Browse Skills
Implementing Memory Protection With Dep Aslr
v1.0.0>
Implementing Log Integrity With Blockchain
v1.0.0>-
Implementing Log Forwarding With Fluentd
v1.0.0Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed infrastructure
Implementing Kubernetes Pod Security Standards
v1.0.0Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admission (PSA) controller built into Kubernetes 1.25+. PS
Implementing Kubernetes Network Policy With Calico
v1.0.0Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.
Implementing Jwt Signing And Verification
v1.0.0JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization in web applications. This skill covers implementing secure JWT signing with HMAC-SHA256
Implementing Just In Time Access Provisioning
v1.0.0Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound access only when needed. This skill covers JIT architecture design, approval workflo
Implementing Iso 27001 Information Security Management
v1.0.0ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete
Implementing Infrastructure As Code Security Scanning
v1.0.0>
Implementing Immutable Backup With Restic
v1.0.0>
Implementing Image Provenance Verification With Cosign
v1.0.0Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations, and Kubernetes admission enforcement.
Implementing Iec 62443 Security Zones
v1.0.0>