Found 699 skills for "mukul975" Page 52 of 59

implementing-cloud-dlp-for-data-protection

When compliance frameworks (GDPR, HIPAA, PCI DSS) require automated sensitive data discovery and protection When building data governance programs tha...

github 4 files

implementing-aws-config-rules-for-compliance

When establishing continuous compliance monitoring for AWS resources against regulatory standards When implementing automated detection and remediatio...

github 4 files

detecting-typosquatting-packages-in-npm-pypi

Auditing project dependencies to identify packages whose names are suspiciously similar to popular libraries Proactively scanning package registries f...

github 4 files

implementing-conditional-access-policies-azure-ad

Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device complianc...

github 4 files

configuring-identity-aware-proxy-with-google-iap

When protecting Google Cloud applications (App Engine, Cloud Run, GKE, Compute Engine) with identity-based access When implementing context-aware acce...

github 8 files

analyzing-active-directory-acl-abuse

Active Directory Access Control Lists (ACLs) define permissions on AD objects through Discretionary Access Control Lists (DACLs) containing Access Con...

github 4 files

implementing-zero-standing-privilege-with-cyberark

Zero Standing Privileges (ZSP) is a security model where no user or identity retains persistent privileged access. Instead, elevated access is provisi...

github 8 files

detecting-supply-chain-attacks-in-ci-cd

When investigating security incidents that require detecting supply chain attacks in ci cd When building detection rules or threat hunting queries for...

github 4 files

implementing-canary-tokens-for-network-intrusion

When deploying deception-based tripwires across network infrastructure to detect intrusions When building early warning systems that alert on unauthor...

github 4 files

implementing-ransomware-kill-switch-detection

Analyzing a ransomware sample to determine if it contains a kill switch mechanism (mutex, domain, registry) Deploying proactive mutex vaccination acro...

github 4 files

implementing-ot-incident-response-playbook

When building OT-specific incident response procedures for the first time When existing IT IR playbooks do not address ICS/SCADA-specific requirements...

github 4 files

detecting-azure-service-principal-abuse

Azure service principals are identity objects used by applications, services, and automation tools to access Azure resources. Attackers exploit servic...

github 8 files