Login
Download
Skill UI
Browse and discover
7282+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Compliance
, found
402
results
Default
Newest
Most Downloaded
BitLocker Disk Encryption
implementing-disk-encryption-with-bitlocker
mukul975/Anthropic-Cybersecurity-Skills
311
Implements full BitLocker disk encryption on Windows endpoints, covering TPM validation, GPO tuning, Intune deployment, recovery key escrow, and monitoring to help enterprises meet compliance and protect data at rest.
View Details
Email Authentication Hardening
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
281
Implement SPF, DKIM, and DMARC to stop domain spoofing, verify message integrity, and enforce handling policies; ideal for teams configuring DNS/email servers and monitoring compliance.
View Details
Envelope Encryption With AWS KMS
implementing-envelope-encryption-with-aws-kms
mukul975/Anthropic-Cybersecurity-Skills
219
Walks through setting up AWS KMS envelope encryption so you can generate DEKs, encrypt/decrypt data locally with AES-256-GCM, cache keys, and rotate master keys while maintaining compliance controls in cloud security deployments.
View Details
AIDE File Integrity Monitoring
implementing-file-integrity-monitoring-with-aide
mukul975/Anthropic-Cybersecurity-Skills
380
Configure AIDE on Linux hosts to build baseline databases, run scheduled integrity checks, parse change reports, and generate alerts and compliance summaries for added, removed, or modified files.
View Details
GCP Organization Policy Guards
implementing-gcp-organization-policy-constraints
mukul975/Anthropic-Cybersecurity-Skills
490
Implement GCP Organization Policy constraints to enforce security guardrails across an entire resource hierarchy, restricting risky configurations, enforcing encryption, and auditing compliance programmatically at organization, folder, and project scopes.
View Details
GDPR Data Protection Controls
implementing-gdpr-data-protection-controls
mukul975/Anthropic-Cybersecurity-Skills
330
Guides teams through implementing the GDPR technical and organizational controls—from data mapping and DPIAs to encryption, access, consent, and breach processes—so compliance and protection scale with deployments.
View Details
GitHub Advanced Security Scanning
implementing-github-advanced-security-for-code-scanning
mukul975/Anthropic-Cybersecurity-Skills
79
Implements GitHub Advanced Security with CodeQL to provide automated static analysis, secret detection, dependency review, and push protection across repositories, enabling enterprise-scale vulnerability monitoring and compliance-aligned controls.
View Details
Implementing Identity Governance
implementing-identity-governance-with-sailpoint
mukul975/Anthropic-Cybersecurity-Skills
204
Deploy SailPoint IdentityNow or IdentityIQ to automate identity lifecycle management, access requests, certification campaigns, role mining, and SoD enforcement while generating compliance-ready reporting for enterprise IAM environments.
View Details
Kubernetes Pod Security
implementing-kubernetes-pod-security-standards
mukul975/Anthropic-Cybersecurity-Skills
128
Implements Kubernetes Pod Security Standards via Pod Security Admission policies, covering privileged, baseline, and restricted profiles plus enforcement modes for deploying secure namespaces and workloads in clusters that require compliance and risk control.
View Details
NERC CIP Compliance Controls
implementing-nerc-cip-compliance-controls
mukul975/Anthropic-Cybersecurity-Skills
352
Provides a structured approach for implementing NERC CIP compliance controls across BES cyber systems, covering categorization, electronic security perimeters, security and configuration management, supply chain risk, and the 2025 MFA plus low-impact asset updates.
View Details
Cisco ISE Network Access Control
implementing-network-access-control-with-cisco-ise
mukul975/Anthropic-Cybersecurity-Skills
472
Guide to deploying Cisco Identity Services Engine for wired and wireless 802.1X, MAC Authentication Bypass, posture compliance, and dynamic VLAN and SGT policies for enterprise network access control.
View Details
Kubernetes Network Policy Guide
implementing-network-policies-for-kubernetes
mukul975/Anthropic-Cybersecurity-Skills
174
Documents how to enforce Kubernetes NetworkPolicies using CNI plugins to establish default-deny, service-specific, namespace-aware, egress, and metadata protections, helping teams segment pods for hardened clusters and compliance-driven deployments.
View Details
Prev
1
2
3
...
25
26
27
28
29
30
31
32
33
34
Next
Language
简体中文
English