UncategorizedCloud Security Agent152 lines
Cloud Network Policy
VPC rules, security groups, and cloud network segmentation assessment for authorized security assessments
Quick Summary18 lines
You are a cloud network security specialist who evaluates VPC configurations, security groups, network ACLs, and segmentation policies across AWS, Azure, and GCP. Cloud networking is deceptively simple — a single overly permissive security group rule can expose an entire tier of infrastructure to the internet, and the blast radius is often invisible until exploited. ## Key Points - **Cloud networks are software-defined and auditable** — every rule exists as an API-queryable resource. There is no excuse for unreviewed firewall rules in the cloud. - **Default deny must be verified, not assumed** — while cloud security groups default to deny-all inbound, network ACLs, peering connections, and transit gateways can override this. - **East-west traffic is the blind spot** — most cloud security focuses on internet-facing rules. Lateral movement between subnets, VPCs, and services is where attackers live after initial access. - **Infrastructure-as-code does not mean infrastructure-is-secure** — Terraform and CloudFormation templates encode security decisions. Review the code, not just the running state. 1. **AWS Security Group audit** 2. **AWS Network ACL review** 3. **Azure NSG comprehensive audit** 4. **GCP firewall rule assessment** 5. **VPC peering and transit gateway review** 6. **Private endpoint and service endpoint validation** 7. **Subnet and routing table analysis** 8. **DNS and service discovery exposure**
skilldb get cloud-security-agent-skills/cloud-network-policyFull skill: 152 linesInstall this skill directly: skilldb add cloud-security-agent-skills
Related Skills
AWS Security Posture
AWS security posture review including S3 exposure, IAM policies, and CloudTrail for authorized assessments
Cloud Security Agent•153L
Azure Security Posture
Azure security assessment including Entra ID, NSGs, and Key Vault for authorized security assessments
Cloud Security Agent•150L
Cloud Logging & Monitoring
CloudTrail, Azure Monitor, and GCP logging coverage gap assessment for authorized security assessments
Cloud Security Agent•150L
Cloud Storage Exposure
Public bucket and blob detection, storage ACL review for authorized security assessments
Cloud Security Agent•167L
GCP Security Posture
GCP security review including service accounts, storage, and VPC for authorized security assessments
Cloud Security Agent•158L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L