Skip to content

Instantly share code, notes, and snippets.

View gezza-b's full-sized avatar

Gerald Bachlmayr gezza-b

View GitHub Profile
@gezza-b
gezza-b / ccsp-compliance-others.md
Created August 4, 2025 08:30
ccsp-compliance-others.md
Framework Description
FedRamp A US government program for authorising cloud services with standardised security controls. It provides a list of prescreened cloud service providers authorised to work with US government agencies.
FIPS 140-2 Defines four levels of security for cryptographic modules: L1 – Basic physical security L2 – Adds tamper-evident seals and labelling L3 – Requir
@gezza-b
gezza-b / ccsp-compliance-nist.md
Last active August 4, 2025 08:37
ccsp-compliance-nist.md
NIST Standard Description
NIST SP 800‑37 Risk management framework: Describes a risk management framework. Similar to ISO 27005 / ISO 31000
NIST SP 800‑53 ISMS equivalent: Information Security Management Systems – comparable to ISO 27001
NIST SP 800‑61 Incident management framework: Describes impacts such as reputational damage and legal consequences
NIST SP 800‑133 Cryptographic key generation: Highlights the importance of using secure random number generators
@gezza-b
gezza-b / ccsp-compliance-iso.md
Last active August 4, 2025 08:24
ccsp-compliance-iso.md
ISO Standard Description
ISO 20000-1 Service management – aligns with ITIL: Addresses capacity management, release & deployment management, and security policies
ISO 27001 ISMS – Information Security Management Systems: Framework for establishing, implementing, maintaining, and continually improving ISMS
ISO 27002 Security controls for ISMS: Guidelines for implementing information security controls
ISO 27018 Privacy for cloud providers: Describes privacy requirements for cloud service providers like AWS, Azure, and GCP

|

Tier Description Availability Max outage
Tier 1 Basic capacity – no redundancy 99.671% 18.8 hours/year
Tier 2 Partial redundancy – for power & cooling 99.764% 11 hours/year
Tier 3 Increased redundancy – 72 hours of outage protection 99.982% 1.6 hours/year
Tier 4 Fully tolerant; 1N+1 for everything 99.995% 26.3 minutes/year
Phase Description
Plan Foundational activities for secure data management include identification of data requirements, data classification, and planning for storage and compliance.
Create Creating the data, ensuring integrity using digital signatures or checksums.
Store Securely storing the data, including tags, encryption, implementing access control, alignment with data residency laws, and potentially implementing data dispersion (storing data in several locations).
Use Accessing and processing the data, including encryption in transit.
Share Secure sharing of data between environments, enforcing the principle of least privilege, encryption in transit, and data transfer policies.
Archive Establishing long-term storage whilst ensuring data integrity and enforcing retention policies.
Destroy Secure data deletion. For example, via cryptographic erasure, which means the encryption key is deleted o
@gezza-b
gezza-b / ccsp-why.md
Created July 29, 2025 11:00
Why CCSP matters
Content Area Description
Vendor-neutral Preparing for the CCSP exam provides a vendor-neutral view of cloud security responsibilities and architecture.
Broader scope It covers broader security-related domains, including governance, legal/regulatory issues, risk, and compliance.
Stakeholder communication It also enhances the candidate’s ability to communicate effectively with CISOs, auditors, regulators, and risk teams.
@gezza-b
gezza-b / s3-conform-policy.json
Last active April 27, 2020 09:53
s3-conform-policy
"Resource": "arn:aws:s3:::awsconfigconforms-yourname/*",
"Condition": {
"StringEquals": {
"aws:PrincipalOrgID": "youraccount"
},
"ArnLike": {
"aws:PrincipalArn": "arn:aws:iam::*:role/aws-service-role/config-conforms.amazonaws.com/AWSServiceRoleForConfigConforms"
}
@gezza-b
gezza-b / org-recorder-role2.yml
Created April 27, 2020 09:46
org-recorder-role2
Path: /
Description: Role for the AWS Config Recorder
ManagedPolicyArns:
- arn:aws:iam::aws:policy/service-role/AWSConfigRoleForOrganizations
RoleName: OrgRecorderRole
@gezza-b
gezza-b / org-recorder-role1.yml
Last active April 27, 2020 09:45
org-recorder-role1
Type: AWS::IAM::Role
Properties:
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Principal:
Service:
- config.amazonaws.com
Action:
@gezza-b
gezza-b / aggregator-org.yml
Created April 27, 2020 09:39
aggregator-org
Resources:
ConfigAggregator:
Type: AWS::Config::ConfigurationAggregator
Properties:
ConfigurationAggregatorName: !Ref AggregatorName
OrganizationAggregationSource:
AllAwsRegions: true
RoleArn: !GetAtt OrgRecorderRole.Arn