Claude Code Plugins

Community-maintained marketplace

Feedback

using-security-architect

@tachyon-beep/skillpacks
1
0

Routes to security architecture skills - threat modeling, controls, compliance, authorization

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name using-security-architect
description Routes to security architecture skills - threat modeling, controls, compliance, authorization
mode true

Using Security Architect

Overview

This meta-skill routes you to the right security architecture skills based on your situation. Load this skill when you need security expertise but aren't sure which specific security skill to use.

Core Principle: Different security tasks require different skills. Match your situation to the appropriate skill, load only what you need.

When to Use

Load this skill when:

  • Starting any security-related task
  • User mentions: "security", "threat", "authentication", "authorization", "compliance", "classified", "review this design"
  • You recognize security implications but unsure which skill applies
  • You need to document security decisions

Don't use for: Simple features with no security implications (e.g., UI styling, basic CRUD with existing auth)

Routing by Situation

New System Design

Symptoms: "Design a new...", "We're building...", "Greenfield project"

Route to:

  1. First: ordis/security-architect/threat-modeling - Identify threats before implementation
  2. Then: ordis/security-architect/secure-by-design-patterns - Design with security built-in
  3. Then: ordis/security-architect/security-controls-design - Select appropriate controls

Example: "Design authentication system" → Load all three in order


Existing System Review

Symptoms: "Review this design", "Security audit", "Does this look secure?"

Route to: ordis/security-architect/architecture-security-review

When to add:

  • Add ordis/security-architect/threat-modeling if design lacks threat analysis
  • Add ordis/security-architect/secure-by-design-patterns if architecture has gaps

Example: "Review this plugin system" → Load architecture-security-review


Specific Security Domains

Authentication/Authorization Design

Route to:

  • ordis/security-architect/threat-modeling (identify auth threats)
  • ordis/security-architect/secure-by-design-patterns (defense-in-depth, fail-secure)
  • Consider: ordis/security-architect/security-authorization-and-accreditation (if government/ATO needed)

Configuration & Secrets

Route to:

  • ordis/security-architect/threat-modeling (config tampering threats)
  • ordis/security-architect/security-controls-design (separation of config vs code)

API Security

Route to:

  • ordis/security-architect/threat-modeling (STRIDE on API endpoints)
  • ordis/security-architect/architecture-security-review (review access controls)

Specialized Contexts (Extensions)

Classified/High-Security Systems

Symptoms: "TOP SECRET", "classified data", "security clearances", "multi-level security", "Bell-LaPadula"

Route to:

  1. ordis/security-architect/classified-systems-security (REQUIRED for classified contexts)
  2. Plus core skills: threat-modeling, secure-by-design-patterns

Example: "Design system handling SECRET and UNCLASSIFIED" → Load classified-systems-security first


Compliance/Regulatory

Symptoms: "HIPAA", "PCI-DSS", "SOC2", "GDPR", "compliance audit", "regulatory requirements"

Route to: ordis/security-architect/compliance-awareness-and-mapping

When to add:

  • Add ordis/security-architect/security-authorization-and-accreditation if ATO/AIS needed
  • Add core skills for implementing compliant controls

Example: "Build HIPAA-compliant system" → Load compliance-awareness-and-mapping + threat-modeling


Government Authorization

Symptoms: "ATO", "AIS", "authority to operate", "SSP", "SAR", "POA&M", "FedRAMP", "FISMA"

Route to: ordis/security-architect/security-authorization-and-accreditation

Cross-reference: Load muna/technical-writer/operational-acceptance-documentation for SSP/SAR writing


Documentation Tasks

Symptoms: "Document security decisions", "Write security docs", "Explain threat model"

Route to: ordis/security-architect/documenting-threats-and-controls

Cross-faction reference: Load muna/technical-writer/documentation-structure for ADR format, clarity guidelines

Example: "Document why we chose MLS" → Load documenting-threats + documentation-structure


Core vs Extension Skills

Core Skills (Universal - Use for Any Project)

Load these for any project with security needs:

  • threat-modeling - Identify threats (STRIDE, attack trees)
  • security-controls-design - Design controls (defense-in-depth, fail-secure)
  • architecture-security-review - Review designs for security gaps
  • secure-by-design-patterns - Apply secure design patterns
  • documenting-threats-and-controls - Document security decisions

Extension Skills (Specialized - Use for Specific Contexts)

Load these only when context requires:

  • classified-systems-security - Handling classified/sensitive data with clearances
  • compliance-awareness-and-mapping - Regulatory compliance (HIPAA, PCI-DSS, GDPR, etc.)
  • security-authorization-and-accreditation - Government ATO/AIS processes

Decision: If you're unsure whether context is "specialized", start with core skills. Specialized contexts will be explicit in requirements.


