threat-mitigation-mapping
Sécurité & ConformitéMap identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Documentation
Threat Mitigation Mapping
Connect threats to controls for effective security planning.
Use this skill when
Do not use this skill when
Instructions
resources/implementation-playbook.md.Resources
resources/implementation-playbook.md for detailed patterns and examples.Compétences similaires
Explorez d'autres agents de la catégorie Sécurité & Conformité
error-debugging-error-analysis
"You are an expert error analysis specialist with deep expertise in debugging distributed systems, analyzing production incidents, and implementing comprehensive observability solutions."
Burp Suite Web Application Testing
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater", "analyze HTTP history", or "configure proxy for web testing". It provides comprehensive guidance for using Burp Suite's core features for web application security testing.
AWS Penetration Testing
This skill should be used when the user asks to "pentest AWS", "test AWS security", "enumerate IAM", "exploit cloud infrastructure", "AWS privilege escalation", "S3 bucket testing", "metadata SSRF", "Lambda exploitation", or needs guidance on Amazon Web Services security assessment.