Browse Skills
Implementing Attack Path Analysis With Xm Cyber
v1.0.0Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize the 2% of exposures that threaten critical assets.
Implementing Aws Iam Permission Boundaries
v1.0.0Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege limits set by the security team.
Implementing Aws Security Hub
v1.0.0>
Implementing Aws Security Hub Compliance
v1.0.0>
Implementing Bgp Security With Rpki
v1.0.0Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and ROV policies on Cisco and Juniper routers to prevent route hijacking.
Implementing Cloud Security Posture Management
v1.0.0>
Implementing Cloud Vulnerability Posture Management
v1.0.0Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source tools like Prowler and ScoutSuite for multi-cloud vulnerability detection.
Implementing Conduit Security For Ot Remote Access
v1.0.0>
Implementing Container Image Minimal Base With Distroless
v1.0.0Reduce container attack surface by building application images on Google distroless base images that contain only the application runtime with no shell, package manager, or unnecessary OS utilities.
Implementing Container Network Policies With Calico
v1.0.0Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control pod-to-pod traffic, restrict egress, and implement zero-trust microsegmentation.
Implementing Continuous Security Validation With Bas
v1.0.0Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating real-world attack techniques across the kill chain.
Implementing Deception Based Detection With Canarytoken
v1.0.0Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug tokens, DNS tokens, document tokens, and AWS key tokens.