threat-mitigation-mapping
خريطة التهديدات المحددة إلى الضوابط الأمنية والتخفيفات المناسبة. استخدم عند تحديد أولويات الاستثمارات الأمنية، إنشاء خطط المعالجة، أو التحقق من فعالية الضوابط.
محتوى هذه المهارة بلغته الأصلية (غالبًا الإنجليزية).
Threat Mitigation Mapping
Connect threats to controls for effective security planning.
Use this skill when
- Prioritizing security investments
- Creating remediation roadmaps
- Validating control coverage
- Designing defense-in-depth
- Security architecture review
- Risk treatment planning
Do not use this skill when
- The task is unrelated to threat mitigation mapping
- You need a different domain or tool outside this scope
Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open
resources/implementation-playbook.md.
Resources
resources/implementation-playbook.mdfor detailed patterns and examples.
Limitations
- Use this skill only when the task clearly matches the scope described above.
- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.