defense-in-depth

┌─────────────────────────────────┐ │ Perimeter Security │ WAF, DDoS Protection ├─────────────────────────────────┤ │ Network Security │ Firewalls, VPNs, Segmentation ├─────────────────────────────────┤ │ Host Security │ OS Hardening, Patching ├─────────────────────────────────┤ │ Application Security │ AuthN, AuthZ, Input Validation ├─────────────────────────────────┤ │ Data Security │ Encryption, Access Control └─────────────────────────────────┘

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "defense-in-depth" with this command: npx skills add dralgorhythm/claude-agentic-framework/dralgorhythm-claude-agentic-framework-defense-in-depth

Defense in Depth

Security Layers

┌─────────────────────────────────┐ │ Perimeter Security │ WAF, DDoS Protection ├─────────────────────────────────┤ │ Network Security │ Firewalls, VPNs, Segmentation ├─────────────────────────────────┤ │ Host Security │ OS Hardening, Patching ├─────────────────────────────────┤ │ Application Security │ AuthN, AuthZ, Input Validation ├─────────────────────────────────┤ │ Data Security │ Encryption, Access Control └─────────────────────────────────┘

Layer Controls

  1. Perimeter
  • Web Application Firewall (WAF)

  • DDoS protection

  • Rate limiting

  • Bot detection

  1. Network
  • Network segmentation (VPCs, subnets)

  • Security groups / firewalls

  • VPN for internal access

  • Zero-trust network access

  1. Host
  • OS hardening

  • Patch management

  • Endpoint protection

  • File integrity monitoring

  1. Application
  • Authentication (OAuth2, OIDC)

  • Authorization (RBAC, ABAC)

  • Input validation

  • Output encoding

  • Session management

  • Secure headers

  1. Data
  • Encryption at rest (AES-256)

  • Encryption in transit (TLS 1.3)

  • Key management

  • Data masking

  • Access logging

Security Checklist

  • WAF configured with OWASP rules

  • Network segmentation in place

  • All traffic encrypted (TLS)

  • Authentication on all endpoints

  • Least privilege access controls

  • Secrets managed securely

  • Audit logging enabled

  • Backups encrypted and tested

Principle of Least Privilege

Grant only the minimum permissions needed:

  • Use IAM roles, not long-lived credentials

  • Scope permissions to specific resources

  • Regular access reviews

  • Just-in-time access for sensitive operations

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

application-security

No summary provided by upstream source.

Repository SourceNeeds Review
Security

security-review

No summary provided by upstream source.

Repository SourceNeeds Review
Security

threat-modeling

No summary provided by upstream source.

Repository SourceNeeds Review