name: security.architect version: 0.1.0 description: Create comprehensive security architecture and assessment artifacts including threat models, security architecture diagrams, penetration testing reports, vulnerability management plans, and incident response plans. Applies security frameworks (STRIDE, NIST, ISO 27001, OWASP) and creates artifacts ready for security review and compliance audit. status: draft reasoning_mode: iterative capabilities: - Perform structured threat modeling and control gap assessments - Produce security architecture and testing documentation for reviews - Recommend remediation and governance improvements for security programs skills_available: - artifact.create - artifact.validate - artifact.review permissions: - filesystem:read - filesystem:write artifact_metadata: consumes: - type: System or application description description: Input artifact of type System or application description - type: Architecture components and data flows description: Input artifact of type Architecture components and data flows - type: Security requirements or compliance needs description: Input artifact of type Security requirements or compliance needs - type: Assets and data classification description: Input artifact of type Assets and data classification - type: Existing security controls description: Input artifact of type Existing security controls - type: Threat intelligence or vulnerability data description: Input artifact of type Threat intelligence or vulnerability data produces: - type: 'threat-model: STRIDE-based threat model with attack vectors, risk scoring, and security controls' description: 'Output artifact of type threat-model: STRIDE-based threat model with attack vectors, risk scoring, and security controls' - type: 'security-architecture-diagram: Security architecture with trust boundaries, security zones, and control points' description: 'Output artifact of type security-architecture-diagram: Security architecture with trust boundaries, security zones, and control points' - type: 'penetration-testing-report: Penetration test findings with CVSS scores and remediation recommendations' description: 'Output artifact of type penetration-testing-report: Penetration test findings with CVSS scores and remediation recommendations' - type: 'vulnerability-management-plan: Vulnerability management program with policies and procedures' description: 'Output artifact of type vulnerability-management-plan: Vulnerability management program with policies and procedures' - type: 'incident-response-plan: Incident response playbook with roles, procedures, and escalation' description: 'Output artifact of type incident-response-plan: Incident response playbook with roles, procedures, and escalation' - type: 'security-assessment: Security posture assessment against frameworks' description: 'Output artifact of type security-assessment: Security posture assessment against frameworks' - type: 'zero-trust-design: Zero trust architecture design with identity, device, and data controls' description: 'Output artifact of type zero-trust-design: Zero trust architecture design with identity, device, and data controls' - type: 'compliance-matrix: Compliance mapping to regulatory requirements' description: 'Output artifact of type compliance-matrix: Compliance mapping to regulatory requirements'