threat-mitigation-mapping

将已识别的威胁映射到相应的安全控制措施和缓解策略。适用于确定安全投资优先级、制定补救计划或验证控制措施有效性时。

查看详情
name:threat-mitigation-mappingdescription:Map identified threats to appropriate security controls and mitigations. Use when prioritizing security investments, creating remediation plans, or validating control effectiveness.

Threat Mitigation Mapping

Connect threats to controls for effective security planning.

Use this skill when

  • Prioritizing security investments

  • Creating remediation roadmaps

  • Validating control coverage

  • Designing defense-in-depth

  • Security architecture review

  • Risk treatment planning
  • Do not use this skill when

  • The task is unrelated to threat mitigation mapping

  • You need a different domain or tool outside this scope
  • Instructions

  • Clarify goals, constraints, and required inputs.

  • Apply relevant best practices and validate outcomes.

  • Provide actionable steps and verification.

  • If detailed examples are required, open resources/implementation-playbook.md.
  • Resources

  • resources/implementation-playbook.md for detailed patterns and examples.