Back to tags
Tag

Agent Skills with tag: cloud-security

16 skills match this tag. Use tags to discover related Agent Skills and explore similar workflows.

secure-multi-tenancy-isolation

Ensure secure isolation between multi-tenant consciousness instances.

multi-tenancyisolationcloud-securityaccess-control
starwreckntx
starwreckntx
1

aws-security-best-practices

Implement comprehensive AWS security controls and compliance

AWScloud-securitycomplianceaccess-control
pluginagentmarketplace
pluginagentmarketplace
1

infrastructure-security

Securing AI/ML infrastructure including model storage, API endpoints, and compute resources

infrastructure-securitycloud-securityapi-securitymodel-storage
pluginagentmarketplace
pluginagentmarketplace
1

cloud-skill

Cloud infrastructure with AWS, Azure, GCP - architecture, services, security, and cost optimization.

AWSAzureGCPcloud-infrastructure
pluginagentmarketplace
pluginagentmarketplace
2

talos-os-expert

Elite Talos Linux expert specializing in immutable Kubernetes OS, secure cluster deployment, machine configurations, talosctl CLI operations, upgrades, and production-grade security hardening. Expert in Talos 1.6+, secure boot, disk encryption, and zero-trust infrastructure. Use when deploying Talos clusters, configuring machine configs, troubleshooting node issues, or implementing security best practices.

kubernetescluster-managementcloud-securitytalosctl
martinholovsky
martinholovsky
92

security-practices

Modern security standards including Zero Trust Architecture, supply chain security, DevSecOps integration, and cloud-native protection

zero-trust-architecturesupply-chain-securitydevsecopscloud-security
williamzujkowski
williamzujkowski
11

security-reviewer

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews. Keywords: security review, vulnerability, SAST, audit, penetration testing, cloud security.

vulnerability-scanningpenetration-testingstatic-analysiscloud-security
Jeffallan
Jeffallan
245

cloud-security-configuration

Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat detection.

cloud-securityIAMAWSAzure
aj-geddes
aj-geddes
301

secrets-management

Implement secrets management with HashiCorp Vault, AWS Secrets Manager, or Kubernetes Secrets for secure credential storage and rotation.

api-key-managementcloud-securityhashicorp-vaultaws-secrets-manager
aj-geddes
aj-geddes
301

aws-ec2-setup

Launch and configure EC2 instances with security groups, IAM roles, key pairs, AMIs, and auto-scaling. Use for virtual servers and managed infrastructure.

awsec2iamauto-scaling
aj-geddes
aj-geddes
301

aws-cloudfront-cdn

Distribute content globally using CloudFront with caching, security headers, WAF integration, and origin configuration. Use for low-latency content delivery.

awscloudfrontcdncaching
aj-geddes
aj-geddes
301

cloudflare-turnstile

|

web-securitycloud-securityapi-key-managementbot-mitigation
jezweb
jezweb
13119

secrets-manager

AWS Secrets Manager for secure secret storage and rotation. Use when storing credentials, configuring automatic rotation, managing secret versions, retrieving secrets in applications, or integrating with RDS.

awsiamcloud-securityapi-key-management
itsmostafa
itsmostafa
933415

Security Scanning Tools

This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detect malware", "check cloud security", or "evaluate system compliance". It provides comprehensive guidance on security scanning tools and methodologies.

vulnerability-scanningnetwork-scanningweb-application-securitymalware-detection
zebbern
zebbern
2,951263

AWS Penetration Testing

This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata SSRF", "Lambda exploitation", or needs guidance on Amazon Web Services security assessment.

AWScloud-securitypenetration-testingIAM
zebbern
zebbern
2,951263

Cloud Penetration Testing

This skill should be used when the user asks to "perform cloud penetration testing", "assess Azure or AWS or GCP security", "enumerate cloud resources", "exploit cloud misconfigurations", "test O365 security", "extract secrets from cloud environments", or "audit cloud infrastructure". It provides comprehensive techniques for security assessment across major cloud platforms.

penetration-testingcloud-securityAWSAzure
zebbern
zebbern
2,951263