From cybersecurity-skills
Implements and audits Calico NetworkPolicy and GlobalNetworkPolicy in Kubernetes to control pod traffic, restrict egress, and enforce zero-trust microsegmentation using calicoctl and kubectl.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
Calico provides Kubernetes-native and extended network policy enforcement through its CNI plugin. This skill covers creating and auditing Calico NetworkPolicy and GlobalNetworkPolicy resources to implement pod-to-pod traffic control, namespace isolation, egress restrictions, and DNS-based policy rules using calicoctl and the Kubernetes API.
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Calico provides Kubernetes-native and extended network policy enforcement through its CNI plugin. This skill covers creating and auditing Calico NetworkPolicy and GlobalNetworkPolicy resources to implement pod-to-pod traffic control, namespace isolation, egress restrictions, and DNS-based policy rules using calicoctl and the Kubernetes API.
kubernetes client libraryUse calicoctl and kubectl to inventory current network policies and identify unprotected namespaces.
Create default-deny ingress and egress policies per namespace as a zero-trust baseline.
Define granular allow rules for legitimate pod-to-pod and pod-to-service communication.
Test connectivity between pods to verify policies are correctly enforced.
JSON audit report listing all network policies, unprotected namespaces, policy rule counts, and connectivity test results.