Browse Skills

Implementing Attack Path Analysis With Xm Cyber

v1.0.0

Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize the 2% of exposures that threaten critical assets.

mukul975
3

Implementing Aws Iam Permission Boundaries

v1.0.0

Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege limits set by the security team.

mukul975
4

Implementing Aws Security Hub

v1.0.0

>

mukul975
5

Implementing Aws Security Hub Compliance

v1.0.0

>

mukul975
3

Implementing Bgp Security With Rpki

v1.0.0

Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and ROV policies on Cisco and Juniper routers to prevent route hijacking.

mukul975
3

Implementing Cloud Security Posture Management

v1.0.0

>

mukul975
2

Implementing Cloud Vulnerability Posture Management

v1.0.0

Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source tools like Prowler and ScoutSuite for multi-cloud vulnerability detection.

mukul975
3

Implementing Conduit Security For Ot Remote Access

v1.0.0

>

mukul975
2

Implementing Container Image Minimal Base With Distroless

v1.0.0

Reduce container attack surface by building application images on Google distroless base images that contain only the application runtime with no shell, package manager, or unnecessary OS utilities.

mukul975
2

Implementing Container Network Policies With Calico

v1.0.0

Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control pod-to-pod traffic, restrict egress, and implement zero-trust microsegmentation.

mukul975
3

Implementing Continuous Security Validation With Bas

v1.0.0

Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating real-world attack techniques across the kill chain.

mukul975
3

Implementing Deception Based Detection With Canarytoken

v1.0.0

Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug tokens, DNS tokens, document tokens, and AWS key tokens.

mukul975
3