4. Security & Compliance
Found 3608 skills
lindy-enterprise-rbac
jeremylongshore
Configures role-based access control (RBAC) for enterprise teams in Lindy AI, enabling secure management of permissions and access policies.
performing-security-code-review
jeremylongshore
Conducts security-focused code reviews to identify vulnerabilities like SQL injection, XSS, and authentication flaws, providing severity ratings and remediation guidance.
scanning-for-gdpr-compliance
jeremylongshore
Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management to generate detailed reports.
generating-compliance-reports
jeremylongshore
Generates automated compliance reports for security standards including PCI DSS, HIPAA, SOC 2, and ISO 27001.
gamma-enterprise-rbac
jeremylongshore
Configures enterprise role-based access control (RBAC) for Gamma integrations, enabling secure team permissions and multi-tenant authorization patterns.
windsurf-data-handling
jeremylongshore
Enforces GDPR and CCPA compliance for Windsurf integrations through PII handling, data retention, and redaction policies.
retellai-webhooks-events
jeremylongshore
Provides secure handling of Retell AI webhook events via signature verification to prevent spoofing and unauthorized access.
sentry-data-handling
jeremylongshore
Configures Sentry for GDPR compliance, PII scrubbing, and secure data handling to protect sensitive information.
log-analysis-security
jeremylongshore
Automates security log analysis to detect threats and anomalies in real-time for enhanced security monitoring.
supabase-data-handling
jeremylongshore
Enables GDPR/CCPA compliance for Supabase by implementing PII handling, data retention, and redaction patterns for sensitive data.
instantly-data-handling
jeremylongshore
Automates PII handling, data retention, and GDPR/CCPA compliance for data integrations, ensuring regulatory adherence.
kubernetes-rbac-analyzer
jeremylongshore
Analyzes Kubernetes RBAC configurations to identify security misconfigurations and access control risks in cluster environments.
deepgram-enterprise-rbac
jeremylongshore
Configures role-based access control (RBAC) for Deepgram enterprise integrations, managing team permissions and API key scopes.
iso27001-gap-analyzer
jeremylongshore
Automatically identifies and analyzes gaps in security management systems against ISO 27001 standards for compliance verification.
granola-data-handling
jeremylongshore
Manages data exports, retention policies, and GDPR compliance for Granola data management systems.
zero-trust-config-helper
jeremylongshore
Automates Zero Trust security configuration for network and application access policies.
iam-binding-creator
jeremylongshore
Automates creation of IAM bindings in GCP to define resource access permissions and enforce security policies.
scanning-for-secrets
jeremylongshore
Scans code repositories for exposed secrets, API keys, and credentials to prevent security breaches during audits.
encrypting-and-decrypting-data
jeremylongshore
Enables secure encryption and decryption of data using various algorithms to protect sensitive information and ensure confidentiality.
analyzing-dependencies
jeremylongshore
Analyzes project dependencies for security vulnerabilities, outdated packages, and license compliance issues across npm, pip, composer, gem, and go modules.
rate-limiter-config
jeremylongshore
Automatically sets up rate limiting configurations to prevent abuse and maintain service stability.
threat-model-creator
jeremylongshore
Generates threat models to identify and mitigate security threats in system architecture.
retellai-enterprise-rbac
jeremylongshore
Configures enterprise Single Sign-On (SSO), role-based access control (RBAC), and organization management for Retell AI platforms.
cloud-security-posture
jeremylongshore
Manages cloud security posture operations, activated by triggers like 'cloud security posture' and 'cloud posture' for Security Advanced.