Loading...
Loading...
Guides product infrastructure security—securing the runtime, data plane, and control plane that ships with the product: multi-tenant isolation, service-to-service auth, customer data boundaries, secure defaults in APIs and workers, abuse-resistant rate limits, product-scoped secrets and encryption, and security design reviews for product infra changes. Use when threat-modeling product features, designing tenant isolation, hardening service mesh or internal APIs, reviewing product IaC/modules for data leaks, defining secure baselines for microservices the product team owns, or partnering on incidents affecting customer workloads—not for corporate IdP/SIEM (information-security-engineer), CI pipeline gates only (devsecops), SOC operations (defensive-security-analyst), authorized pentest execution (offensive-security-analyst), general IDP golden paths (platform-engineer), company-wide GRC (cybersecurity), or applied AI solution architecture for LLM features (applied-ai-architect-commercial-enterprise).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill product-infrastructure-security-engineerinformation-security-engineerdevsecopsdefensive-security-analystoffensive-security-analystplatform-engineercybersecurityapplied-ai-architect-commercial-enterprise| Need | Skill |
|---|---|
| Org-wide IAM, KMS ops, SIEM | |
| Pipeline scans, SBOM, CI OIDC | |
| Product feature code and APIs | |
| Core cloud/K8s provisioning | |
| IDP templates and portal | |
| Pentest reproduction | |
| Customer-impacting incident comms | |
| AI copilot/RAG architecture | |
| K8s namespace isolation and deploy | |
references/product_threat_model.mdreferences/multi_tenant_isolation.mdreferences/secure_service_defaults.md| Control | Product infra angle |
|---|---|
| Encryption at rest | Per-tenant or per-table keys where required |
| Encryption in transit | TLS everywhere; no TLS termination that exposes plaintext internally without justification |
| Retention | Deletion hooks for account closure |
| Logging | Redact PII in product logs; separate security audit stream |
references/customer_data_protection.mdreferences/security_design_review.mdcybersecurityreferences/product_threat_model.mdreferences/multi_tenant_isolation.mdreferences/secure_service_defaults.mdreferences/customer_data_protection.mdreferences/security_design_review.md