Three envs.
Two clouds.
One Terraform spine.
Provision dev / staging / prod across AWS and GCP entirely via Terraform — VPC + IAM, BigQuery + Redshift warehouses with WLM and tiered S3/GCS lifecycle, a 5-role RBAC matrix locked down by permission boundaries and SCPs, KMS-encrypted Secrets Manager with 30-day rotation, CloudTrail audit, and AWS Budgets + a Grafana FinOps anomaly dashboard.
The “walk me through dev/staging/prod for a data platform on AWS+GCP” question — asked at any company running multi-cloud analytics (Snowflake, Databricks, Stripe, Airbnb).
- A 19-module Terraform codebase with S3 + DynamoDB remote state + locking
- Three Terraform workspaces (dev / staging / prod) with isolated state and CI plan/apply gates
- BigQuery + Redshift warehouses with partitioning, clustering, WLM queues, and tiered S3/GCS lifecycle policies
- A 5-role IAM matrix (platform_admin · data_engineer · data_analyst · ml_engineer · read_only) with permission boundaries + SCP guardrails
- AWS Secrets Manager with 30-day Lambda rotation + GCP Workload Identity Federation
- AWS Budgets + cost allocation tag policy + a Grafana cost-anomaly dashboard + 20-point production hardening checklist
The data team that ships first is the one with a sane base layer.
Multi-cloud is the default for analytics teams above ~50 engineers — Snowflake on AWS, BigQuery on GCP, often both. The senior+ data engineer who can stand up dev/staging/prod with proper RBAC, secrets rotation, audit, and budget guardrails is the one who unblocks every downstream pipeline + ML workflow.
Multi-cloud is the steady state
Every modern analytics team has at least two clouds — usually because Snowflake is on AWS and the ML stack is on GCP. The platform layer has to span both without forking workflows.
IaC drift is the #1 platform risk
Click-ops in three environments turns into 'why is staging slow?' six months later. Workspaces + remote state with locking + plan/apply gates is the bar for senior platform roles.
Cloud-native IAM is the senior bar
Permission boundaries + SCPs + Workload Identity Federation is what reviewers look for. Hand-edited bucket policies are not — they're the audit finding nobody wants.
FinOps owns the bill, not finance
Budgets, cost allocation tags, anomaly alerts, and tag policies are how engineering teams stay accountable for spend. This is now a senior-DE responsibility, not a corp-finance one.
Part 01 is free. The rest unlocks with PRO.
Try the first ~3 hours — wire the Terraform skeleton, stand up dev/staging/prod workspaces with S3 + DynamoDB locking, and ship a multi-AZ VPC + 5-role IAM scaffold. If it clicks, upgrade to unlock the warehouse layer, the RBAC + secrets + audit lock-down, and the FinOps + production hardening sprint.
Cloud Data Infrastructure & FinOps
The Cloud Fundamentals path covers the underlying primitives — this project shows you how to compose them into a real multi-cloud platform.
Three sprints. Three checkpoints. One production-grade platform.
Each phase ends with a tagged commit, a runnable terraform plan, and an artifact a senior reviewer would actually accept.
Terraform skeleton + remote state with locking + multi-AZ VPC + 5-role IAM scaffold. GitHub Actions plan/apply gate enforced. dev/staging/prod workspaces with isolated state.
- ✓S3 + DynamoDB backend with state locking
- ✓Multi-AZ VPC across 3 AZs (public/private + NAT/IGW)
- ✓5-role IAM scaffold + GitHub Actions plan/apply pipeline
BigQuery medallion datasets with partitioned + clustered tables. Redshift cluster with WLM queues. S3/GCS tiered lifecycle. Lake Formation + Athena permission scaffold.
- ✓BigQuery datasets (raw/staging/analytics/ml_features) with partition + cluster keys
- ✓Redshift cluster + WLM JSON config (etl/reporting/adhoc/default)
- ✓S3 + GCS tiered lifecycle (Standard → IA → Glacier → DeepArchive)
5-role RBAC matrix with permission boundaries + SCPs. Secrets Manager with rotation. KMS + CloudTrail + Config. Budgets + cost tag policy + Grafana FinOps dashboard. 20-point production hardening checklist.
- ✓RBAC matrix + permission boundaries + SCPs (deny CloudTrail disable, public buckets)
- ✓Secrets Manager 30-day rotation + Workload Identity Federation
- ✓AWS Budgets + cost allocation tags + Grafana cost-anomaly dashboard
Validate locally. Apply only with your own cloud accounts.
