Security & Auth Skills
770 skills in this category Β· Page 25 of 33
Browse the most popular security & auth skills on TrustedSkills.
Mobile Security Mobsf
Helps with mobile development, security as part of implementing security and authentication workflows.
Gdpr Compliance
Ensures your data handling aligns with GDPR regulations, minimizing legal risks and protecting user privacy β a crucial security asset.
Pci Dss Compliance
Ensures PCI DSS compliance by analyzing systems and processes, reducing risk and safeguarding sensitive cardholder data effectively.
Fedramp Compliance
This skill assesses your system against FedRAMP requirements for cloud security compliance, streamlining certification and reducing risk.
Iso27001 Compliance
This skill assesses your system against ISO 27001 requirements, ensuring security controls are in place and boosting your organization's compliance posture.
Security Automation
Helps with security, automation as part of implementing security and authentication workflows.
Hipaa Compliance
Ensures your application adheres to HIPAA regulations, safeguarding sensitive patient data and mitigating legal risks for businesses.
Soc2 Compliance
This skill automates SOC 2 compliance checks, streamlining documentation and reducing audit risk for your business.
Security Audit Example
Helps with security, auditing as part of implementing security and authentication workflows.
Security Audit
Helps with security, auditing as part of implementing security and authentication workflows.
Security Check
Scans files and URLs for malware, vulnerabilities, and suspicious content using bjesuiter's advanced threat intelligence.
Pentest Checklist
This Pentest Checklist by jpropato provides a structured guide for comprehensive security testing, ensuring thoroughness and reducing missed vulnerabilities.
Clerk Auth
Authenticates user access to sensitive documents and systems based on predefined rules and authorization protocols.
Telnyx Oauth Java
Helps with OAuth, Java as part of implementing security and authentication workflows.
Openiddict Authorization
This skill implements OpenID Connect (OIDC) authorization using OpenIDDict, streamlining secure user authentication and access control for applications.
Oauth Oidc Implementer
Provides OAuth guidance and assistance for implementing security and authentication.
Broken Authentication Testing
Automates testing for broken authentication vulnerabilities using jpropato's techniques to identify bypasses and weaknesses.
Remix Api Key Auth
Helps with Remix, API, authentication as part of implementing security and authentication workflows.
Modern Auth 2026
Analyzes modern authentication methods and predicts vulnerabilities in 2026 based on current trends.
Auth Route Protection Checker
Verifies API endpoint access controls against defined policies, identifying potential authentication/authorization vulnerabilities.
Authentication Patterns
Analyzes software authentication sequences for subtle melodic patterns indicative of compromised credentials or malicious activity.
Authorization Models
Authorization Models define granular access rules based on attributes, enhancing security by dynamically controlling user permissions and reducing over-provisioning risks.
Auth Analyzer
Analyzes authentication logs to detect suspicious activity, potential breaches, and policy violations.
Terra Auth
Terraform infrastructure access is securely managed and audited via automated policy enforcement with adaptationio's terra-auth.