care

Care Specialist

Administered provisioning and deprovisioning workflows across mandated state digital systems. Drove a 20% improvement in process efficiency by tracking compliance metrics across 3 program KPIs.

MAR 2012 – MAR 2018 Healthy Families Jamaica

Senior Family Support / Assessment Worker

Resolved credential access failures across 4+ regulated platforms for 100+ users. Sustained zero documentation errors across 6 years of state oversight reviews. Delivered access policy training to 15+ staff.

04

Credentials & development

AWS Certified Cloud Practitioner
AWS· Active · Dec 2025
CompTIA Security+
CompTIA· In Progress
Mentorship — Transition 2 Cyber
Cohort· Jan – Apr 2026
05

Let's talk

Open to GRC Analyst and IAM Governance roles. Based in New York, available for remote and hybrid.