Back to authors
plurigrid

plurigrid

2048 Skills published on GitHub.

implementing-devsecops-security-scanning

>

UncategorizedView skill →

implementing-diamond-model-analysis

>-

UncategorizedView skill →

implementing-digital-signatures-with-ed25519

Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit security with 64-byte signatures and 32-byte keys, offering significant advantages ove

UncategorizedView skill →

implementing-disk-encryption-with-bitlocker

>

UncategorizedView skill →

implementing-dmarc-dkim-spf-email-security

SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate message integrity, and define policies for handling unauthenticated mail. Proper im

UncategorizedView skill →

implementing-dragos-platform-for-ot-monitoring

>

UncategorizedView skill →

implementing-ebpf-security-monitoring

>

UncategorizedView skill →

implementing-email-sandboxing-with-proofpoint

Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware and evasive phishing payloads. Proofpoint Targeted Attack Protection (TAP) is an industry

UncategorizedView skill →

implementing-end-to-end-encryption-for-messaging

End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary (including the server) able to decrypt them. This skill implements a simplified version

UncategorizedView skill →

implementing-endpoint-detection-with-wazuh

Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule XML creation, alert querying via the Wazuh REST API, and automated response actions.

UncategorizedView skill →

implementing-endpoint-dlp-controls

>

UncategorizedView skill →

implementing-envelope-encryption-with-aws-kms

Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself is encrypted with a master key (KEK) managed by AWS KMS. This approach allows encrypting

UncategorizedView skill →

implementing-epss-score-for-vulnerability-prioritization

Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.

UncategorizedView skill →

implementing-file-integrity-monitoring-with-aide

Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation, scheduled integrity checks, change detection, and alerting

UncategorizedView skill →

implementing-fuzz-testing-in-cicd-with-aflplusplus

Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling, and logic vulnerabilities in C/C++ and compiled applications.

UncategorizedView skill →

implementing-gcp-binary-authorization

Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested container images are deployed to Google Kubernetes Engine and Cloud Run.

UncategorizedView skill →

implementing-gcp-organization-policy-constraints

Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy, restricting risky configurations and ensuring compliance at organization, folder, and project levels.

UncategorizedView skill →

implementing-gcp-vpc-firewall-rules

>

UncategorizedView skill →

implementing-gdpr-data-protection-controls

The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover

UncategorizedView skill →

implementing-gdpr-data-subject-access-request

>

UncategorizedView skill →

implementing-github-advanced-security-for-code-scanning

Configure GitHub Advanced Security with CodeQL to perform automated static analysis and vulnerability detection across repositories at enterprise scale.

UncategorizedView skill →

implementing-google-workspace-admin-security

>

UncategorizedView skill →

implementing-google-workspace-phishing-protection

Configure Google Workspace advanced phishing and malware protection settings including pre-delivery scanning, attachment protection, spoofing detection, and Enhanced Safe Browsing.

UncategorizedView skill →

implementing-google-workspace-sso-configuration

Configure SAML 2.0 single sign-on for Google Workspace with a third-party identity provider, enabling centralized authentication and enforcing organization-wide access policies.

UncategorizedView skill →

implementing-hardware-security-key-authentication

>

UncategorizedView skill →

implementing-hashicorp-vault-dynamic-secrets

>

UncategorizedView skill →

implementing-honeypot-for-ransomware-detection

>

UncategorizedView skill →

implementing-honeytokens-for-breach-detection

>

UncategorizedView skill →

implementing-ics-firewall-with-tofino

>

UncategorizedView skill →

implementing-identity-governance-with-sailpoint

Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle management, access request workflows, certification campaigns, role mining, SOD policy

UncategorizedView skill →

implementing-identity-verification-for-zero-trust

Implement continuous identity verification for zero trust using phishing-resistant MFA (FIDO2/WebAuthn), risk-based conditional access, and identity governance aligned with the CISA Zero Trust Maturity Model.

UncategorizedView skill →

implementing-iec-62443-security-zones

>

UncategorizedView skill →

implementing-image-provenance-verification-with-cosign

Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations, and Kubernetes admission enforcement.

UncategorizedView skill →

implementing-immutable-backup-with-restic

>

UncategorizedView skill →

implementing-infrastructure-as-code-security-scanning

>

UncategorizedView skill →

implementing-iso-27001-information-security-management

ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete

UncategorizedView skill →

implementing-just-in-time-access-provisioning

Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound access only when needed. This skill covers JIT architecture design, approval workflo

UncategorizedView skill →

implementing-jwt-signing-and-verification

JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization in web applications. This skill covers implementing secure JWT signing with HMAC-SHA256

UncategorizedView skill →

implementing-kubernetes-network-policy-with-calico

Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.

UncategorizedView skill →

implementing-kubernetes-pod-security-standards

Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admission (PSA) controller built into Kubernetes 1.25+. PS

UncategorizedView skill →

implementing-llm-guardrails-for-security

>

UncategorizedView skill →

implementing-log-forwarding-with-fluentd

Configure Fluentd and Fluent Bit for centralized log aggregation, routing, filtering, and enrichment across distributed infrastructure

UncategorizedView skill →

implementing-log-integrity-with-blockchain

>-

UncategorizedView skill →

implementing-memory-protection-with-dep-aslr

>

UncategorizedView skill →

implementing-microsegmentation-with-guardicore

>

UncategorizedView skill →

implementing-mimecast-targeted-attack-protection

Deploy Mimecast Targeted Threat Protection including URL Protect, Attachment Protect, Impersonation Protect, and Internal Email Protect to defend against advanced phishing and spearphishing attacks.

UncategorizedView skill →

implementing-mitre-attack-coverage-mapping

Implement MITRE ATT&CK coverage mapping to identify detection gaps, prioritize rule development, and measure SOC detection maturity against adversary techniques.

UncategorizedView skill →

implementing-mobile-application-management

>

UncategorizedView skill →

implementing-mtls-for-zero-trust-services

>

UncategorizedView skill →

implementing-nerc-cip-compliance-controls

>

UncategorizedView skill →

Page 16 of 41 · 2048 results