network security

🌐 Network Security Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "network security" with this command: npx skills add hack23/homepage/hack23-homepage-network-security

🌐 Network Security Skill

🎯 Purpose

Enforce cloud-native network security with zero-trust architecture, based on Network Security Policy.

Key Principle: "The perimeter is dead. Long live zero-trust."

πŸ“š Scope

  • ☁️ Cloud-Native Protection (AWS-native services)

  • πŸ” Zero-Trust Architecture (never trust, always verify)

  • πŸ›‘οΈ Network Segmentation (VPC isolation, security groups)

  • πŸ”‘ VPN Requirements (secure remote access)

  • πŸ”₯ Firewall Rules (AWS WAF, security groups, NACLs)

βš™οΈ Security Rules

MUST Requirements

aws_vpc_architecture: network_design: multi_tier: [public_subnets, private_subnets, isolated_subnets] availability_zones: minimum_2_for_ha security_groups: default_deny_least_privilege nacls: additional_subnet_protection

zero_trust_controls: identity: iam_roles_with_mfa segmentation: micro_segmentation_per_workload encryption: tls_1_3_preferred_vpn_for_admin monitoring: cloudtrail_guardduty_flowlogs

aws_waf: managed_rules: [owasp_top_10, known_bad_inputs, ip_reputation] custom_rules: [rate_limiting, geo_blocking] logging: s3_with_90_day_retention

MUST NOT Prohibitions

prohibited:

  • public_databases: rds_in_public_subnets
  • unrestricted_sg: 0.0.0.0/0_for_admin_ports
  • default_vpc: production_in_default_vpc
  • disabled_monitoring: no_cloudtrail_or_flow_logs

πŸ’‘ Example: Three-Tier VPC

vpc_deployment: public_subnets: [alb, nat_gateway] private_subnets: [ec2_app_servers, lambda] isolated_subnets: [rds_database]

security_groups: alb_sg: inbound: [443_from_0.0.0.0/0, 80_redirect] outbound: [8080_to_app_sg] app_sg: inbound: [8080_from_alb_sg, 22_from_bastion] outbound: [5432_to_db_sg, 443_external_apis] db_sg: inbound: [5432_from_app_sg_only] outbound: deny_all

monitoring: vpc_flow_logs: enabled guardduty: active cloudwatch_alarms: configured

πŸ”— Integration

Policies: Network Security, Information Security

Frameworks: ISO 27001 A.8.20-23, NIST CSF PR.AC-05, CIS Control 12

πŸ“‹ Document Control

  • Version: 1.0 | Updated: 2026-02-10

  • License: Apache-2.0

  • Classification:

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

vulnerability-management

No summary provided by upstream source.

Repository SourceNeeds Review
Security

information-security-strategy

No summary provided by upstream source.

Repository SourceNeeds Review
Security

threat-modeling

No summary provided by upstream source.

Repository SourceNeeds Review
Security

agentic-workflow-security

No summary provided by upstream source.

Repository SourceNeeds Review