'Implements application whitelisting using Windows AppLocker to restrict unauthorized software execution on endpoints,
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →'Implements application whitelisting using Windows AppLocker to restrict unauthorized software execution on endpoints,
Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues
Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize
'Implements external attack surface management (EASM) using Shodan, Censys, and ProjectDiscovery tools (subfinder,
'Implementing AWS Config rules for continuous compliance monitoring of AWS resources, deploying managed and custom
Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege
Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine
'Implements AWS Nitro Enclave-based confidential computing environments with cryptographic attestation, KMS policy
'Implementing AWS Security Hub to aggregate security findings across AWS accounts, enable compliance standards
'This skill covers deploying AWS Security Hub as a centralized cloud security posture management platform that
Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows,
'Implementing Microsoft Defender for Cloud to enable cloud security posture management, workload protection across
'Implementing Google''s BeyondCorp zero trust access model to eliminate implicit trust from the network perimeter,
Implement BGP route origin validation using RPKI with Route Origin Authorizations, RPKI-to-Router protocol, and
'Deploys remote browser isolation (RBI) as a core component of a Zero Trust architecture. Implements isolation
'Deploys DNS, HTTP, and AWS API key canary tokens across network infrastructure to detect unauthorized access
Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications,
'Implementing Cloud Data Loss Prevention (DLP) using Amazon Macie, Azure Information Protection, and Google Cloud
'Implementing Cloud Security Posture Management (CSPM) to continuously monitor multi-cloud environments for misconfigurations,
'Implementing AWS CloudTrail log analysis for security monitoring, threat detection, and forensic investigation
Implement Cloud Security Posture Management using AWS Security Hub, Azure Defender for Cloud, and open-source
'This skill covers deploying and tuning Web Application Firewall rules on AWS WAF, Azure WAF, and Cloudflare
'Implements cloud workload protection using boto3 and google-cloud APIs for runtime security monitoring, process
'This skill covers implementing code signing for build artifacts to ensure integrity and authenticity throughout
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based
'Implement secure conduit architecture for OT remote access following IEC 62443 zones and conduits model, deploying
Reduce container attack surface by building application images on Google distroless base images that contain
Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control
Deploy Breach and Attack Simulation tools to continuously validate security control effectiveness by safely emulating
'Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange
Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin
Deploy and monitor Canary Tokens via the Thinkst Canary API for deception-based breach detection using web bug
'Implements Delinea Secret Server for privileged access management (PAM) including secret vault configuration,
'Implementing device posture assessment as a zero trust access control by integrating endpoint health signals
'Integrates Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software
The Diamond Model of Intrusion Analysis provides a structured framework for analyzing cyber intrusions by examining
Ed25519 is a high-performance digital signature algorithm using the Edwards curve Curve25519. It provides 128-bit
'Implements full disk encryption using Microsoft BitLocker on Windows endpoints to protect data at rest from
SPF, DKIM, and DMARC form the three pillars of email authentication. Together they prevent domain spoofing, validate
'Deploy and configure the Dragos Platform for OT network monitoring, leveraging its 600+ industrial protocol
'Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network
Email sandboxing detonates suspicious attachments and URLs in isolated environments to detect zero-day malware
End-to-end encryption (E2EE) ensures that only the communicating parties can read messages, with no intermediary
Deploy and configure Wazuh SIEM/XDR for endpoint detection including agent management, custom decoder and rule
'Implements endpoint Data Loss Prevention (DLP) controls to detect and prevent sensitive data exfiltration through
Envelope encryption is a strategy where data is encrypted with a data encryption key (DEK), and the DEK itself
Integrate FIRST's Exploit Prediction Scoring System (EPSS) API to prioritize vulnerability remediation based
Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation,
Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling,
Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested