security-requirement-extraction

Derive security requirements from threat models and business context. Use when translating threats into actionable requirements, creating security user stories, or building security test cases.

Author

Install

Hot:13

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-security-requirement-extraction&locale=en&source=copy

Security Requirement Extraction - Security Requirement Extraction Skill

Skill Overview


Convert threat analysis into actionable security requirements, helping teams derive specific security needs from threat models and business scenarios.

Applicable Scenarios

1. Convert Threat Models into Security Requirements


After completing threat modeling, transform identified threats (such as potential risks found using STRIDE) into specific security control measures and implementable requirements, ensuring that threats do not remain at the theoretical level.

2. Write Security User Stories


Create security requirements in user-story format for agile development teams, for example: "As a system administrator, I want to ensure that all sensitive data is encrypted during transmission to prevent man-in-the-middle attacks."

3. Build Security Test Cases


Generate validation test cases based on security requirements to ensure that the implemented security controls can be effectively tested and verified, covering functional testing, penetration testing, and compliance validation.

Core Features

1. Threat-to-Requirement Mapping


Transform threat modeling outputs (such as threat lists and attack trees) into structured security requirements, supporting the conversion of results from multiple threat modeling methods (STRIDE, PASTA, LINDDUN, etc.).

2. Structured Output of Security Requirements


Produce security requirements in industry-standard formats, including requirement IDs, descriptions, acceptance criteria, priority, and traceability relationships to threats, to facilitate integration into requirements management systems.

3. Alignment with Compliance Requirements


Map security requirements to compliance standards (such as ISO 27001, SOC 2, PCI DSS, GDPR) to ensure that requirements meet regulatory and audit needs.

Common Questions

What is Security Requirement Extraction?


Security requirement extraction is the process of converting threat analysis results into specific, actionable security control measures. It helps teams shift from "what threats might occur" to "what defenses need to be implemented," serving as a critical link between security analysis and security implementation.

How do you convert a threat model into security requirements?


First, identify confirmed threats from the threat model; second, design mitigation measures for each threat; then, convert mitigation measures into verifiable requirement statements; finally, add acceptance criteria and priority. This process ensures that each threat has a corresponding security control measure.

What are the limitations of Security Requirement Extraction?


This skill focuses on extracting and transforming requirements. It does not perform actual threat modeling (threat analysis must be completed first) or security testing (requirements must be delivered to the testing team). It also does not handle security-unrelated functional requirements or business logic requirements.