mitigation▌
2 indexed skills · max 10 per page
threat-mitigation-mapping
wshobson/agents · Productivity
Map identified threats to appropriate security controls and mitigations for effective defense-in-depth planning. \n \n Provides control categorization by type (preventive, detective, corrective) and layer (network, application, data, endpoint, process), with templates for building threat-to-control mappings and calculating coverage gaps \n Includes a standard control library with 15+ pre-built controls covering authentication, encryption, logging, access control, and availability, each mapped to
threat-mitigation-mapping
sickn33/antigravity-awesome-skills · Productivity
Threat Mitigation Mapping \n Connect threats to controls for effective security planning. \n Use this skill when \n \n Prioritizing security investments \n Creating remediation roadmaps \n Validating control coverage \n Designing defense-in-depth \n Security architecture review \n Risk treatment planning \n \n Do not use this skill when \n \n The task is unrelated to threat mitigation mapping \n You need a different domain or tool outside this scope \n \n Instructions \n \n Clarify goals, constr