This skill provides comprehensive guidance on infrastructure as code architecture patterns, focusing on cross-cutting concerns that span all cloud providers and IaC tools. The Dredgen uses this skill to architect secure, compliant, cost-optimized, and maintainable infrastructure at enterprise scale.
/plugin marketplace add Lobbi-Docs/claude/plugin install iac-golden-architect@claude-orchestrationThis skill inherits all available tools. When active, it can use any tool Claude has access to.
examples/soc2-compliant-vpc.tfexamples/tagging-module.tfreferences/cost-optimization.mdreferences/repository-patterns.mdreferences/security-scanning.mdreferences/soc2-controls.mdreferences/tagging-strategy.mdThis skill provides comprehensive guidance on infrastructure as code architecture patterns, focusing on cross-cutting concerns that span all cloud providers and IaC tools. The Dredgen uses this skill to architect secure, compliant, cost-optimized, and maintainable infrastructure at enterprise scale.
This skill activates when discussions involve:
Encryption Standards
IAM Best Practices
Network Segmentation
Secrets Management
Security Scanning Integration
CC6.1 - Logical and Physical Access Controls
CC6.6 - Logical Access Security Measures
CC6.7 - Restriction of Logical Access
CC7.1 - Network Security
CC7.2 - Detection and Monitoring
Audit Trail Requirements
Tagging Strategies
Right-Sizing Patterns
Reserved Capacity
Spot/Preemptible Instances
Cost Allocation
Abstraction Layers
Provider-Agnostic Modules
Cross-Cloud Networking
Disaster Recovery
Monorepo vs Polyrepo
Monorepo Benefits:
Polyrepo Benefits:
Module Organization
terraform/
├── modules/ # Reusable modules
│ ├── compute/
│ ├── database/
│ ├── networking/
│ └── security/
├── environments/ # Environment configurations
│ ├── dev/
│ ├── staging/
│ └── prod/
├── shared/ # Shared resources
│ ├── dns/
│ ├── monitoring/
│ └── logging/
└── policies/ # Security policies
├── tfsec/
├── checkov/
└── sentinel/
Environment Separation
CI/CD Integration
soc2-controls.md - Complete SOC2 control mappingsecurity-scanning.md - Security scanner configurationstagging-strategy.md - Enterprise tagging standardsrepository-patterns.md - Repository organization patternscost-optimization.md - Cost control strategiessoc2-compliant-vpc.tf - SOC2-compliant VPC configurationtagging-module.tf - Reusable tagging modulesecurity-group-patterns.tf - Secure security group patternscost-tags.tf - Cost allocation tagging examplesWhen The Dredgen detects architectural discussions involving security, compliance, cost, or governance, this skill provides:
Infrastructure architecture is successful when:
Creating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create original visual designs, never copying existing artists' work to avoid copyright violations.