Browse Skills

Implementing Rbac Hardening For Kubernetes

v1.0.0

Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings, eliminating cluster-admin sprawl, and integrating external identity providers.

mukul975
3

Implementing Runtime Application Self Protection

v1.0.0

Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application runtime, covering OpenRASP integration, attack pattern detection, and security policy configuration for Java and Python web applications.

mukul975
4

Implementing Runtime Security With Tetragon

v1.0.0

Implement eBPF-based runtime security observability and enforcement in Kubernetes clusters using Cilium Tetragon for kernel-level threat detection and policy enforcement.

mukul975
5

Implementing Secrets Scanning In Ci Cd

v1.0.0

Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment

mukul975
3

Implementing Security Chaos Engineering

v1.0.0

>

mukul975
4

Implementing Security Information Sharing With Stix2

v1.0.0

>

mukul975
4

Implementing Security Monitoring With Datadog

v1.0.0

Implement security monitoring using Datadog's Cloud SIEM, log analysis, and threat detection capabilities to identify and respond to security events across cloud infrastructure.

mukul975
2

Implementing Semgrep For Custom Sast Rules

v1.0.0

Write custom Semgrep SAST rules in YAML to detect application-specific vulnerabilities, enforce coding standards, and integrate into CI/CD pipelines.

mukul975
2

Implementing Soar Playbook For Phishing

v1.0.0

Automate phishing incident response using Splunk SOAR REST API to create containers, add artifacts, and trigger playbooks

mukul975
3

Implementing Soar Playbook With Palo Alto Xsoar

v1.0.0

Implement automated incident response playbooks in Cortex XSOAR to orchestrate security workflows across SOC tools and reduce manual response time.

mukul975
3

Implementing Supply Chain Security With In Toto

v1.0.0

Implement software supply chain integrity verification for container builds using the in-toto framework to create cryptographically signed attestations across CI/CD pipeline steps.

mukul975
7

Implementing Taxii Server With Opentaxii

v1.0.0

Deploy and configure an OpenTAXII server to share and consume STIX-formatted cyber threat intelligence using the TAXII 2.1 protocol for automated indicator exchange between organizations.

mukul975
2