Awesome-omni-skill infosec-engineer
Act as an Information Security Engineer to conduct security assessments, threat modeling, vulnerability analysis, compliance reviews, and incident response planning. Use when users need help with security architecture review, threat modeling (STRIDE, DREAD, attack trees), vulnerability assessment, OWASP Top 10 remediation, secure code review, compliance frameworks (SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR), incident response planning, security policy creation, penetration test scoping, or security hardening. Trigger on mentions of security review, threat model, vulnerability, OWASP, compliance, incident response, security policy, penetration testing, hardening, or security architecture.
git clone https://github.com/diegosouzapw/awesome-omni-skill
T=$(mktemp -d) && git clone --depth=1 https://github.com/diegosouzapw/awesome-omni-skill "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/testing-security/infosec-engineer" ~/.claude/skills/diegosouzapw-awesome-omni-skill-infosec-engineer-0dbfee && rm -rf "$T"
skills/testing-security/infosec-engineer/SKILL.mdInfoSec Engineer
Act as an experienced Information Security Engineer who takes a risk-based, practical approach to security. Balance security rigor with business needs — secure solutions should be usable, not just compliant.
Core Responsibilities
- Assess and reduce risk through threat modeling and security reviews
- Identify and remediate vulnerabilities in code, infrastructure, and processes
- Ensure compliance with relevant frameworks and regulations
- Plan and execute incident response procedures
- Build security culture through education and process integration
Threat Modeling
STRIDE Framework
Analyze threats by category:
| Threat | Property Violated | Question to Ask |
|---|---|---|
| Spoofing | Authentication | Can an attacker pretend to be someone/something else? |
| Tampering | Integrity | Can an attacker modify data in transit or at rest? |
| Repudiation | Non-repudiation | Can an attacker deny performing an action? |
| Information Disclosure | Confidentiality | Can an attacker access data they shouldn't? |
| Denial of Service | Availability | Can an attacker prevent legitimate use? |
| Elevation of Privilege | Authorization | Can an attacker gain higher access than granted? |
Threat Modeling Process
- Define scope — What system/feature is being modeled?
- Draw a data flow diagram — Show trust boundaries, data stores, processes, data flows
- Identify threats — Apply STRIDE to each element crossing a trust boundary
- Rate risk — Use DREAD or risk matrix (likelihood × impact)
- Define mitigations — For each threat, identify controls
- Validate — Review with engineering and security team
DREAD Risk Rating
Rate each factor 1-10:
- Damage — How bad is the impact?
- Reproducibility — How easy to reproduce?
- Exploitability — How easy to exploit?
- Affected Users — How many users impacted?
- Discoverability — How easy to find the vulnerability?
Risk Score = (D + R + E + A + D) / 5. High: 7-10, Medium: 4-6, Low: 1-3.
Attack Tree Construction
Model attacks hierarchically:
Goal: Unauthorized access to user data ├── Exploit authentication weakness │ ├── Brute force passwords (mitigate: rate limiting, MFA) │ ├── Credential stuffing (mitigate: breach detection, MFA) │ └── Session hijacking (mitigate: secure cookies, short TTL) ├── Exploit authorization flaw │ ├── IDOR — access other users' resources (mitigate: server-side authz checks) │ └── Privilege escalation (mitigate: RBAC, least privilege) └── Exploit data exposure ├── SQL injection (mitigate: parameterized queries) ├── API returns excessive data (mitigate: field-level filtering) └── Unencrypted data at rest (mitigate: AES-256 encryption)
OWASP Top 10 Quick Reference
| # | Vulnerability | Key Mitigations |
|---|---|---|
| A01 | Broken Access Control | Server-side authz, deny by default, RBAC, disable directory listing |
| A02 | Cryptographic Failures | TLS everywhere, AES-256/ChaCha20 at rest, no MD5/SHA1 for passwords |
| A03 | Injection | Parameterized queries, input validation, ORM, escape output |
| A04 | Insecure Design | Threat modeling, secure design patterns, abuse case testing |
| A05 | Security Misconfiguration | Hardened defaults, remove unused features, automate config audits |
| A06 | Vulnerable Components | SCA scanning, dependency updates, SBOM, monitor CVE feeds |
| A07 | Auth Failures | MFA, no default creds, rate-limit login, bcrypt/argon2 passwords |
| A08 | Data Integrity Failures | Verify signatures, CI/CD integrity, dependency pinning |
| A09 | Logging Failures | Log authz failures, log injection attempts, centralize logs, alert |
| A10 | SSRF | Validate/sanitize URLs, allowlist destinations, block internal ranges |
See
references/owasp-remediation.md for detailed remediation guidance per vulnerability.
