security-requirement-extraction
Dérivez les exigences de sécurité à partir des modèles de menaces et du contexte commercial. Utilisez pour traduire les menaces en exigences actionnables, créer des user stories de sécurité ou construire des cas de test de sécurité.
Le contenu de ce skill est dans sa langue d’origine (souvent l’anglais).
Security Requirement Extraction
Transform threat analysis into actionable security requirements.
Use this skill when
- Converting threat models to requirements
- Writing security user stories
- Creating security test cases
- Building security acceptance criteria
- Compliance requirement mapping
- Security architecture documentation
Do not use this skill when
- The task is unrelated to security requirement extraction
- You need a different domain or tool outside this scope
Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open
resources/implementation-playbook.md.
Resources
resources/implementation-playbook.mdfor detailed patterns and examples.
Limitations
- Use this skill only when the task clearly matches the scope described above.
- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.