Login
Download
Skill UI
Browse and discover
6201+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
CI
, found
1846
results
Default
Newest
Most Downloaded
PCI DSS Compliance Implementation
implementing-pci-dss-compliance-controls
mukul975/Anthropic-Cybersecurity-Skills
455
Guides teams through PCI DSS 4.0.1 compliance controls from scoping to monitoring, covering enhanced authentication, logging, encryption, and governance to protect cardholder data before March 2025.
View Details
Policy Code Enforcement
implementing-policy-as-code-with-open-policy-agent
mukul975/Anthropic-Cybersecurity-Skills
62
Implements Open Policy Agent and Gatekeeper to codify Kubernetes and CI/CD policies, enabling admission control, constraint templates, and local testing via conftest for consistent security governance.
View Details
Azure Privileged Identity Management
implementing-privileged-identity-management-with-azure
mukul975/Anthropic-Cybersecurity-Skills
273
Configure Azure AD Privileged Identity Management via Microsoft Graph API to enumerate eligible and active assignments, request just-in-time activations, audit logs, and enforce MFA or approval policies for zero-trust privileged access scenarios.
View Details
Privileged Session Monitoring
implementing-privileged-session-monitoring
mukul975/Anthropic-Cybersecurity-Skills
437
Implements privileged session monitoring and recording with CyberArk PSM or open-source PAM tools, covering architecture routing, recording policies, keystroke logging, real-time alerts, and compliance-ready audit trails for privileged administrators.
View Details
Purdue Model Segmentation
implementing-purdue-model-network-segmentation
mukul975/Anthropic-Cybersecurity-Skills
190
Applies the Purdue Enterprise Reference Architecture to ICS/SCADA networks, mapping assets to hierarchical security zones, defining firewall/VLAN rules, and enforcing OT-to-IT DMZ controls so IEC 62443 requirements and defense-in-depth strategies are met.
View Details
Runtime Application Self-Protection
implementing-runtime-application-self-protection
mukul975/Anthropic-Cybersecurity-Skills
169
Deploy RASP agents inside Java or Python webapps to detect and block OWASP Top 10 attacks, tune policies, and feed telemetry into SIEMs for runtime visibility and compliance readiness.
View Details
Tetragon Runtime Security
implementing-runtime-security-with-tetragon
mukul975/Anthropic-Cybersecurity-Skills
333
Guide to deploying Cilium Tetragon to add eBPF-based runtime observability and policy enforcement in Kubernetes clusters, detecting kernel-level threats on processes, networks, and files while blocking attacks with TracingPolicies.
View Details
Okta SCIM Provisioning Setup
implementing-scim-provisioning-with-okta
mukul975/Anthropic-Cybersecurity-Skills
337
Guide for building a SCIM 2.0 API and wiring it to Okta so you can automate provisioning, deprovisioning, profile sync, and group management for your user lifecycle and compliance workflows.
View Details
Gitleaks Secret Scanning
implementing-secret-scanning-with-gitleaks
mukul975/Anthropic-Cybersecurity-Skills
156
Guide to setting up Gitleaks for detecting and preventing hardcoded secrets via pre-commit hooks, CI/CD pipelines, custom rules, baselines, and remediation workflows in git repositories.
View Details
Vault Secrets Management
implementing-secrets-management-with-vault
mukul975/Anthropic-Cybersecurity-Skills
460
Deploy and configure HashiCorp Vault across clouds to replace hardcoded credentials with dynamic secrets, integrate with Kubernetes, CI/CD, and cloud providers, and enforce centralized auditing and auto-rotation for databases and IAM keys.
View Details
Secrets Scanning Pipeline
implementing-secrets-scanning-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
80
Implements automated secrets scanning in CI/CD pipelines using gitleaks and trufflehog, blocking deployments with high-severity leaks before they reach production while producing structured JSON reports for triage.
View Details
Custom Semgrep SAST Rules
implementing-semgrep-for-custom-sast-rules
mukul975/Anthropic-Cybersecurity-Skills
485
Define YAML-based Semgrep custom SAST rules to catch application-specific vulnerabilities, enforce coding standards, and plug into CI/CD pipelines for consistent security testing across supported languages.
View Details
Prev
1
2
3
...
132
133
134
135
136
137
138
...
152
153
154
Next
Language
简体中文
English