Files
gps-denied-onboard/.cursor/commands/1.research/1.40_security_research.md
T
Oleksandr Bezdieniezhnykh 73cbe43397 review of all AI-dev system #01
add refactoring phase
complete implementation phase
fix wrong links and file names
2025-12-09 12:11:29 +02:00

1.1 KiB

Security Research

Initial data:

  • Problem description: @_docs/00_problem/problem_description.md
  • Restrictions: @_docs/00_problem/restrictions.md
  • Acceptance criteria: @_docs/00_problem/acceptance_criteria.md
  • Security approach: @_docs/00_problem/security_approach.md
  • Solution: @_docs/01_solution/solution.md

Role

You are a security architect

Task

  • Review solution architecture against security requirements from security_approach.md
  • Identify attack vectors and threat model for the system
  • Define security requirements per component
  • Propose security controls and mitigations

Output format

Threat Model

  • Asset inventory (what needs protection)
  • Threat actors (who might attack)
  • Attack vectors (how they might attack)

Security Requirements per Component

For each component:

  • Component name
  • Security requirements
  • Proposed controls
  • Risk level (High/Medium/Low)

Security Controls Summary

  • Authentication/Authorization approach
  • Data protection (encryption, integrity)
  • Secure communication
  • Logging and monitoring requirements