threat-mitigation-mapping

Installation
Summary

Map identified threats to appropriate security controls and mitigations for effective defense-in-depth planning.

  • Provides control categorization by type (preventive, detective, corrective) and layer (network, application, data, endpoint, process), with templates for building threat-to-control mappings and calculating coverage gaps
  • Includes a standard control library with 15+ pre-built controls covering authentication, encryption, logging, access control, and availability, each mapped to STRIDE threat categories and compliance frameworks
  • Offers analysis tools to identify unmapped threats, calculate risk reduction percentages, detect defense-in-depth weaknesses, and generate phased implementation roadmaps prioritized by threat criticality
  • Supports control effectiveness testing, budget-constrained optimization, and comprehensive reporting for security architecture reviews and remediation planning
SKILL.md

Threat Mitigation Mapping

Connect threats to controls for effective security planning.

When to Use This Skill

  • Prioritizing security investments
  • Creating remediation roadmaps
  • Validating control coverage
  • Designing defense-in-depth
  • Security architecture review
  • Risk treatment planning

Core Concepts

1. Control Categories

Preventive ────► Stop attacks before they occur
Related skills

More from wshobson/agents

Installs
6.1K
Repository
wshobson/agents
GitHub Stars
35.3K
First Seen
Jan 20, 2026