Private GKE cluster setup, Workload Identity, and Shielded Nodes with Binary Authorization using Terraform.
Generates Terraform configurations for secure GKE clusters with private control planes, Workload Identity, and Binary Authorization. Use when creating production-ready Kubernetes infrastructure on GCP.
/plugin marketplace add adaptive-enforcement-lab/claude-skills/plugin install secure@ael-skillsThis skill inherits all available tools. When active, it can use any tool Claude has access to.
scripts/example-1.shThis section covers the foundational security configurations for GKE clusters:
Public Cluster Risk
Public control planes expose your cluster API to the internet. Even with strong authentication, this increases attack surface and is not recommended for production.
gcloud CLI installed and authenticatedProduction Warning
These configurations enforce strict security controls. Test in QAC/DEV before production deployment.
Fundamental cluster security configuration covering private networking, identity federation, and image verification.
This section covers the foundational security configurations for GKE clusters:
Public Cluster Risk
Public control planes expose your cluster API to the internet. Even with strong authentication, this increases attack surface and is not recommended for production.
All configurations use Terraform for Infrastructure as Code, enabling:
gcloud CLI installed and authenticatedProduction Warning
These configurations enforce strict security controls. Test in QAC/DEV before production deployment.
See examples.md for detailed code examples.
This section covers the foundational security configurations for GKE clusters:
Public Cluster Risk
Public control planes expose your cluster API to the internet. Even with strong authentication, this increases attack surface and is not recommended for production.
All configurations use Terraform for Infrastructure as Code, enabling:
gcloud CLI installed and authenticatedProduction Warning
These configurations enforce strict security controls. Test in QAC/DEV before production deployment.
See examples.md for detailed code examples.
All configurations use Terraform for Infrastructure as Code, enabling:
Master authentication and authorization patterns including JWT, OAuth2, session management, and RBAC to build secure, scalable access control systems. Use when implementing auth systems, securing APIs, or debugging security issues.