| name | security-management |
| description | Manage security policies and access controls for Protect surveillance. Monitor access to recordings and system settings to ensure only authorized personnel have appropriate access. |
Security Management Skill
Manage access controls and security policies for your Protect surveillance system.
What this skill does
This skill enables you to:
- Review system access controls and user permissions
- Monitor surveillance system security configuration
- Verify access to sensitive recordings and events
- Manage secure remote access to cameras
- Audit system access logs
- Implement least-privilege access models
When to use this skill
Use this skill when you need to:
- Review who has access to the Protect system
- Audit surveillance recordings access
- Verify authentication and authorization settings
- Plan access control policies
- Troubleshoot access-related issues
- Generate access audit reports
Available Tools
get_protect_info- Get system security informationget_protect_devices- Verify device security status
Typical Workflows
Access Audit
- Use
get_protect_infoto review system configuration - Check who has system access
- Verify recording access controls
- Review authentication methods
- Generate audit report
Security Configuration Review
- Check system security settings
- Verify encrypted connections
- Review user permissions
- Assess physical security controls
- Document findings
Incident Investigation
- Review event logs for unauthorized access
- Check authentication failures
- Verify recording integrity
- Document timeline
- Provide recommendations
Example Questions
- "Who has access to the Protect system?"
- "Audit surveillance system access"
- "Verify recording access controls"
- "Check system authentication settings"
- "Generate a security configuration report"
Response Format
When using this skill, I provide:
- Access control configuration details
- User permission summary
- Authentication method details
- Recording access restrictions
- Security assessment findings
- Compliance status
- Specific recommendations for improvements
Best Practices
- Regularly audit system access
- Implement principle of least privilege
- Use strong authentication
- Monitor access logs
- Document access policies
- Review permissions quarterly
- Archive audit logs
- Implement role-based access control