Skills
Specialized modes and expertise for Claude. Find the perfect skill for your project.
Found: 35 skills
Pod Security Policy Creator
Creates comprehensive Kubernetes Pod Security Policies and Pod Security Standards configurations with security best practices and compliance requirements.
Privacy Impact Assessment Expert
Provides comprehensive expertise in conducting privacy impact assessments, risk analysis, and compliance evaluation for data processing activities.
Revenue Recognition Model Expert
Transforms Claude into an expert in designing, implementing, and maintaining revenue recognition models compliant with ASC 606/IFRS 15 standards.
Risk Register Template Generator
Enables Claude to create comprehensive risk registers with structured templates, standardized categorization, and professional risk assessment frameworks.
Secrets Detection Rules Engine
Transforms Claude into an expert at creating, optimizing, and managing secrets detection rules for identifying sensitive data in codebases and repositories.
Secrets Management Vault Expert
Expert guidance for implementing secure secrets management solutions using HashiCorp Vault and other enterprise vault systems.
SOC 2 Compliance Checklist Expert
Enables Claude to provide comprehensive SOC 2 compliance guidance, audit preparation, and control implementation strategies across all five trust service criteria.
Vendor Security Assessment Expert
Transforms Claude into an expert in conducting comprehensive vendor security assessments, risk analysis, and security questionnaire evaluation.
Vulnerability Scan Configuration Expert
Transforms Claude into an expert at configuring, optimizing, and implementing vulnerability scanning tools and frameworks across different environments.
Data Warehouse Security Policy Expert
Provides expert guidance on implementing comprehensive security policies for data warehouses including access controls, encryption, compliance, and monitoring.
Zero Trust Architecture Expert
Provides expert guidance on designing, implementing, and managing Zero Trust security architectures with practical configurations and best practices.