security-requirement-extraction
Sécurité & ConformitéDerive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.
Documentation
Security Requirement Extraction
Transform threat analysis into actionable security requirements.
Use this skill when
●Converting threat models to requirements
●Writing security user stories
●Creating security test cases
●Building security acceptance criteria
●Compliance requirement mapping
●Security architecture documentation
Do not use this skill when
●The task is unrelated to security requirement extraction
●You need a different domain or tool outside this scope
Instructions
●Clarify goals, constraints, and required inputs.
●Apply relevant best practices and validate outcomes.
●Provide actionable steps and verification.
●If detailed examples are required, open
resources/implementation-playbook.md.Resources
●
resources/implementation-playbook.md for detailed patterns and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
security-scanning-security-dependencies
"You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across ecosystems to identify vulnerabilities, assess risks, and recommend remediation."
VOIR LA FICHE
api-security-best-practices
"Implement secure API design patterns including authentication, authorization, input validation, rate limiting, and protection against common API vulnerabilities"
VOIR LA FICHE
azure-keyvault-secrets-rust
|
VOIR LA FICHE