Preparing Archive
threat-mitigation-mapping
Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.
Architectural Overview
"This module is grounded in security patterns and exposes 1 core capabilities across 1 execution phases."
Threat Mitigation Mapping
Connect threats to controls for effective security planning.
Use this skill when
- Prioritizing security investments
- Creating remediation roadmaps
- Validating control coverage
- Designing defense-in-depth
- Security architecture review
- Risk treatment planning
Do not use this skill when
- The task is unrelated to threat mitigation mapping
- You need a different domain or tool outside this scope
Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open
resources/implementation-playbook.md.
Resources
resources/implementation-playbook.mdfor detailed patterns and examples.
Primary Stack
TypeScript
Tooling Surface
Guide only
Workspace Path
.agents/skills/threat-mitigation-mapping
Operational Ecosystem
The complete hardware and software toolchain required.
Module Topology
Antigravity Core
Principal Engineering Agent
Recommended for this workflow
Adjacent modules that complement this skill surface
An error occurred. Please try again later.