70 results (3.1ms) page 3 / 4
404kidwiz / claude-supercode-skills-compliance-auditor exact

Specialized auditor for SOC2, HIPAA, GDPR, and regulatory compliance frameworks across industries

aj-geddes / useful-ai-prompts-security-compliance-audit exact

Conduct comprehensive security compliance audits for SOC 2, GDPR, HIPAA, PCI-DSS, and ISO 27001. Use when preparing for certification, annual audits, or compliance validation.

DauQuangThanh / hanoi-rainbow-alibaba-cloud exact

Provides comprehensive Alibaba Cloud (Aliyun) guidance including ECS, ApsaraDB, OSS, SLB, VPC, RAM, ACK (Kubernetes), Function Compute, API Gateway, CDN, and monitoring services. Covers...

RLGeeX / rlg-copilot-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

wshobson / agents-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

rmyndharis / antigravity-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

halay08 / fullstack-agent-skills-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

404kidwiz / agent-skills-backup-k8s-security-policies exact

Implement Kubernetes security policies including NetworkPolicy, PodSecurityPolicy, and RBAC for production-grade security. Use when securing Kubernetes clusters, implementing network isolation, or...

DonggangChen / antigravity-agentic-skills-better-auth exact

The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA, passkeys, and user session management. Secure your application with RBAC and...

vuralserhat86 / antigravity-agentic-skills-better-auth exact

The ultimate authentication and authorization skill. Implement login, signin, signup, registration, OAuth, 2FA, MFA, passkeys, and user session management. Secure your application with RBAC and...

bitwize-music-studio / claude-ai-music-skills-researchers-financial exact

SEC filings, earnings calls, analyst reports, market data

aj-geddes / useful-ai-prompts-cloud-security-configuration exact

Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat detection.

maxvaega / awesome-skills-business-plan-advisor exact

Expert business planning consultant for creating comprehensive, investor-ready business plans from scratch or refining existing plans. Use when users request help creating a new business plan,...

aj-geddes / useful-ai-prompts-security-documentation exact

Create security policies, guidelines, compliance documentation, and security best practices. Use when documenting security policies, compliance requirements, or security guidelines.

eddiebe147 / claude-settings-vendor-manager exact

Manage vendor relationships, track performance, negotiate contracts, and optimize procurement

halay08 / fullstack-agent-skills-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

sickn33 / antigravity-awesome-skills-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...

ngxtm / devkit-top-100-web-vulnerabilities-reference exact

This skill should be used when the user asks to "identify web application vulnerabilities", "explain common security flaws", "understand vulnerability categories", "learn about injection attacks",...