Skills Engineering Threat Mitigation Mapping for Security Planning

Threat Mitigation Mapping for Security Planning

v20260427
threat-mitigation-mapping
This skill maps identified security threats to appropriate controls and mitigation strategies. It is essential for prioritizing security investments, building comprehensive remediation roadmaps, validating existing control coverage, and performing detailed risk treatment planning. It helps organizations design robust, defense-in-depth security architectures.
Get Skill
383 downloads
Overview

Threat Mitigation Mapping

Connect threats to controls for effective security planning.

Use this skill when

  • Prioritizing security investments
  • Creating remediation roadmaps
  • Validating control coverage
  • Designing defense-in-depth
  • Security architecture review
  • Risk treatment planning

Do not use this skill when

  • The task is unrelated to threat mitigation mapping
  • You need a different domain or tool outside this scope

Instructions

  • Clarify goals, constraints, and required inputs.
  • Apply relevant best practices and validate outcomes.
  • Provide actionable steps and verification.
  • If detailed examples are required, open resources/implementation-playbook.md.

Resources

  • resources/implementation-playbook.md for detailed patterns and examples.

Limitations

  • Use this skill only when the task clearly matches the scope described above.
  • Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
  • Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
Info
Category Engineering
Name threat-mitigation-mapping
Version v20260427
Size 7.31KB
Updated At 2026-04-28
Language