Skip to content
View 0xBahalaNa's full-sized avatar
🛠️
Building
🛠️
Building

Block or report 0xBahalaNa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
0xBahalaNa/README.md

Hey, I'm Luigi (0xBahalaNa) 🤝

About Me

I work at the intersection of compliance engineering and public safety technology. My background spans Identity Governance and Administration (privileged access monitoring, user access reviews, RBAC analysis) in regulated financial environments and hands-on technical support in a FedRAMP High environment serving federal and state/local law enforcement agencies.

I build tools that automate audit evidence collection and compliance workflows in AWS - replacing manual checkbox processes with repeatable, scriptable, auditor-ready outputs.

Frameworks I work with: CJIS Security Policy · FedRAMP (High baseline) · NIST 800-53

Certifications: SSCP · CySA+ · PenTest+ · Security+ · Network+ · A+ · Project+ · ITIL 4 Foundations · Linux LPI Essentials

What I'm Working On

  • GRC Engineering - automating audit evidence collection and compliance workflows, mapping tools to CJIS Security Policy, FedRAMP, and NIST 800-53 controls
  • Identity Engineering (IAM/IGA) - streamlining access reviews and provisioning pipelines, applying AC-family control requirements to real infrastructure
  • Cloud Security - building and researching AWS security tooling aligned to compliance baselines

Technical Stack

Category Technologies
Cloud Platforms AWS, Azure
Programming & Scripting Python, AWS CLI, Bash, PowerShell
Infrastructure as Code AWS CloudFormation, Terraform (learning)
IAM & IGA Access Reviews, Privileged Access Monitoring, RBAC, Least Privilege, SSO
Compliance & Frameworks CJIS Security Policy, FedRAMP (High), and NIST 800-53

Featured Projects

☁️ Cloud

  • AWS Compliance as Code - CloudFormation templates and Service Control Policies for AWS resource deployment
  • AWS Config Compliance Monitor - event driven compliance monitoring and auto-remediation for CJIS and FedRAMP High environments using AWS Config, Lambda, and SSM

🐍 Python - AWS Audit & Compliance Tools

  • iam_audit - audits AWS IAM users for MFA compliance
  • s3_audit - audits S3 buckets for security compliance
  • sg_audit - audits security groups for overly permissive rules
  • cloudtrail_audit - audits CloudTrail configuration for logging compliance
  • evidence_logger - generates timestamped audit evidence files from compliance checks
  • compliance_report - aggregates compliance data into structured reports
  • policy_checker - checks AWS policies for overly permissive configurations
  • secret_scanner - scans files for exposed credentials and secrets

🔄 In progress: Each tool is being updated with control mappings to NIST 800-53, FedRAMP High, and CJIS Security Policy requirements. Track progress through open issues and PRs.

Currently Learning

  • Terraform for multi-environment IaC deployments
  • Open Policy Agent (OPA) and Rego for policy-as-code enforcement across cloud environments
  • Automating CJIS Security Policy, FedRAMP, and NIST 800-53 control assessments in AWS

Where to Find Me

LinkedIn · Medium · HackTheBox

Pinned Loading

  1. iam_audit iam_audit Public

    A Python tool that audits all IAM users in your AWS account for MFA compliance.

    Python 2 2

  2. evidence_logger evidence_logger Public

    A Python tool that generates timestamped audit evidence files from a AWS policy compliance check.

    Python 1

  3. aws-compliance-as-code aws-compliance-as-code Public

    Automated AWS compliance guardrails using Service Control Policies and CloudFormation. Controls enforce audit log protection, encryption at rest, boundary protection, and least functionality, mappe…

  4. s3_audit s3_audit Public

    A Python tool that audits all S3 buckets in your AWS account for security compliance.

    Python