Found 699 skills for "mukul975" Page 15 of 59

implementing-jwt-signing-and-verification

JSON Web Tokens (JWT) defined in RFC 7519 are compact, URL-safe tokens used for authentication and authorization in web applications. This skill cover...

github 8 files

implementing-network-deception-with-honeypots

When deploying deception technology to detect lateral movement To create early warning indicators for network intrusion During security architecture d...

github 4 files

implementing-google-workspace-sso-configuration

Single Sign-On (SSO) for Google Workspace allows organizations to authenticate users through their existing identity provider (IdP) such as Okta, Azur...

github 8 files

implementing-honeytokens-for-breach-detection

When deploying or configuring implementing honeytokens for breach detection capabilities in your environment When establishing security controls align...

github 4 files

implementing-identity-governance-with-sailpoint

Deploy SailPoint IdentityNow or IdentityIQ for identity governance and administration. Covers identity lifecycle management, access request workflows,...

github 4 files

implementing-google-workspace-admin-security

Deploying or hardening a Google Workspace environment for enterprise use CIS benchmark compliance assessment for Google Workspace configuration Protec...

github 4 files

implementing-kubernetes-network-policy-with-calico

Calico is an open-source CNI plugin that provides fine-grained network policy enforcement for Kubernetes clusters. It implements the full Kubernetes N...

github 8 files

implementing-llm-guardrails-for-security

Deploying a new LLM-powered application that processes user input and needs input/output safety controls Adding content policy enforcement to an exist...

github 4 files

implementing-conduit-security-for-ot-remote-access

When replacing direct VPN connections from IT or vendors into OT control networks When implementing IEC 62443-compliant conduit architecture for remot...

github 4 files

implementing-continuous-security-validation-with-bas

Breach and Attack Simulation (BAS) is an automated, continuous approach to validating security control effectiveness by safely executing real-world at...

github 8 files

implementing-file-integrity-monitoring-with-aide

AIDE (Advanced Intrusion Detection Environment) is a host-based intrusion detection system that monitors file and directory integrity using cryptograp...

github 4 files

implementing-aqua-security-for-container-scanning

Aqua Security provides Trivy, the world's most popular open-source universal security scanner, designed to find vulnerabilities, misconfigurations, se...

github 8 files