Search Skills
Search across 54932 indexed skills
implementing-security-information-sharing-with-stix2
Build and share structured threat intelligence using STIX 2.1 objects with the stix2 Python library and TAXII 2.1 transport protocol. Building a threa...
implementing-soar-playbook-with-palo-alto-xsoar
Cortex XSOAR (formerly Demisto) is Palo Alto Networks' Security Orchestration, Automation, and Response platform. Playbooks are the core automation en...
implementing-rbac-hardening-for-kubernetes
Kubernetes RBAC regulates access to cluster resources based on roles assigned to users, groups, and service accounts. Default configurations often gra...
implementing-siem-correlation-rules-for-apt
When deploying or configuring implementing siem correlation rules for apt capabilities in your environment When establishing security controls aligned...
implementing-pam-for-database-access
Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL. Covers session proxy configuration, cred...
implementing-pod-security-admission-controller
Pod Security Admission (PSA) is a built-in Kubernetes admission controller (stable since v1.25) that enforces Pod Security Standards at the namespace ...
implementing-privileged-session-monitoring
Deploying or configuring session recording for all privileged access to critical servers and databases Meeting compliance requirements (PCI-DSS 10.2, ...
implementing-rapid7-insightvm-for-scanning
Rapid7 InsightVM (formerly Nexpose) is an enterprise vulnerability management platform that combines on-premises scanning via Security Console and Sca...
implementing-iec-62443-security-zones
When designing a greenfield OT network architecture for a new industrial facility When retrofitting security zones into an existing flat OT network af...
implementing-kubernetes-pod-security-standards
Pod Security Standards (PSS) define three levels of security policies -- Privileged, Baseline, and Restricted -- enforced by the Pod Security Admissio...
implementing-memory-protection-with-dep-aslr
Use this skill when hardening endpoints against memory-based exploits by configuring DEP, ASLR, CFG, and Windows Exploit Protection system-wide and pe...
implementing-devsecops-security-scanning
Setting up automated security scanning in a new or existing CI/CD pipeline Shifting security left by catching vulnerabilities before code reaches prod...