4. Security & Compliance

24 skills

Found 3608 skills

Total Stars:1.6M
Avg Stars:450

scanning-for-data-privacy-issues

jeremylongshore

1.0K

Automatically scans code and configs for data privacy risks, including PII exposure and GDPR violations, to ensure compliance.

PII
GDPR
Privacy Audit
4. Security & Compliance

auditing-access-control

jeremylongshore

1.0K

Audits access control implementations for vulnerabilities and misconfigurations in IAM policies, ACLs, and access management to ensure security compliance.

IAM
ACL
Access Control
4. Security & Compliance

waf-rule-creator

jeremylongshore

1.0K

Creates and manages Web Application Firewall (WAF) rules for security protection. Automatically activates for Security Advanced operations.

WAF
Rule Creation
Security
4. Security & Compliance

scanning-for-data-privacy-issues

jeremylongshore

1.0K

Automatically scans code and configuration files for data privacy issues, detecting PII exposure and GDPR compliance violations.

PII
GDPR
Data Privacy
4. Security & Compliance

input-validation-checker

jeremylongshore

1.0K

Automates input validation checks to prevent common security vulnerabilities such as SQL injection and XSS.

Input Validation
XSS
SQL Injection
4. Security & Compliance

performing-security-testing

jeremylongshore

1.0K

Automates security vulnerability testing for applications and APIs, covering OWASP Top 10, SQL injection, and XSS.

OWASP
SQL Injection
XSS
4. Security & Compliance

license-compliance-scanner

jeremylongshore

1.0K

Automatically scans software dependencies for license compliance, ensuring adherence to legal and security standards.

License Compliance
Dependency Scanning
Security Audit
4. Security & Compliance

perplexity-enterprise-rbac

jeremylongshore

1.0K

Configures Single Sign-On (SSO), role-based access control (RBAC), and organization management for Perplexity Enterprise.

SSO
RBAC
SAML
4. Security & Compliance

audit-trail-helper

jeremylongshore

1.0K

Automates analysis and auditing of system audit trails to ensure security and compliance in enterprise workflows.

Audit Trail
Security Compliance
Enterprise Auditing
4. Security & Compliance

checking-hipaa-compliance

jeremylongshore

1.0K

Checks codebases, infrastructure, and documentation for HIPAA compliance violations related to data privacy and security.

HIPAA
Data Privacy
Compliance
4. Security & Compliance

vastai-data-handling

jeremylongshore

1.0K

Enforces PII data handling, retention policies, and GDPR/CCPA compliance for Vast.ai integrations to meet privacy regulations.

PII
GDPR
CCPA
4. Security & Compliance

langchain-security-basics

jeremylongshore

1.0K

Applies security best practices to LangChain applications, focusing on API key management, prompt injection prevention, and safe LLM interaction protocols.

LangChain
API Keys
Prompt Injection
4. Security & Compliance

sentry-policy-guardrails

jeremylongshore

1.0K

Enforces organizational standards and compliance rules for Sentry usage across teams, ensuring consistent configuration and adherence to policies.

Sentry
Compliance
Policy
4. Security & Compliance

checking-hipaa-compliance

jeremylongshore

1.0K

Automatically scans codebases, infrastructure, and documentation for HIPAA compliance violations related to data privacy, security, and access controls.

HIPAA
Compliance
Code Auditing
4. Security & Compliance

scanning-for-gdpr-compliance

jeremylongshore

1.0K

Scans applications and data systems for GDPR compliance, identifying violations in data protection, privacy rights, and consent management.

GDPR
Data Protection
Consent Management
4. Security & Compliance

log-analysis-security

jeremylongshore

1.0K

Performs security log analysis to detect threats and anomalies, enhancing monitoring and incident response capabilities.

Log Analysis
Security Monitoring
Threat Detection
4. Security & Compliance

firewall-rule-generator

jeremylongshore

1.0K

Automatically generates GCP firewall rules to secure network traffic and enforce security policies.

GCP
Firewall Rules
4. Security & Compliance

scanning-container-security

jeremylongshore

1.0K

Scans container images and running containers for vulnerabilities using Trivy and Snyk to identify security risks.

Trivy
Snyk
Container Security
4. Security & Compliance

incident-response-planner

jeremylongshore

1.0K

Automates creation and management of security incident response plans for rapid breach containment and compliance adherence.

Incident Response
Security Operations
Compliance
4. Security & Compliance

vastai-enterprise-rbac

jeremylongshore

1.0K

Configures enterprise SSO, role-based access control (RBAC), and organization management for Vast.ai platforms.

SSO
RBAC
Vast.ai
4. Security & Compliance

granola-security-basics

jeremylongshore

1.0K

Provides security best practices for Granola meeting data, including implementation of security controls and compliance with data protection policies.

Security Controls
Data Protection
Compliance
4. Security & Compliance

validating-cors-policies

jeremylongshore

1.0K

Validates CORS policies to identify security vulnerabilities, ensuring correct implementation and protection against unauthorized cross-origin requests.

CORS
Security Audit
Vulnerability Assessment
4. Security & Compliance

analyzing-security-headers

jeremylongshore

1.0K

Analyzes HTTP security headers to identify vulnerabilities, misconfigurations, and provide security recommendations for web applications.

CSP
HSTS
Security Audit
4. Security & Compliance

incident-response-planner

jeremylongshore

1.0K

Automates incident response planning configuration and activation for security teams within the Security Advanced framework.

Incident Response
Security Operations
Security Advanced
4. Security & Compliance
PreviousPage 9 of 151 PageNext