Loading...
Loading...
Guides information security risk analysis—risk identification and scoring, risk registers, threat/vulnerability/control mapping, treatment recommendations (accept/mitigate/transfer/avoid), third-party and supply-chain risk framing, business impact analysis, KRIs, and risk committee or board narratives. Aligns with ISO 27005 and NIST RMF concepts without full compliance audits. Use for security risk assessment, risk register maintenance, inherent/residual risk scoring, FAIR-style quantitative framing, treatment decisions, third-party risk tiers, or executive risk reporting—not SOC alert triage (soc-analyst), pentest execution (penetration-tester, web-pentester, network-pentester), control implementation (information-security-engineer, cloud-security-engineer), GRC program and audit prep (compliance-specialist), audit evidence automation (compliance-engineer, cloud-compliance-specialist), AI model risk programs (ai-risk-governance), or adversary simulation (red-team-specialist).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill security-risk-analystsoc-analystpenetration-testerweb-pentesternetwork-pentesterinformation-security-engineercloud-security-engineeriam-specialistcompliance-specialistcompliance-engineercloud-compliance-specialistcybersecurityai-risk-governancered-team-specialistcti-analyst| Need | Skill |
|---|---|
| Implement controls from risk treatment | |
| IAM risk scenarios, SoD, access governance | |
| Cloud guardrails and CSPM remediation | |
| GRC program, gap plans, audit prep | |
| Audit evidence and framework mapping | |
| Cloud-only compliance evidence | |
| Security program, IR, pentest governance | |
| AI system risk tiers and model governance | |
| Sector campaigns, actor trends for threat-informed risk | |
| Authorized adversary simulation | |
| SOC alert triage | |
| Pentest findings as risk input | |
| M&A/investment diligence and IC cyber briefs | |
references/risk_identification_and_scoring.md| Field | Purpose |
|---|---|
| Risk ID | Stable identifier |
| Scenario | What could go wrong |
| Owner | Accountable business or tech lead |
| Inherent / residual | Scores and rationale |
| Treatment | accept / mitigate / transfer / avoid |
| Target date | For mitigation or acceptance expiry |
| KRI | Measurable indicator |
references/security_risk_analyst_scope.mdthreat actor/event → vulnerability/condition → impact → existing controls → gap → residual riskreferences/threat_vulnerability_control_mapping.mdreferences/treatment_and_acceptance.mdreferences/third_party_and_supply_chain_risk.mdreferences/reporting_and_governance.mdreferences/security_risk_analyst_scope.mdreferences/risk_identification_and_scoring.mdreferences/threat_vulnerability_control_mapping.mdreferences/treatment_and_acceptance.mdreferences/third_party_and_supply_chain_risk.mdreferences/reporting_and_governance.md