The starter kit ships terraform-validate-clean across all 19 modules so you can review, fmt-check, and security-lint the codebase on your laptop — without spinning up any billable resources until you opt in.
What lives in the repo
Everything you need to walk all 4 parts on your laptop, plus the sample audit + cost CSVs that simulate CloudTrail and AWS Cost Explorer exports for offline analysis.
- modules/ — 19 Terraform modules across networking / iam / bigquery / redshift / kms / cloudtrail / budgets
- environments/ — dev/staging/prod tfvars (.example only — never commit credentials)
- audit-logs/ — sample CloudTrail + BigQuery audit-log CSVs for offline access-pattern analysis
- cost-reports/ — sample AWS Cost Explorer + GCP Billing CSVs for FinOps dashboard work
- .github/workflows/ — CI scaffolding with plan/apply gates and security-lint job
- Makefile — validate · fmt-check · security (checkov + tfsec) · plan / apply / destroy targets
Multi-Cloud Platform Foundation Starter Kit
Pre-validated Terraform codebase (19 modules across AWS + GCP), sample audit + cost CSVs, Makefile with checkov/tfsec hooks, and a CI workflow. Everything terraform-validate-clean out of the box. Skip the boilerplate, start on Part 01.
The same platform — built for the real org chart.
Tutorials ship against a single AWS account + a single GCP project. Production runs across an AWS Organization, multiple GCP folders, real rotation cadences, and budget caps that actually pause spend. Here’s the diff, with the Terraform resources you reach for.
aws_organizations_organizational_unit per env + GCP folders with Workload Identity Federationaws_iam_policy with permission boundary + aws_organizations_policy SCP guardrails (deny CloudTrail disable, enforce s3 encryption)aws_secretsmanager_secret_rotation with automatically_after_days = 30 + KMS key rotation enabled org-wideaws_config_rule + a SIEM/Snowflake destination — actual rule libraries (CIS, PCI) attached, not just the scaffoldaws_budgets_budget + aws_budgets_budget_action with hard caps that pause non-prod, plus tag policy enforcement at the org levelaws_backup_plan with documented RTO ≤ 4h / RPO ≤ 1h for prodReal review from senior platform engineers who’ve owned this stack.
Submit your Terraform PR, get line-by-line feedback within 48 hours from someone who has actually run dev/staging/prod across AWS + GCP. The kind of review that's quietly worth thousands of dollars in time-to-staff.
4 reviews / month
Submit a Terraform PR, a refactor proposal, or a full repo. Reviewer is matched to your domain — multi-cloud platform / RBAC / FinOps for this project. Async, comments inline, average turnaround 31 hours.
2 office hours / month
Live 30-min sessions with a senior platform engineer. Architecture questions, whiteboard a permission-boundary design, mock a system-design interview on multi-cloud platform layout. Group sessions also available.
One subscription. 15+ projects, all curriculum, code review.
PRO is built for senior+ engineers who want production-grade builds and feedback loops — not more tutorials.
Pick this if you own the platform, not just one pipeline on it.
Platform engineers
You're the one tagged on every 'why is staging different from prod' Slack thread. This gives you a clean Terraform spine with isolated state, plan/apply gates, and a 5-role RBAC scaffold to point reviewers at.
Senior data engineers leveling up
You ship dbt + Airflow daily and the next interview loop is asking you to whiteboard the platform underneath. After this you can defend a multi-cloud + multi-env design from first principles.
Cloud SREs / DevOps crossing into data
You know Terraform + IAM cold but the data warehouse layer is unfamiliar. This bridges the gap — BigQuery + Redshift + WLM, S3/GCS lifecycle, and the cost-attribution patterns data teams actually want.
Security-adjacent data engineers
You're the DE who keeps getting pulled into compliance reviews. This is the project that lets you point at a permission-boundary + SCP + Workload Identity Federation setup the security team will sign off on.
Going deeper? Three tracks back this project.
The platform spine is what this project ships. These three curriculums let you go deeper on the layers it touches — policy + contracts depth, observability beyond CloudTrail, and the system-design framing senior+ interviews actually ask about.
Quick answers.
Ready to lay the spine?
Start with Part 01 — free, no card. About 3 hours. By the end you'll have Terraform with remote state + locking, dev/staging/prod workspaces with isolated state, a multi-AZ VPC, the 5-role IAM scaffold, and a GitHub Actions plan/apply gate.