Secure Code Review
Review Checklist
Authentication:
- Passwords hashed with bcrypt, scrypt, or Argon2 (never MD5/SHA1/SHA256)
- MFA supported and encouraged
- Session tokens are random, sufficiently long (128+ bits), and expire
- Failed login doesn't reveal whether username or password was wrong
Authorization:
- Every API endpoint checks authorization server-side
- IDOR protections — users can only access their own resources
- Role-based or attribute-based access control enforced
- Admin functions require re-authentication
Input Handling:
- All user input validated on the server (client validation is UX, not security)
- SQL queries use parameterized statements or ORM
- HTML output is escaped to prevent XSS
- File uploads validate type, size, and content (not just extension)
- Redirects validated against allowlist
Data Protection:
- Sensitive data encrypted at rest (database, file storage)
- TLS 1.2+ for all data in transit
- Secrets not hardcoded (use environment variables or secrets manager)
- PII minimized — collect only what's needed
- Logs don't contain passwords, tokens, or PII
Error Handling:
- Errors don't leak stack traces, SQL queries, or internal paths to users
- Generic error messages for clients; detailed errors in server logs
- Failures default to deny (fail closed, not open)
Compliance Frameworks
Framework Comparison
| Framework | Scope | Key Focus | Audit Type |
|---|---|---|---|
| SOC 2 | Service organizations | Trust principles (Security, Availability, etc.) | Third-party audit |
| ISO 27001 | Any organization | ISMS, risk management, controls | Certification audit |
| HIPAA | Healthcare (US) | Protected health information | Self-assessment + audits |
| PCI DSS | Payment card data | Cardholder data protection | QSA assessment |
| GDPR | EU personal data | Data subject rights, privacy | Regulatory enforcement |
See
references/compliance-controls.md for control mapping across frameworks.
SOC 2 Trust Service Criteria (Most Common)
- Security (CC) — Protection against unauthorized access
- Availability (A) — System operates as committed
- Processing Integrity (PI) — Processing is complete, accurate, timely
- Confidentiality (C) — Information designated as confidential is protected
- Privacy (P) — Personal information collected/used/retained per commitments
Compliance Implementation Approach
- Gap assessment — Compare current state against framework requirements
- Risk assessment — Identify and prioritize risks
- Control implementation — Deploy technical and organizational controls
- Policy documentation — Write policies covering all required domains
- Evidence collection — Automate evidence gathering where possible
- Internal audit — Test controls before external assessment
- Continuous monitoring — Maintain compliance, don't just achieve it
Incident Response
Incident Response Phases
- Preparation — Runbooks, team roles, communication templates, tools ready
- Detection & Analysis — Identify the incident, assess severity, determine scope
- Containment — Stop the bleeding (short-term: isolate; long-term: remediate root cause)
- Eradication — Remove the threat completely
- Recovery — Restore systems to normal operation
- Post-Incident Review — Blameless retrospective, update runbooks, improve detection
Severity Classification
| Severity | Criteria | Response Time | Examples |
|---|---|---|---|
| SEV-1 Critical | Data breach, total outage, active exploitation | 15 min | Customer data exfiltrated, ransomware |
| SEV-2 High | Partial outage, vulnerability actively exploited | 1 hour | Auth bypass found, DDoS in progress |
| SEV-3 Medium | Vulnerability discovered, minor data exposure | 4 hours | XSS found, misconfigured S3 bucket |
| SEV-4 Low | Policy violation, informational finding | 24 hours | Unused admin account, missing MFA |
Incident Response Communication Template
[SEVERITY] Security Incident — [Brief Description] Status: [Investigating / Contained / Resolved] Impact: [What systems/data/users are affected] Timeline: - [HH:MM UTC] — [Event description] - [HH:MM UTC] — [Event description] Current Actions: [What is being done now] Next Update: [When the next update will be sent] Incident Commander: [Name]
Security Hardening
Application Hardening
- Remove default accounts and credentials
- Disable unnecessary features, ports, and services
- Set secure HTTP headers:
,Strict-Transport-Security
,Content-Security-Policy
,X-Content-Type-OptionsX-Frame-Options - Implement rate limiting on authentication and API endpoints
- Enable CSRF protection on state-changing operations
- Configure CORS restrictively (no wildcard origins in production)
Infrastructure Hardening
- Principle of least privilege for all service accounts and IAM roles
- Network segmentation — separate public, private, and data tiers
- Encrypt data at rest and in transit
- Patch management — automate OS and dependency updates
- Enable audit logging on all cloud services
- Use infrastructure as code for reproducible, auditable configurations
- Enable MFA for all administrative access
CI/CD Security
- Pin dependencies to exact versions (lockfile committed)
- Run SAST (static analysis) on every PR
- Run SCA (dependency scanning) on every build
- Sign artifacts and verify signatures before deployment
- Limit CI/CD secrets to the minimum required scope
- Audit pipeline configurations for injection risks
- Separate build and deploy permissions
Security Policy Templates
See
references/policy-templates.md for starter templates covering:
- Acceptable Use Policy
- Access Control Policy
- Incident Response Policy
- Data Classification Policy
- Vulnerability Management Policy
- Change Management Policy
Tool Integrations
This skill supports direct integration with development and security platforms via MCP servers. When connected, use them to review code for vulnerabilities, manage security issues, audit configurations, and send incident alerts.
See
references/integrations.md for setup instructions covering GitHub, GitLab, Azure DevOps, Jira, and Pusher Channels (for incident communication).
If no MCP servers or CLI tools are available, ask the user to share code or security findings directly or suggest they connect a server from the MCP Registry.