Decision Tree

Is this security-related?
├─ No → Don't load security skills
└─ Yes → Continue

What's the situation?
├─ New system design → threat-modeling + secure-by-design-patterns + security-controls-design
├─ Reviewing existing → architecture-security-review
├─ Documenting security → documenting-threats-and-controls + muna/technical-writer/documentation-structure
└─ Domain-specific → See "Specific Security Domains" above

Is this a specialized context?
├─ Classified data → ADD: classified-systems-security
├─ Compliance required → ADD: compliance-awareness-and-mapping
├─ Government ATO → ADD: security-authorization-and-accreditation
└─ No → Core skills sufficient

Cross-Faction References

Security work often requires skills from other factions:

Muna (Documentation):

  • muna/technical-writer/documentation-structure - When documenting security (ADRs, SSPs)
  • muna/technical-writer/clarity-and-style - When explaining security to non-experts

Load both factions when: Documenting security decisions, writing security policies, explaining threats to stakeholders


Common Routing Patterns

Pattern 1: New Authentication System

User: "Design authentication with passwords and OAuth"
You: Loading threat-modeling + secure-by-design-patterns + security-controls-design

Pattern 2: Design Review

User: "Review this plugin security design"
You: Loading architecture-security-review

Pattern 3: Classified System

User: "Build system handling TOP SECRET data"
You: Loading classified-systems-security + threat-modeling + secure-by-design-patterns

Pattern 4: Compliance Project

User: "Build HIPAA-compliant patient portal"
You: Loading compliance-awareness-and-mapping + threat-modeling + security-controls-design

Pattern 5: Security Documentation

User: "Document our MLS security decisions"
You: Loading documenting-threats-and-controls + muna/technical-writer/documentation-structure

When NOT to Load Security Skills

Don't load security skills for:

  • UI styling (colors, fonts, layouts)
  • Basic CRUD with existing, tested auth
  • Non-security refactoring (renaming variables, extracting functions)
  • Documentation that isn't security-related

Example: "Add dark mode toggle to settings" → No security skills needed (unless settings include security-sensitive preferences)


Quick Reference Table

Task Type Load These Skills Notes
New system design threat-modeling, secure-by-design-patterns, security-controls-design Load in order
Design review architecture-security-review Add threat-modeling if no threat analysis exists
Authentication threat-modeling, secure-by-design-patterns Consider authorization-and-accreditation if ATO needed
API security threat-modeling, architecture-security-review Apply STRIDE to endpoints
Classified data classified-systems-security + core skills Extension required
Compliance compliance-awareness-and-mapping + core skills Extension for regulatory contexts
Government ATO security-authorization-and-accreditation + core skills Extension for ATO/AIS
Document security documenting-threats-and-controls, muna/documentation-structure Cross-faction

Common Mistakes

❌ Loading All Skills at Once

Wrong: Load all 8 security-architect skills for every security task Right: Load only the skills your situation needs (use decision tree)

❌ Skipping Threat Modeling

Wrong: Jump straight to implementation for new security features Right: Always threat model first for new systems/features

❌ Using Core Skills for Specialized Contexts

Wrong: Use generic threat modeling for classified systems Right: Load classified-systems-security for MLS contexts

❌ Not Cross-Referencing Muna

Wrong: Write security docs without documentation structure skills Right: Load both ordis/documenting-threats + muna/documentation-structure


Examples

Example 1: Payment Processing System

User: "Design a payment processing microservice"

Your routing:
1. Recognize: New system + financial domain → security critical
2. Load: threat-modeling (identify payment-specific threats)
3. Load: secure-by-design-patterns (encryption, secrets management)
4. Load: security-controls-design (PCI-DSS controls)
5. Consider: compliance-awareness-and-mapping (PCI-DSS is compliance requirement)

Example 2: Simple Feature (No Security Needed)

User: "Add a favorites button to the UI"

Your routing:
1. Recognize: UI feature, uses existing auth, no new security surface
2. Decision: No security skills needed
3. Proceed with standard implementation

Example 3: Classified System Architecture

User: "Review architecture for system handling SECRET and UNCLASSIFIED data"

Your routing:
1. Recognize: Classified context (SECRET mentioned) + review task
2. Load: classified-systems-security (MLS patterns required)
3. Load: architecture-security-review (review process)
4. Load: threat-modeling (if threats not already modeled)

Phase 1 Note

Currently Available (Phase 1):

  • using-security-architect (this skill)
  • threat-modeling (in progress)

Coming Soon (Phases 2-3):

  • security-controls-design
  • architecture-security-review
  • secure-by-design-patterns
  • classified-systems-security
  • compliance-awareness-and-mapping
  • security-authorization-and-accreditation
  • documenting-threats-and-controls

For Phase 1: Focus on threat-modeling as primary skill. Reference other skills by name even though they're not implemented yet - this tests the routing logic.


Summary

This skill maps your situation → specific security skills to load.

  1. Identify your situation (new system, review, specialized context)
  2. Use decision tree to find applicable skills
  3. Load core skills for universal needs
  4. Add extension skills for specialized contexts
  5. Cross-reference Muna for documentation needs
  6. Don't load security skills when not needed

Meta-rule: When in doubt, start with threat-modeling. Threats drive everything else.