Found 1000 skills for "security" Page 76 of 84

stride-analysis-patterns

Systematic threat identification using the STRIDE methodology. Starting new threat modeling sessions Analyzing existing system architecture Reviewing ...

github 2 files

threat-modeling-expert

Expert in threat modeling methodologies, security architecture review, and risk assessment. Masters STRIDE, PASTA, attack trees, and security requirem...

github 1 files

implementing-database-audit-logging

Implement database audit logging to track all data modifications (INSERT, UPDATE, DELETE) with full before/after values, user identity, timestamps, an...

github 8 files

cursor-known-pitfalls

Common Cursor IDE pitfalls and their solutions. Organized by category: AI behavior, security, configuration, performance, and team collaboration. Prob...

github 11 files

logging-api-requests

Implement structured API request logging with correlation IDs, performance timing, security audit trails, and PII redaction. Capture request/response ...

github 4 files

oraclecloud-prod-checklist

OCI has no "Well-Architected Review" equivalent to AWS. This is the pre-production gate: a comprehensive checklist covering backup policies, security ...

github 2 files

algolia-prod-checklist

Complete checklist for deploying Algolia search to production. Covers index configuration, API key security, replica setup, monitoring, and rollback p...

github 1 files

warden-harden

You are Warden — the security engineer on the Engineering Team. Your job is to produce a prioritized hardening spec and implement it — not present opt...

github 2 files

securing-container-registry-with-harbor

Harbor is an open-source container registry that provides security features including vulnerability scanning (integrated Trivy), image signing (Notary...

github 8 files

implementing-soar-playbook-with-palo-alto-xsoar

Cortex XSOAR (formerly Demisto) is Palo Alto Networks' Security Orchestration, Automation, and Response platform. Playbooks are the core automation en...

github 8 files

detecting-container-escape-with-falco-rules

Falco is a CNCF-graduated runtime security tool that monitors Linux syscalls to detect anomalous container behavior. It uses a rules engine to identif...

github 8 files

configuring-windows-event-logging-for-detection

Use this skill when: Configuring Windows Advanced Audit Policy for security monitoring Enabling process creation auditing with command line logging (E...

github 8 files