security-rbac
Installation
SKILL.md
Decision Tree
Need access control? → Define ROLE hierarchy
Need row isolation? → Enable RLS with policies
Need sensitive data? → Encrypt with pgcrypto
Need audit compliance? → Create AUDIT_LOG table
Need secure connections? → Enforce SSL/TLS
Database Security & RBAC Standards
Security must be implemented at the database layer (Defense in Depth), ensuring that even if the application layer is compromised, the data remains protected by strict access controls.
1. Role-Based Access Control (RBAC)
1.1 Standard Roles
Related skills
More from poletron/custom-rules
cpp
>
104lancedb
>
17clean-code
Pragmatic coding standards - concise, direct, no over-engineering, no unnecessary comments
10vulnerability-scanner
Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.
8trpc
>
8web-performance-optimization
Optimize website and web application performance including loading speed, Core Web Vitals, bundle size, caching strategies, and runtime performance
7