developer security skill risk: low
Cloud Workload Protection Implementation
Provides instructions and Python code examples using boto3 to monitor cloud workloads for runtime threats including suspicious processes, network connections, and file integrity.
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
---
name: implementing-cloud-workload-protection
description: "Implements cloud workload protection using boto3 and google-cloud APIs for runtime security monitoring, process"
---
# Implementing Cloud Workload Protection
## When to Use
- When deploying or configuring implementing cloud workload protection capabilities in your environment
- When establishing security controls aligned to compliance requirements
- When building or improving security architecture for this domain
- When conducting security assessments that require this implementation
## Prerequisites
- Familiarity with cloud security concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
## Instructions
Monitor cloud workloads for runtime threats by checking process lists, network
connections, file integrity, and resource utilization anomalies.
```python
import boto3
ssm = boto3.client("ssm")
# Run command on EC2 instances to check for suspicious processes
response = ssm.send_command(
InstanceIds=["i-1234567890abcdef0"],
DocumentName="AWS-RunShellScript",
Parameters={"commands": ["ps aux | grep -E 'xmrig|minerd|cryptonight'"]},
)
```
Key protection areas:
1. Process monitoring for cryptominers and reverse shells
2. File integrity monitoring on critical system files
3. Network connection auditing for C2 callbacks
4. Resource utilization anomaly detection (CPU spikes)
5. Unauthorized binary detection via hash comparison
## Examples
```python
# Check for unauthorized outbound connections
ssm.send_command(
InstanceIds=instances,
DocumentName="AWS-RunShellScript",
Parameters={"commands": ["ss -tlnp | grep ESTABLISHED"]},
)
```
REQUIRED CONTEXT
- cloud security concepts familiarity
- test/lab environment access
EXPECTED OUTPUT
- Format
- markdown
- Constraints
- include code examples
- list key protection areas
- cover prerequisites and when-to-use guidance
EXAMPLES
Includes two Python code examples using boto3 SSM to run shell commands for process and network checks.
CAVEATS
- Missing context
- Desired output format or report structure
- Full working code examples for all listed protection areas
- Error handling or authentication steps
- Ambiguities
- Description text is truncated mid-sentence ('process')
- Mentions google-cloud APIs in header but provides no Google Cloud code or details
QUALITY
- OVERALL
- 0.50
- CLARITY
- 0.65
- SPECIFICITY
- 0.45
- REUSABILITY
- 0.55
- COMPLETENESS
- 0.40
IMPROVEMENT SUGGESTIONS
- Complete the truncated description sentence and add balanced Google Cloud example code
- Add explicit output format requirement (e.g., JSON report schema)
- Specify success criteria or validation steps for each protection area
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR DEVELOPER
- Python Security Code Auditordevelopersecurity
- Arcjet AI Endpoint Protection Implementerdevelopersecurity
- Multi-Layer Data Validation Implementerdevelopersecurity
- Git Diff Security Auditordevelopersecurity
- Cybersecurity Viral Tool Architectdevelopersecurity
- LLM Security Vulnerability Analyzerdevelopersecurity
- AI Agent Security Evaluation Checklist Creatordevelopersecurity
- Cyberscam Survival Simulator Specificationdevelopersecurity
- AI Agent Permissions Updater for Claude Geminidevelopersecurity
- Prompt Injection Jailbreak Detectordevelopersecurity
- Ethereum Smart Contract Vulnerability Analyzerdevelopersecurity
- SHA-256 Log Integrity Chain Builderdevelopersecurity
- Python mTLS Certificate Generator for Zero Trustdevelopersecurity
- GHAS Alerts and Repo Vulnerability Analyzerdevelopersecurity
- Codebase Security Fix and Test Writerdevelopersecurity
- AI Vulnerability Analysis and Automation Acceleratordevelopersecurity
- GHAS Vulnerability Triage and Upgrade Recommenderdevelopersecurity
- Context7 Library Documentation Expertdevelopercoding
- Structured Python Production Code Generatordevelopercoding
- Minimax Music API Generation Agentdevelopercreative
- Angular Standalone Directive Generatordevelopercoding
- Pytest Unit Test Suite Generatordevelopercoding
- Unity Architecture Specialistdevelopercoding
- iOS App Store Compliance Auditordeveloperanalysis
- Reusable Enterprise Website Template Architectdevelopersoftware_engineering