From irap
Australian IRAP (Information Security Registered Assessors Program) expert. Provides guidance on ISM controls, Essential Eight maturity levels, ACSC guidelines, and Australian data sovereignty requirements.
npx claudepluginhub abnejllc/grc --plugin irapThis skill is limited to using the following tools:
Expertise in Australian government cloud security based on ISM and Essential Eight.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Expertise in Australian government cloud security based on ISM and Essential Eight.
Authority: Australian Cyber Security Centre (ACSC) Base Standard: Information Security Manual (ISM) Key Framework: Essential Eight maturity model
Scope: Australian government agencies and contractors
| Level | Use Case | Residency |
|---|---|---|
| OFFICIAL | Routine business | No requirement |
| OFFICIAL:Sensitive | Personal info | Recommended AU |
| PROTECTED | Cabinet, national security | AU regions mandatory |
| SECRET | Intelligence | AU regions mandatory |
| TOP SECRET | Highest sensitivity | Dedicated infrastructure |
Maturity Levels:
Over 1,400 security controls organized by:
Region: ap-southeast-2 (Sydney) Requirement: PROTECTED data must stay in Australia
Process:
Assessors: ACSC-endorsed IRAP assessors