Search Skills
Search across 54932 indexed skills
implementing-jwt-signing-and-verification
JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization in web applications. This skill cover...
implementing-network-deception-with-honeypots
When deploying deception technology to detect lateral movement To create early warning indicators for network intrusion During security architecture d...
implementing-google-workspace-sso-configuration
Single Sign-On (SSO) for Google Workspace allows organizations to authenticate users through their existing identity provider (IdP) such as Okta, Azur...
implementing-honeytokens-for-breach-detection
When deploying or configuring implementing honeytokens for breach detection capabilities in your environment When establishing security controls align...
implementing-identity-governance-with-sailpoint
Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle management, access request workflows,...
implementing-google-workspace-admin-security
Deploying or hardening a Google Workspace environment for enterprise use CIS benchmark compliance assessment for Google Workspace configuration Protec...
implementing-kubernetes-network-policy-with-calico
Calico is an open-source CNI plugin that provides fine-grained network policy enforcement for Kubernetes clusters. It implements the full Kubernetes N...
implementing-llm-guardrails-for-security
Deploying a new LLM-powered application that processes user input and needs input/output safety controls Adding content policy enforcement to an exist...
implementing-conduit-security-for-ot-remote-access
When replacing direct VPN connections from IT or vendors into OT control networks When implementing IEC 62443-compliant conduit architecture for remot...
implementing-continuous-security-validation-with-bas
Breach and Attack Simulation (BAS) is an automated, continuous approach to validating security control effectiveness by safely executing real-world at...
implementing-file-integrity-monitoring-with-aide
AIDE (Advanced Intrusion Detection Environment) is a host-based intrusion detection system that monitors file and directory integrity using cryptograp...
implementing-aqua-security-for-container-scanning
Aqua Security provides Trivy, the world's most popular open-source universal security scanner, designed to find vulnerabilities, misconfigurations, se...