From cybersecurity-skills
Conducts NIST CSF 2.0 maturity assessments using Implementation Tiers to measure organizational cybersecurity posture across Govern, Identify, Protect, Detect, Respond, Recover functions and create roadmaps.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF, using the four Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive) to measure organizationa...
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
The NIST Cybersecurity Framework (CSF) 2.0, released in February 2024, provides a comprehensive taxonomy for managing cybersecurity risk through six core Functions: Govern, Identify, Protect, Detect, Respond, and Recover. This skill covers conducting a maturity assessment against the CSF, using the four Implementation Tiers (Partial, Risk-Informed, Repeatable, Adaptive) to measure organizational cybersecurity posture and create improvement roadmaps.
| Function | Code | Categories | Purpose |
|---|---|---|---|
| Govern | GV | 6 | Establish and monitor cybersecurity risk management strategy |
| Identify | ID | 3 | Determine current cybersecurity risk to the organization |
| Protect | PR | 5 | Implement safeguards to prevent or reduce risk |
| Detect | DE | 2 | Find and analyze possible cybersecurity attacks |
| Respond | RS | 4 | Take action regarding detected cybersecurity incidents |
| Recover | RC | 2 | Restore capabilities impaired by cybersecurity incidents |
| Tier | Name | Description |
|---|---|---|
| Tier 1 | Partial | Ad hoc, reactive; limited awareness of cybersecurity risk |
| Tier 2 | Risk-Informed | Risk-aware but not organization-wide; approved but may not be policy |
| Tier 3 | Repeatable | Formal policies; consistently implemented; regularly updated |
| Tier 4 | Adaptive | Continuous improvement; real-time risk response; lessons learned integrated |