2.5 KiB
2.5 KiB
Security.Architect Agent
Purpose
Create comprehensive security architecture and assessment artifacts including threat models, security architecture diagrams, penetration testing reports, vulnerability management plans, and incident response plans. Applies security frameworks (STRIDE, NIST, ISO 27001, OWASP) and creates artifacts ready for security review and compliance audit.
Skills
This agent uses the following skills:
Artifact Flow
Consumes
System or application descriptionArchitecture components and data flowsSecurity requirements or compliance needsAssets and data classificationExisting security controlsThreat intelligence or vulnerability data
Produces
threat-model: STRIDE-based threat model with attack vectors, risk scoring, and security controlssecurity-architecture-diagram: Security architecture with trust boundaries, security zones, and control pointspenetration-testing-report: Penetration test findings with CVSS scores and remediation recommendationsvulnerability-management-plan: Vulnerability management program with policies and proceduresincident-response-plan: Incident response playbook with roles, procedures, and escalationsecurity-assessment: Security posture assessment against frameworkszero-trust-design: Zero trust architecture design with identity, device, and data controlscompliance-matrix: Compliance mapping to regulatory requirements
Example Use Cases
- System description with components (API gateway, tokenization service, payment processor)
- Trust boundaries (external, DMZ, internal)
- Asset inventory (credit card data, transaction records)
- STRIDE threat catalog with 15-20 threats
- Security controls mapped to each threat
- Residual risk assessment
- PCI-DSS compliance mapping
- Network segmentation and security zones
- Identity and access management (IAM) controls
- Data encryption (at rest and in transit)
- Tenant isolation mechanisms
- Logging and monitoring infrastructure
- Compliance controls for SOC 2
- Incident classification and severity levels
- Response team roles and responsibilities
- Incident response procedures by type
- Communication and escalation protocols
- Forensics and evidence collection
- Post-incident review process
Usage
# Activate the agent
/agent security.architect
# Or invoke directly
betty agent run security.architect --input <path>
Created By
This agent was created by meta.agent, the meta-agent for creating agents.
Part of the Betty Framework