Skip to content
← Back to all skills
Securitysafecommunity

security-requirement-extraction

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

Security Requirement Extraction

Transform threat analysis into actionable security requirements.

Use this skill when

  • Converting threat models to requirements
  • Writing security user stories
  • Creating security test cases
  • Building security acceptance criteria
  • Compliance requirement mapping
  • Security architecture documentation

Do not use this skill when

  • The task is unrelated to security requirement extraction
  • You need a different domain or tool outside this scope

Instructions

  • Clarify goals, constraints, and required inputs.
  • Apply relevant best practices and validate outcomes.
  • Provide actionable steps and verification.
  • If detailed examples are required, open resources/implementation-playbook.md.

Resources

  • resources/implementation-playbook.md for detailed patterns and examples.

Limitations

  • Use this skill only when the task clearly matches the scope described above.
  • Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
  • Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
— Field Manual

The 1,441 skills, demystified in one PDF.

A free editorial guide we wrote for the Skills Atlas: taxonomy, the 25 must-know skills, anti-patterns, and learning paths by profile.

  • 70+ pages, table of contents, ready to print.
  • Sent by email — link valid 7 days.
  • You can unsubscribe in one click anytime.

No spam. We never share your email. Unsubscribe in one click.