Browse Skills
Implementing Security Information Sharing With Stix2
v1.0.0>
Implementing Security Chaos Engineering
v1.0.0>
Implementing Secrets Scanning In Ci Cd
v1.0.0Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment
Implementing Secrets Management With Vault
v1.0.0>
Implementing Secret Scanning With Gitleaks
v1.0.0>
Implementing Scim Provisioning With Okta
v1.0.0Implement automated user provisioning and deprovisioning using SCIM 2.0 protocol with Okta as the identity provider.
Implementing Saml Sso With Okta
v1.0.0Implement SAML 2.0 Single Sign-On (SSO) using Okta as the Identity Provider (IdP). This skill covers end-to-end configuration of SAML authentication flows, attribute mapping, certificate management, a
Implementing Runtime Security With Tetragon
v1.0.0Implement eBPF-based runtime security observability and enforcement in Kubernetes clusters using Cilium Tetragon for kernel-level threat detection and policy enforcement.
Implementing Runtime Application Self Protection
v1.0.0Deploy Runtime Application Self-Protection (RASP) agents to detect and block attacks from within application runtime, covering OpenRASP integration, attack pattern detection, and security policy configuration for Java and Python web applications.
Implementing Rsa Key Pair Management
v1.0.0RSA (Rivest-Shamir-Adleman) is the most widely deployed asymmetric cryptographic algorithm, used for digital signatures, key exchange, and encryption. This skill covers generating, storing, rotating,
Implementing Rbac Hardening For Kubernetes
v1.0.0Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings, eliminating cluster-admin sprawl, and integrating external identity providers.
Implementing Rbac For Kubernetes Cluster
v1.0.0Configure Kubernetes Role-Based Access Control (RBAC) to enforce least-privilege access to cluster resources. This skill covers Role/ClusterRole design, RoleBinding configuration, service account secu