跳转到主要内容
此内容尚未提供您的语言版本,正在以英文显示。

Enforce Policy As Code

技能 已验证 活跃

Implement policy-as-code enforcement using OPA Gatekeeper or Kyverno to validate and mutate Kubernetes resources according to organizational policies. Covers constraint templates, admission control, audit mode, reporting violations, and integrating with CI/CD pipelines for shift-left policy validation. Use when enforcing resource configuration standards, preventing security misconfigurations such as privileged containers, ensuring compliance before deployment, standardizing naming conventions, or auditing existing cluster resources against policies.

目的

To enable organizations to enforce Kubernetes resource standards, prevent security misconfigurations, and ensure compliance through automated policy validation and mutation.

功能

  • Policy enforcement with OPA Gatekeeper or Kyverno
  • Kubernetes resource validation and mutation
  • Audit mode for existing resources
  • CI/CD pipeline integration for shift-left validation
  • Detailed installation and configuration examples

使用场景

  • Enforcing resource configuration standards
  • Preventing security misconfigurations (e.g., privileged containers)
  • Ensuring compliance before deployment
  • Standardizing naming conventions and metadata
  • Auditing existing cluster resources against policies

非目标

  • Providing a managed Kubernetes cluster
  • Replacing security scanning tools
  • Enforcing policies outside of Kubernetes resource admission

Documentation

  • info:Configuration & parameter referenceWhile the SKILL.md provides detailed steps and examples, explicit documentation of all parameters for the underlying tools (Helm, kubectl, Gatekeeper/Kyverno CLIs) and their defaults is not provided within the skill's documentation itself.

Code Execution

  • info:ValidationThe skill uses standard CLI tools like `kubectl` and `helm`, which have their own validation, but explicit schema validation for inputs within the skill's scripts is not apparent.

安装

/plugin install agent-almanac@pjt222-agent-almanac

质量评分

已验证
98 /100
about 22 hours ago 分析

信任信号

最近提交1 day ago
星标14
许可证MIT
状态
查看源代码

类似扩展

K8s Manifest Generator

100

Create production-ready Kubernetes manifests for Deployments, Services, ConfigMaps, and Secrets following best practices and security standards. Use when generating Kubernetes YAML manifests, creating K8s resources, or implementing production-grade Kubernetes configurations.

技能
wshobson

Setup Container Registry

99

Configure container image registries including GitHub Container Registry (ghcr.io), Docker Hub, and Harbor with automated image scanning, tagging strategies, retention policies, and CI/CD integration for secure image distribution. Use when setting up a private container registry, migrating from Docker Hub to self-hosted registries, implementing vulnerability scanning in CI/CD pipelines, managing multi-architecture images, enforcing image signing, or configuring automatic cleanup and retention policies.

技能
pjt222

Prepare Inspection Readiness

100

Prepare an organisation for regulatory inspection by assessing readiness against agency-specific focus areas (FDA, EMA, MHRA). Covers warning letter and 483 theme analysis, mock inspection protocols, document bundle preparation, inspection logistics, and response template creation. Use when a regulatory inspection has been announced or is anticipated, when a periodic self-assessment is due, when new systems have been implemented since the last inspection, or after a significant audit finding that may attract regulatory attention.

技能
pjt222

Monitor Data Integrity

100

Design and operate a data integrity monitoring programme based on ALCOA+ principles. Covers detective controls, audit trail review schedules, anomaly detection patterns (off-hours activity, sequential modifications, bulk changes), metrics dashboards, investigation triggers, and escalation matrix definition. Use when establishing a data integrity monitoring programme for GxP systems, preparing for inspections where data integrity is a focus area, after a data integrity incident requiring enhanced monitoring, or when implementing MHRA, WHO, or PIC/S guidance.

技能
pjt222

Investigate Capa Root Cause

100

Investigate root causes and manage CAPAs (Corrective and Preventive Actions) for compliance deviations. Covers investigation method selection (5-Why, fishbone, fault tree), structured root cause analysis, corrective vs preventive action design, effectiveness verification, and trend analysis. Use when an audit finding requires a CAPA, when a deviation or incident occurs in a validated system, when a regulatory observation needs a formal response, when a data integrity anomaly requires investigation, or when recurring issues suggest a systemic root cause.

技能
pjt222

Master Claude for Legal

100

Master skill for legal teams using Claude. Loads the right reference for the user's question (privilege configuration, MCP hardening, verification, long documents, practice-area patterns, skill authoring) and routes to specialized starter skills (NDA triage, version diff, meeting brief, citation verification, status synthesis). Auto-invokes when the user mentions legal work, contracts, redlines, NDAs, privilege, attorney-client, court filings, depositions, regulatory compliance, or asks how to set up Claude for a law firm or in-house legal team.

技能
sboghossian