Back to categories
Category

Agent Skills in category: Uncategorized

72246 skills match this category. Browse curated collections and explore related Agent Skills.

implementing-code-signing-for-artifacts

>

plurigrid
plurigrid
165

implementing-conditional-access-policies-azure-ad

Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device compliance requirements, risk-based authentication, named l

plurigrid
plurigrid
165

implementing-conduit-security-for-ot-remote-access

>

plurigrid
plurigrid
165

implementing-container-image-minimal-base-with-distroless

Reduce container attack surface by building application images on Google distroless base images that contain only the application runtime with no shell, package manager, or unnecessary OS utilities.

plurigrid
plurigrid
165

implementing-container-network-policies-with-calico

Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control pod-to-pod traffic, restrict egress, and implement zero-trust microsegmentation.

plurigrid
plurigrid
165

implementing-continuous-security-validation-with-bas

Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating real-world attack techniques across the kill chain.

plurigrid
plurigrid
165

implementing-data-loss-prevention-with-microsoft-purview

>

plurigrid
plurigrid
165

implementing-ddos-mitigation-with-cloudflare

Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin protection to mitigate volumetric, protocol, and application-layer attacks.

plurigrid
plurigrid
165

implementing-deception-based-detection-with-canarytoken

Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug tokens, DNS tokens, document tokens, and AWS key tokens.

plurigrid
plurigrid
165

implementing-delinea-secret-server-for-pam

>

plurigrid
plurigrid
165

implementing-device-posture-assessment-in-zero-trust

>

plurigrid
plurigrid
165

implementing-devsecops-security-scanning

>

plurigrid
plurigrid
165

implementing-diamond-model-analysis

>-

plurigrid
plurigrid
165

implementing-digital-signatures-with-ed25519

Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit security with 64-byte signatures and 32-byte keys, offering significant advantages ove

plurigrid
plurigrid
165

implementing-disk-encryption-with-bitlocker

>

plurigrid
plurigrid
165

implementing-dmarc-dkim-spf-email-security

SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate message integrity, and define policies for handling unauthenticated mail. Proper im

plurigrid
plurigrid
165

implementing-dragos-platform-for-ot-monitoring

>

plurigrid
plurigrid
165

implementing-ebpf-security-monitoring

>

plurigrid
plurigrid
165

implementing-email-sandboxing-with-proofpoint

Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware and evasive phishing payloads. Proofpoint Targeted Attack Protection (TAP) is an industry

plurigrid
plurigrid
165

implementing-end-to-end-encryption-for-messaging

End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary (including the server) able to decrypt them. This skill implements a simplified version

plurigrid
plurigrid
165

implementing-endpoint-detection-with-wazuh

Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule XML creation, alert querying via the Wazuh REST API, and automated response actions.

plurigrid
plurigrid
165

implementing-endpoint-dlp-controls

>

plurigrid
plurigrid
165

implementing-envelope-encryption-with-aws-kms

Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself is encrypted with a master key (KEK) managed by AWS KMS. This approach allows encrypting

plurigrid
plurigrid
165

implementing-epss-score-for-vulnerability-prioritization

Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based on real-world exploitation probability within 30 days.

plurigrid
plurigrid
165

implementing-file-integrity-monitoring-with-aide

Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation, scheduled integrity checks, change detection, and alerting

plurigrid
plurigrid
165

implementing-fuzz-testing-in-cicd-with-aflplusplus

Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling, and logic vulnerabilities in C/C++ and compiled applications.

plurigrid
plurigrid
165

implementing-gcp-binary-authorization

Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested container images are deployed to Google Kubernetes Engine and Cloud Run.

plurigrid
plurigrid
165

implementing-gcp-organization-policy-constraints

Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy, restricting risky configurations and ensuring compliance at organization, folder, and project levels.

plurigrid
plurigrid
165

implementing-gcp-vpc-firewall-rules

>

plurigrid
plurigrid
165

implementing-gdpr-data-protection-controls

The General Data Protection Regulation (EU) 2016/679 (GDPR) is the EU's comprehensive data protection law governing the collection, processing, storage, and transfer of personal data. This skill cover

plurigrid
plurigrid
165

implementing-gdpr-data-subject-access-request

>

plurigrid
plurigrid
165

implementing-github-advanced-security-for-code-scanning

Configure GitHub Advanced Security with CodeQL to perform automated static analysis and vulnerability detection across repositories at enterprise scale.

plurigrid
plurigrid
165

implementing-google-workspace-admin-security

>

plurigrid
plurigrid
165

implementing-google-workspace-phishing-protection

Configure Google Workspace advanced phishing and malware protection settings including pre-delivery scanning, attachment protection, spoofing detection, and Enhanced Safe Browsing.

plurigrid
plurigrid
165

implementing-google-workspace-sso-configuration

Configure SAML 2.0 single sign-on for Google Workspace with a third-party identity provider, enabling centralized authentication and enforcing organization-wide access policies.

plurigrid
plurigrid
165

implementing-hardware-security-key-authentication

>

plurigrid
plurigrid
165

implementing-hashicorp-vault-dynamic-secrets

>

plurigrid
plurigrid
165

implementing-honeypot-for-ransomware-detection

>

plurigrid
plurigrid
165

implementing-honeytokens-for-breach-detection

>

plurigrid
plurigrid
165

implementing-ics-firewall-with-tofino

>

plurigrid
plurigrid
165

implementing-identity-governance-with-sailpoint

Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle management, access request workflows, certification campaigns, role mining, SOD policy

plurigrid
plurigrid
165

implementing-identity-verification-for-zero-trust

Implement continuous identity verification for zero trust using phishing-resistant MFA (FIDO2/WebAuthn), risk-based conditional access, and identity governance aligned with the CISA Zero Trust Maturity Model.

plurigrid
plurigrid
165

implementing-iec-62443-security-zones

>

plurigrid
plurigrid
165

implementing-image-provenance-verification-with-cosign

Sign and verify container image provenance using Sigstore Cosign with keyless OIDC-based signing, attestations, and Kubernetes admission enforcement.

plurigrid
plurigrid
165

implementing-immutable-backup-with-restic

>

plurigrid
plurigrid
165

implementing-infrastructure-as-code-security-scanning

>

plurigrid
plurigrid
165

implementing-iso-27001-information-security-management

ISO/IEC 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). This skill covers the complete

plurigrid
plurigrid
165

implementing-just-in-time-access-provisioning

Implement Just-In-Time (JIT) access provisioning to eliminate standing privileges by granting temporary, time-bound access only when needed. This skill covers JIT architecture design, approval workflo

plurigrid
plurigrid
165

implementing-jwt-signing-and-verification

JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization in web applications. This skill covers implementing secure JWT signing with HMAC-SHA256

plurigrid
plurigrid
165

implementing-kubernetes-network-policy-with-calico

Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod communication.

plurigrid
plurigrid
165

Page 304 of 1445 · 72246 results