Browse Skills
Implementing Rbac Hardening For Kubernetes
v1.0.0Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings, eliminating cluster-admin sprawl, and integrating external identity providers.
Implementing Runtime Application Self Protection
v1.0.0Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application runtime, covering OpenRASP integration, attack pattern detection, and security policy configuration for Java and Python web applications.
Implementing Runtime Security With Tetragon
v1.0.0Implement eBPF-based runtime security observability and enforcement in Kubernetes clusters using Cilium Tetragon for kernel-level threat detection and policy enforcement.
Implementing Secrets Scanning In Ci Cd
v1.0.0Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment
Implementing Security Chaos Engineering
v1.0.0>
Implementing Security Information Sharing With Stix2
v1.0.0>
Implementing Security Monitoring With Datadog
v1.0.0Implement security monitoring using Datadog's Cloud SIEM, log analysis, and threat detection capabilities to identify and respond to security events across cloud infrastructure.
Implementing Semgrep For Custom Sast Rules
v1.0.0Write custom Semgrep SAST rules in YAML to detect application-specific vulnerabilities, enforce coding standards, and integrate into CI/CD pipelines.
Implementing Soar Playbook For Phishing
v1.0.0Automate phishing incident response using Splunk SOAR REST API to create containers, add artifacts, and trigger playbooks
Implementing Soar Playbook With Palo Alto Xsoar
v1.0.0Implement automated incident response playbooks in Cortex XSOAR to orchestrate security workflows across SOC tools and reduce manual response time.
Implementing Supply Chain Security With In Toto
v1.0.0Implement software supply chain integrity verification for container builds using the in-toto framework to create cryptographically signed attestations across CI/CD pipeline steps.
Implementing Taxii Server With Opentaxii
v1.0.0Deploy and configure an OpenTAXII server to share and consume STIX-formatted cyber threat intelligence using the TAXII 2.1 protocol for automated indicator exchange between organizations.