Search Skills
Search across 54932 indexed skills
implementing-cloud-dlp-for-data-protection
When compliance frameworks (GDPR, HIPAA, PCI DSS) require automated sensitive data discovery and protection When building data governance programs tha...
implementing-aws-config-rules-for-compliance
When establishing continuous compliance monitoring for AWS resources against regulatory standards When implementing automated detection and remediatio...
detecting-typosquatting-packages-in-npm-pypi
Auditing project dependencies to identify packages whose names are suspiciously similar to popular libraries Proactively scanning package registries f...
implementing-conditional-access-policies-azure-ad
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device complianc...
configuring-identity-aware-proxy-with-google-iap
When protecting Google Cloud applications (App Engine, Cloud Run, GKE, Compute Engine) with identity-based access When implementing context-aware acce...
analyzing-active-directory-acl-abuse
Active Directory Access Control Lists (ACLs) define permissions on AD objects through Discretionary Access Control Lists (DACLs) containing Access Con...
implementing-zero-standing-privilege-with-cyberark
Zero Standing Privileges (ZSP) is a security model where no user or identity retains persistent privileged access. Instead, elevated access is provisi...
detecting-supply-chain-attacks-in-ci-cd
When investigating security incidents that require detecting supply chain attacks in ci cd When building detection rules or threat hunting queries for...
implementing-canary-tokens-for-network-intrusion
When deploying deception-based tripwires across network infrastructure to detect intrusions When building early warning systems that alert on unauthor...
implementing-ransomware-kill-switch-detection
Analyzing a ransomware sample to determine if it contains a kill switch mechanism (mutex, domain, registry) Deploying proactive mutex vaccination acro...
implementing-ot-incident-response-playbook
When building OT-specific incident response procedures for the first time When existing IT IR playbooks do not address ICS/SCADA-specific requirements...
detecting-azure-service-principal-abuse
Azure service principals are identity objects used by applications, services, and automation tools to access Azure resources. Attackers exploit servic...