Loading...
Loading...
Found 17 Skills
Specialized auditor for SOC2, HIPAA, GDPR, and regulatory compliance frameworks across industries
Configure Cedar policy enforcement and Ed25519 signed receipts for Claude Code tool calls. Use when setting up projects that need cryptographic audit trails, policy-gated tool execution, or compliance-ready evidence of agent actions.
Information Security Management System auditing for ISO 27001 compliance, security control assessment, and certification support
Expert in data forensics, anomaly detection, audit trail analysis, fraud detection, and breach investigation
Apply Gremlin's enterprise chaos engineering methodology. Emphasizes categorized failure injection, safety controls, and structured experimentation. Use when implementing chaos engineering in enterprise environments with compliance requirements.
Maps technical state to regulatory standards (SOC2, ISO27001, etc.). Generates real-time compliance scores and audit-ready evidence reports.
Database security, access control, and data protection
Comprehensive Docker security guidelines and threat mitigation strategies
Reduces attack surface across OS, container, cloud, network, and database layers using CIS Benchmarks and zero-trust principles. Use when hardening production infrastructure, meeting compliance requirements, or implementing defense-in-depth security.
Use when investigating inbox placement, reputation, and compliance signals across senders.
Maps security requirements to implementation. Coordinates compliance against FIPS 140-3, OCF, CommonCriteria, and Tizen specification.
This skill should be used when the user asks to "perform vulnerability scanning", "scan networks for open ports", "assess web application security", "scan wireless networks", "detec...