Use when executing implementation plans with independent tasks in the current session
Use when executing implementation plans with independent tasks in the current session
Use when executing implementation plans with independent tasks in the current session
Use when executing implementation plans with independent tasks in the current session
Use when executing implementation plans with independent tasks in the current session
Validate software supply chain security with SBOM generation, dependency scanning, provenance verification, and SLSA attestation.
Use when executing implementation plans with independent tasks in the current session
Drive development using delegated agent workflows. Coordinates multi-agent task execution with proper supervision and result integration.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Comprehensive security assessment across application, cloud, container, IAM, network, OS, supply chain, and zero trust using NIST CSF 2.0.
Use when executing implementation plans with independent tasks in the current session
Use when designing multi-tenant OCI environments, setting up production landing zones, implementing compartment hierarchies, or establishing governance foundations. Covers Landing Zone reference...
Design zero-trust architectures with identity-centric security, micro-segmentation, continuous verification, and CISA ZTMM maturity assessment.
Grafana or CloudWatch dashboard definitions
>
>
Contrast ratios for text, focus indicators, UI components