by wshobson
linkerd-patterns helps teams apply Linkerd patterns for Kubernetes workloads, including mTLS, sidecar injection, traffic splits, retries, timeouts, service profiles, and multi-cluster planning for Deployment-based rollouts.
by wshobson
linkerd-patterns helps teams apply Linkerd patterns for Kubernetes workloads, including mTLS, sidecar injection, traffic splits, retries, timeouts, service profiles, and multi-cluster planning for Deployment-based rollouts.
by wshobson
mtls-configuration is a practical guide to designing and using mutual TLS for service-to-service security, certificate trust, rotation, handshake debugging, and Access Control in zero-trust or multi-cluster environments.
by mukul975
The configuring-aws-verified-access-for-ztna skill helps you design and configure AWS Verified Access for VPN-less zero trust network access with identity and device posture checks in Cedar. Use this configuring-aws-verified-access-for-ztna guide for access control planning, trust providers, group policies, and endpoint setup.
by markdown-viewer
The security skill creates PlantUML security architecture diagrams with AWS stencils for identity, encryption, firewalling, compliance, and threat detection. Use it for IAM flows, zero-trust designs, encryption pipelines, Security Audit diagrams, and review-ready documentation. It is not meant for general cloud infrastructure or generic UML modeling.
by xixu-me
openclaw-secure-linux-cloud helps you install and use OpenClaw securely on a Linux cloud host with a private-first setup, loopback binding, SSH tunneling, Tailscale or reverse proxy tradeoffs, and tight defaults for Podman, token auth, pairing, sandboxing, and tool permissions.
by mukul975
Deploying-tailscale-for-zero-trust-vpn is a practical guide for planning a Tailscale zero-trust tailnet with identity-aware access controls, ACLs, subnet routing, exit nodes, and Headscale-aware deployment decisions. It helps admins and security teams move from setup ideas to a workable access model.
by mukul975
The deploying-palo-alto-prisma-access-zero-trust skill is a deployment-ready guide for Palo Alto Prisma Access zero trust access. It covers GlobalProtect users, ZTNA connectors, Strata Cloud Manager policy setup, prerequisites, and validation steps so you can plan and execute an enterprise rollout with less guesswork.
by mukul975
deploying-cloudflare-access-for-zero-trust skill for designing and auditing Cloudflare Access deployments with Cloudflare Tunnel, device posture checks, and per-app policies for zero trust access to internal apps, SSH, and private services.
by mukul975
The configuring-microsegmentation-for-zero-trust skill helps design and validate least-privilege workload-to-workload policies for zero trust environments. Use this guide to segment applications, reduce lateral movement, and turn observed traffic into enforceable rules for Security Audit and operations.