Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points.
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Deploy Cisco Duo multi-factor authentication across enterprise applications, VPN, RDP, and SSH access points.
'Configuring Zscaler Private Access (ZPA) to replace traditional VPN with zero trust network access by deploying
'Deploys deception-based honeytokens in Active Directory including fake privileged accounts with AdminCount=1,
'Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications,
'Deploying Palo Alto Networks Prisma Access for SASE-based zero trust network access using GlobalProtect agents,
Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time
Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin
Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing
Detect unauthorized modifications to running containers by monitoring for binary execution drift, file system
Container escape is a critical attack technique where an adversary breaks out of container isolation to access
Detect container escape attempts in real-time using Falco runtime security rules that monitor syscalls, file
Detect compromised O365 and Google Workspace email accounts by analyzing inbox rule creation, suspicious sign-in
Detect malicious email forwarding rules created by adversaries to maintain persistent access to email communications
Detect Kerberoasting attacks by monitoring for anomalous Kerberos TGS requests targeting service accounts with
Detect adversary lateral movement across networks using Splunk SPL queries against Windows authentication logs,
Detect Living Off the Land Binaries (LOLBins/LOLBAS) abuse including certutil, regsvr32, mshta, and rundll32
'Detect malicious scheduled task creation and modification using Sysmon Event IDs 1 (Process Create for schtasks.exe),
Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where
Detect privilege escalation attempts including token manipulation, UAC bypass, unquoted service paths, kernel
Detect and prevent privilege escalation in Kubernetes pods by monitoring security contexts, capabilities, and
Detect abuse of service accounts through anomalous interactive logons, privilege escalation, lateral movement,
Detect unauthorized SaaS and cloud service usage (shadow IT) by analyzing proxy logs, DNS query logs, and netflow
'Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using
Detect C2 beaconing patterns in network traffic using frequency analysis, jitter detection, and domain reputation
Hunt for data exfiltration through network traffic analysis, detecting unusual data flows, DNS tunneling, cloud
Detect data staging activity before exfiltration by monitoring for archive creation with 7-Zip/RAR, unusual temp
Detect DCSync attacks by analyzing Windows Event ID 4662 for unauthorized DS-Replication-Get-Changes requests
Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse,
Hunt for adversary abuse of legitimate cloud services for C2, data staging, and exfiltration including abuse
Hunt for adversary persistence through Windows Management Instrumentation event subscriptions by monitoring WMI
Hunt for registry-based persistence mechanisms including Run keys, Winlogon modifications, IFEO injection, and
Hunt for adversary persistence via Windows Scheduled Tasks by analyzing task creation events, suspicious task
Hunt for Volume Shadow Copy deletion activity that indicates ransomware preparation or anti-forensics by monitoring
Detect T1547.001 startup folder persistence by monitoring Windows startup directories for suspicious file creation,
Hunt for supply chain compromise indicators including trojanized software updates, compromised dependencies,
Hunt for adversary persistence and execution via Windows scheduled tasks by analyzing task creation events, suspicious
Hunt for MITRE ATT&CK T1098 account manipulation including shadow admin creation, SID history injection, group
Hunt for unusual network connections by analyzing outbound traffic patterns, rare destinations, non-standard
Detect suspicious Windows service installations (MITRE ATT&CK T1543.003) by parsing System event logs for Event
Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues
Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege
Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine
Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows,
Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications,
Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source
Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control
Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating
The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining
'Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network