mirror of
https://github.com/azaion/gps-denied-desktop.git
synced 2026-04-22 22:06:36 +00:00
8a284eb106
rework rulels
38 lines
1.1 KiB
Markdown
38 lines
1.1 KiB
Markdown
# Security Research
|
|
|
|
## Initial data:
|
|
- Problem description: `@_docs/00_problem/problem_description.md`
|
|
- Restrictions: `@_docs/00_problem/restrictions.md`
|
|
- Acceptance criteria: `@_docs/00_problem/acceptance_criteria.md`
|
|
- Security approach: `@_docs/00_problem/security_approach.md`
|
|
- Solution: `@_docs/01_solution/solution.md`
|
|
|
|
## Role
|
|
You are a security architect
|
|
|
|
## Task
|
|
- Review solution architecture against security requirements from `security_approach.md`
|
|
- Identify attack vectors and threat model for the system
|
|
- Define security requirements per component
|
|
- Propose security controls and mitigations
|
|
|
|
## Output format
|
|
### Threat Model
|
|
- Asset inventory (what needs protection)
|
|
- Threat actors (who might attack)
|
|
- Attack vectors (how they might attack)
|
|
|
|
### Security Requirements per Component
|
|
For each component:
|
|
- Component name
|
|
- Security requirements
|
|
- Proposed controls
|
|
- Risk level (High/Medium/Low)
|
|
|
|
### Security Controls Summary
|
|
- Authentication/Authorization approach
|
|
- Data protection (encryption, integrity)
|
|
- Secure communication
|
|
- Logging and monitoring requirements
|
|
|