agent security skill risk: medium
Implementing PAM for Database Access
Provides an overview, prerequisites, objectives, NIST-aligned security controls, and verification checklist for deploying privileged access management on Oracle, SQL Server, Postgr…
- Policy sensitive
- Human review
SKILL 4 files · 2 folders
SKILL.md
--- name: implementing-pam-for-database-access description: "Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL." --- # Implementing PAM for Database Access ## Overview Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL. Covers session proxy configuration, credential vaulting, query auditing, dynamic credential generation, and least-privilege database roles. ## When to Use - When deploying or configuring implementing pam for database access capabilities in your environment - When establishing security controls aligned to compliance requirements - When building or improving security architecture for this domain - When conducting security assessments that require this implementation ## Prerequisites - Familiarity with identity access management concepts and tools - Access to a test or lab environment for safe execution - Python 3.8+ with required dependencies installed - Appropriate authorization for any testing activities ## Objectives - Implement comprehensive implementing pam for database access capability - Establish automated discovery and monitoring processes - Integrate with enterprise IAM and security tools - Generate compliance-ready documentation and reports - Align with NIST 800-53 access control requirements ## Security Controls | Control | NIST 800-53 | Description | |---------|-------------|-------------| | Account Management | AC-2 | Lifecycle management | | Access Enforcement | AC-3 | Policy-based access control | | Least Privilege | AC-6 | Minimum necessary permissions | | Audit Logging | AU-3 | Authentication and access events | | Identification | IA-2 | User and service identification | ## Verification - [ ] Implementation tested in non-production environment - [ ] Security policies configured and enforced - [ ] Audit logging enabled and forwarding to SIEM - [ ] Documentation and runbooks complete - [ ] Compliance evidence generated
REQUIRED CONTEXT
- familiarity with IAM concepts
- test/lab environment access
- Python 3.8+ environment
- authorization for testing
EXPECTED OUTPUT
- Format
- markdown
- Schema
- markdown_sections · Overview, When to Use, Prerequisites, Objectives, Security Controls, Verification
- Constraints
- include overview, when-to-use, prerequisites, objectives, NIST-aligned controls table, and verification checklist
SUCCESS CRITERIA
- Implementation tested in non-production environment
- Security policies configured and enforced
- Audit logging enabled and forwarding to SIEM
- Documentation and runbooks complete
- Compliance evidence generated
CAVEATS
- Dependencies
- Familiarity with identity access management concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
- Ambiguities
- The phrase 'implementing pam for database access' is repeated verbatim in multiple sections as if it is an unreplaced placeholder.
QUALITY
- OVERALL
- 0.72
- CLARITY
- 0.70
- SPECIFICITY
- 0.75
- REUSABILITY
- 0.65
- COMPLETENESS
- 0.80
IMPROVEMENT SUGGESTIONS
- Replace every instance of the awkward phrase 'implementing pam for database access' with the consistent term 'PAM'.
- Add an explicit 'Output Format' section specifying the desired structure of generated documentation or reports.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity
- Security Audit Fix Commit Revieweragentsecurity