4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

lindy-enterprise-rbac

jeremylongshore

1.0K

Configures role-based access control (RBAC) for enterprise teams in Lindy AI, enabling secure management of permissions and access policies.

RBAC
Enterprise Security
4. Security & Compliance

performing-security-code-review

jeremylongshore

1.0K

Conducts security-focused code reviews to identify vulnerabilities like SQL injection, XSS, and authentication flaws, providing severity ratings and remediation guidance.

SQL Injection
XSS
Code Auditing
4. Security & Compliance

scanning-for-gdpr-compliance

jeremylongshore

1.0K

Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management to generate detailed reports.

GDPR
Data Privacy
Compliance Audit
4. Security & Compliance

generating-compliance-reports

jeremylongshore

1.0K

Generates automated compliance reports for security standards including PCI DSS, HIPAA, SOC 2, and ISO 27001.

PCI DSS
HIPAA
SOC 2
4. Security & Compliance

gamma-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise role-based access control (RBAC) for Gamma integrations, enabling secure team permissions and multi-tenant authorization patterns.

RBAC
Gamma
Multi-tenant
4. Security & Compliance

windsurf-data-handling

jeremylongshore

1.0K

Enforces GDPR and CCPA compliance for Windsurf integrations through PII handling, data retention, and redaction policies.

GDPR
CCPA
PII
4. Security & Compliance

retellai-webhooks-events

jeremylongshore

1.0K

Provides secure handling of Retell AI webhook events via signature verification to prevent spoofing and unauthorized access.

Retell AI
Webhook Signature
Event Handling
4. Security & Compliance

sentry-data-handling

jeremylongshore

1.0K

Configures Sentry for GDPR compliance, PII scrubbing, and secure data handling to protect sensitive information.

PII
GDPR
Data Retention
4. Security & Compliance

log-analysis-security

jeremylongshore

1.0K

Automates security log analysis to detect threats and anomalies in real-time for enhanced security monitoring.

Log Analysis
Security Monitoring
Anomaly Detection
4. Security & Compliance

supabase-data-handling

jeremylongshore

1.0K

Enables GDPR/CCPA compliance for Supabase by implementing PII handling, data retention, and redaction patterns for sensitive data.

Supabase
GDPR
CCPA
4. Security & Compliance

instantly-data-handling

jeremylongshore

1.0K

Automates PII handling, data retention, and GDPR/CCPA compliance for data integrations, ensuring regulatory adherence.

PII
GDPR
CCPA
4. Security & Compliance

kubernetes-rbac-analyzer

jeremylongshore

1.0K

Analyzes Kubernetes RBAC configurations to identify security misconfigurations and access control risks in cluster environments.

Kubernetes
RBAC
Security Auditing
4. Security & Compliance

deepgram-enterprise-rbac

jeremylongshore

1.0K

Configures role-based access control (RBAC) for Deepgram enterprise integrations, managing team permissions and API key scopes.

RBAC
Deepgram
Enterprise
4. Security & Compliance

iso27001-gap-analyzer

jeremylongshore

1.0K

Automatically identifies and analyzes gaps in security management systems against ISO 27001 standards for compliance verification.

ISO 27001
Gap Analysis
Compliance
4. Security & Compliance

granola-data-handling

jeremylongshore

1.0K

Manages data exports, retention policies, and GDPR compliance for Granola data management systems.

GDPR
Data Retention
Data Export
4. Security & Compliance

zero-trust-config-helper

jeremylongshore

1.0K

Automates Zero Trust security configuration for network and application access policies.

Zero Trust
Security Configuration
Compliance
4. Security & Compliance

iam-binding-creator

jeremylongshore

1.0K

Automates creation of IAM bindings in GCP to define resource access permissions and enforce security policies.

GCP
IAM
Access Control
4. Security & Compliance

scanning-for-secrets

jeremylongshore

1.0K

Scans code repositories for exposed secrets, API keys, and credentials to prevent security breaches during audits.

Secret Scanning
Code Auditing
Credential Leakage
4. Security & Compliance

encrypting-and-decrypting-data

jeremylongshore

1.0K

Enables secure encryption and decryption of data using various algorithms to protect sensitive information and ensure confidentiality.

Encryption
Data Confidentiality
4. Security & Compliance

analyzing-dependencies

jeremylongshore

1.0K

Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance issues across npm, pip, composer, gem, and go modules.

Dependency Scanning
Vulnerability Assessment
License Compliance
4. Security & Compliance

rate-limiter-config

jeremylongshore

1.0K

Automatically sets up rate limiting configurations to prevent abuse and maintain service stability.

Rate Limiting
API Security
Throttling
4. Security & Compliance

threat-model-creator

jeremylongshore

1.0K

Generates threat models to identify and mitigate security threats in system architecture.

Threat Modeling
Security Analysis
4. Security & Compliance

retellai-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Retell AI platforms.

SSO
RBAC
SAML
4. Security & Compliance

cloud-security-posture

jeremylongshore

1.0K

Manages cloud security posture operations, activated by triggers like 'cloud security posture' and 'cloud posture' for Security Advanced.

Cloud Security
Security Posture
4. Security & Compliance
PreviousPage 17 of 151 PageNext