Reviews IaC, IAM policies, Kubernetes RBAC, and application configs for security posture. Covers least privilege, secrets management, encryption, audit logging, supply chain. Use when assessing IAM, secrets, encryption, or security posture of AWS/K8s workloads.
Specialist skill for security assessment of infrastructure repositories. Evaluates IAM, secrets, encryption, and compliance posture.
Run all five per docs/security-analysis.md. Each finding must include: evidence, impact, remediation.
Observed / Inferred / Missing Evidence