66 lines
3.5 KiB
YAML
66 lines
3.5 KiB
YAML
name: security.architect
|
|
version: 0.1.0
|
|
description: Create comprehensive security architecture and assessment artifacts including
|
|
threat models, security architecture diagrams, penetration testing reports, vulnerability
|
|
management plans, and incident response plans. Applies security frameworks (STRIDE,
|
|
NIST, ISO 27001, OWASP) and creates artifacts ready for security review and compliance
|
|
audit.
|
|
status: draft
|
|
reasoning_mode: iterative
|
|
capabilities:
|
|
- Perform structured threat modeling and control gap assessments
|
|
- Produce security architecture and testing documentation for reviews
|
|
- Recommend remediation and governance improvements for security programs
|
|
skills_available:
|
|
- artifact.create
|
|
- artifact.validate
|
|
- artifact.review
|
|
permissions:
|
|
- filesystem:read
|
|
- filesystem:write
|
|
artifact_metadata:
|
|
consumes:
|
|
- type: System or application description
|
|
description: Input artifact of type System or application description
|
|
- type: Architecture components and data flows
|
|
description: Input artifact of type Architecture components and data flows
|
|
- type: Security requirements or compliance needs
|
|
description: Input artifact of type Security requirements or compliance needs
|
|
- type: Assets and data classification
|
|
description: Input artifact of type Assets and data classification
|
|
- type: Existing security controls
|
|
description: Input artifact of type Existing security controls
|
|
- type: Threat intelligence or vulnerability data
|
|
description: Input artifact of type Threat intelligence or vulnerability data
|
|
produces:
|
|
- type: 'threat-model: STRIDE-based threat model with attack vectors, risk scoring,
|
|
and security controls'
|
|
description: 'Output artifact of type threat-model: STRIDE-based threat model
|
|
with attack vectors, risk scoring, and security controls'
|
|
- type: 'security-architecture-diagram: Security architecture with trust boundaries,
|
|
security zones, and control points'
|
|
description: 'Output artifact of type security-architecture-diagram: Security
|
|
architecture with trust boundaries, security zones, and control points'
|
|
- type: 'penetration-testing-report: Penetration test findings with CVSS scores
|
|
and remediation recommendations'
|
|
description: 'Output artifact of type penetration-testing-report: Penetration
|
|
test findings with CVSS scores and remediation recommendations'
|
|
- type: 'vulnerability-management-plan: Vulnerability management program with policies
|
|
and procedures'
|
|
description: 'Output artifact of type vulnerability-management-plan: Vulnerability
|
|
management program with policies and procedures'
|
|
- type: 'incident-response-plan: Incident response playbook with roles, procedures,
|
|
and escalation'
|
|
description: 'Output artifact of type incident-response-plan: Incident response
|
|
playbook with roles, procedures, and escalation'
|
|
- type: 'security-assessment: Security posture assessment against frameworks'
|
|
description: 'Output artifact of type security-assessment: Security posture assessment
|
|
against frameworks'
|
|
- type: 'zero-trust-design: Zero trust architecture design with identity, device,
|
|
and data controls'
|
|
description: 'Output artifact of type zero-trust-design: Zero trust architecture
|
|
design with identity, device, and data controls'
|
|
- type: 'compliance-matrix: Compliance mapping to regulatory requirements'
|
|
description: 'Output artifact of type compliance-matrix: Compliance mapping to
|
|
regulatory requirements'
|