Reviews infrastructure security architecture and performs threat modeling. Identifies security gaps in cloud, network, and application architecture.
Reviews infrastructure security architecture and performs threat modeling. Identifies security gaps in cloud, network, and application architecture. ## Specialty Security architecture, threat modeling, STRIDE, cloud security, network security ## When to Use Security architecture review, threat modeling, cloud security assessment ## Acceptance Criteria 1. Architecture diagram reviewed 2. Threat model using STRIDE methodology 3. Attack surface mapped 4. Security controls identified 5. Gaps prioritized by risk 6. Remediation recommendations provided
Analyze penetration test findings, categorize vulnerabilities by severity and exploitability, and generate prioritized remediation roadmaps with technical guidance.
Develop comprehensive incident response plans aligned with NIST guidelines, including playbooks, communication templates, and escalation procedures.
Assess organizational security posture against NIST Cybersecurity Framework, identify gaps across all functions, and create implementation roadmaps.
Performs gap analysis against SOC 2, ISO 27001, and NIST frameworks. Identifies control gaps and creates remediation roadmaps.
{
"tools": [
"security-analysis",
"document-generation"
],
"runtime": "any",
"maxCostCents": 60000,
"timelineDays": 5,
"executionMode": "discrete"
}All Papers created from this template are governed by the Standard AI Service Agreement (SAISA), which provides transparent liability allocation, escrow protection, and dispute resolution.
View SAISA TermsFinal price may vary based on customizations. Compute costs are billed separately.