Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

ies-triadic

IES Triadic Skill

UncategorizedView skill →

ies

ies

UncategorizedView skill →

ikea-varmblixt-smart-lamp

|

UncategorizedView skill →

image-enhancer

Improves the quality of images, especially screenshots, by enhancing

UncategorizedView skill →

implementing-aes-encryption-for-data-at-rest

AES (Advanced Encryption Standard) is a symmetric block cipher standardized by NIST (FIPS 197) used to protect classified and sensitive data. This skill covers implementing AES-256 encryption in GCM m

UncategorizedView skill →

implementing-alert-fatigue-reduction

>

UncategorizedView skill →

implementing-anti-phishing-training-program

Security awareness training is the human layer of phishing defense. An effective anti-phishing training program combines regular simulations, interactive learning modules, metric tracking, and positiv

UncategorizedView skill →

implementing-anti-ransomware-group-policy

>

UncategorizedView skill →

implementing-api-abuse-detection-with-rate-limiting

Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent DDoS, brute force, and credential stuffing attacks.

UncategorizedView skill →

implementing-api-gateway-security-controls

>

UncategorizedView skill →

implementing-api-key-security-controls

>

UncategorizedView skill →

implementing-api-rate-limiting-and-throttling

>

UncategorizedView skill →

implementing-api-schema-validation-security

Implement API schema validation using OpenAPI specifications and JSON Schema to enforce input/output contracts and prevent injection, data exposure, and mass assignment attacks.

UncategorizedView skill →

implementing-api-security-posture-management

Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while enforcing security policies across the API lifecycle.

UncategorizedView skill →

implementing-api-security-testing-with-42crunch

Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic conformance scanning of OpenAPI specifications.

UncategorizedView skill →

implementing-api-threat-protection-with-apigee

Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0, SpikeArrest, and Advanced API Security for OWASP Top 10 defense.

UncategorizedView skill →

implementing-application-whitelisting-with-applocker

>

UncategorizedView skill →

implementing-aqua-security-for-container-scanning

Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues in container images across CI/CD pipelines and registries.

UncategorizedView skill →

implementing-attack-path-analysis-with-xm-cyber

Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize the 2% of exposures that threaten critical assets.

UncategorizedView skill →

implementing-attack-surface-management

>

UncategorizedView skill →

implementing-aws-config-rules-for-compliance

>

UncategorizedView skill →

implementing-aws-iam-permission-boundaries

Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege limits set by the security team.

UncategorizedView skill →

implementing-aws-macie-for-data-classification

Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine learning and pattern matching for PII, financial data, and credentials detection.

UncategorizedView skill →

implementing-aws-nitro-enclave-security

>

UncategorizedView skill →

implementing-aws-security-hub-compliance

>

UncategorizedView skill →

implementing-aws-security-hub

>

UncategorizedView skill →

implementing-azure-ad-privileged-identity-management

Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows, and access reviews for Azure AD privileged roles.

UncategorizedView skill →

implementing-azure-defender-for-cloud

>

UncategorizedView skill →

implementing-beyondcorp-zero-trust-access-model

>

UncategorizedView skill →

implementing-bgp-security-with-rpki

Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and ROV policies on Cisco and Juniper routers to prevent route hijacking.

UncategorizedView skill →

implementing-browser-isolation-for-zero-trust

>

UncategorizedView skill →

implementing-canary-tokens-for-network-intrusion

>

UncategorizedView skill →

implementing-cisa-zero-trust-maturity-model

Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications, and data to achieve progressive organizational zero trust maturity.

UncategorizedView skill →

implementing-cloud-dlp-for-data-protection

>

UncategorizedView skill →

implementing-cloud-security-posture-management

>

UncategorizedView skill →

implementing-cloud-trail-log-analysis

>

UncategorizedView skill →

implementing-cloud-vulnerability-posture-management

Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source tools like Prowler and ScoutSuite for multi-cloud vulnerability detection.

UncategorizedView skill →

implementing-cloud-waf-rules

>

UncategorizedView skill →

implementing-cloud-workload-protection

>

UncategorizedView skill →

implementing-code-signing-for-artifacts

>

UncategorizedView skill →

implementing-conditional-access-policies-azure-ad

Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device compliance requirements, risk-based authentication, named l

UncategorizedView skill →

implementing-conduit-security-for-ot-remote-access

>

UncategorizedView skill →

implementing-container-image-minimal-base-with-distroless

Reduce container attack surface by building application images on Google distroless base images that contain only the application runtime with no shell, package manager, or unnecessary OS utilities.

UncategorizedView skill →

implementing-container-network-policies-with-calico

Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control pod-to-pod traffic, restrict egress, and implement zero-trust microsegmentation.

UncategorizedView skill →

implementing-continuous-security-validation-with-bas

Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating real-world attack techniques across the kill chain.

UncategorizedView skill →

implementing-data-loss-prevention-with-microsoft-purview

>

UncategorizedView skill →

implementing-ddos-mitigation-with-cloudflare

Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin protection to mitigate volumetric, protocol, and application-layer attacks.

UncategorizedView skill →

implementing-deception-based-detection-with-canarytoken

Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug tokens, DNS tokens, document tokens, and AWS key tokens.

UncategorizedView skill →

implementing-delinea-secret-server-for-pam

>

UncategorizedView skill →

implementing-device-posture-assessment-in-zero-trust

>

UncategorizedView skill →

Page 15 of 41 · 2048 results