Use this skill for security architecture design. Trigger on security design, data protection, encryption, PCI, Kafka security, API security, data at rest, data in transit, database protection, or any solution requiring security architecture. Covers transit encryption, data at rest, Kafka and database security, PCI patterns, and API Gateway connectivity. Always included in Solution Intent.
This skill designs security architecture across all layers of a solution: data in transit, data at rest, messaging platform security, database protection, PCI compliance patterns, and API Gateway connectivity. Security is designed in — not bolted on after.
Read references/security-standards.md for company security requirements, approved
encryption standards, PCI patterns, and API Gateway connectivity rules.
[initiative-name]-security.mdAll data moving between systems must be encrypted in transit.
| Connection | Protocol | TLS Version | Certificate Management |
|---|---|---|---|
| External client → API Gateway |
| HTTPS |
| TLS 1.2+ |
| [Company-managed cert] |
| Internal service → service | mTLS / TLS | TLS 1.2+ | [Internal CA / service mesh] |
| Service → Database | TLS | TLS 1.2+ | [DB-specific cert] |
| Service → Kafka | TLS + SASL | TLS 1.2+ | [Kafka-specific config] |
See references/security-standards.md — Data in Transit for approved cipher suites
and certificate authority requirements.
| Data Store | Encryption | Key Management | Classification |
|---|---|---|---|
| [Database] | AES-256 | [Company KMS / HSM] | [PII / PCI / Internal] |
| [File storage] | SSE | [Company KMS] | [Classification] |
| [Kafka topic] | [Encryption approach] | [Key management] | [Classification] |
Data classification drives encryption requirements — see references/security-standards.md
for classification tiers and required controls per tier.
Kafka topics containing sensitive data require additional controls beyond transport encryption:
See references/security-standards.md — Kafka Security for approved ACL patterns
and message-level encryption approach.
See references/security-standards.md — Database Protection.
If the solution handles payment card data:
references/security-standards.md — PCI PatternsFlag any in-scope PCI components explicitly with ⚠️ PCI.
For any API exposed externally or consumed by external systems:
| Pattern | Use Case | Required Controls |
|---|---|---|
| External consumer → API Gateway | Third-party or partner access | OAuth2 / API key, rate limiting, WAF |
| Internal service → internal API | Service-to-service | mTLS / service identity, internal gateway |
| Mobile / browser → API | End-user facing | OAuth2 PKCE, CORS policy, WAF |
See references/security-standards.md — API Gateway Patterns for company-approved
authentication flows and gateway configuration standards.
# [Initiative Name] — Security Design
## Data Classification
[What data this solution handles and its classification]
## Data in Transit
[Connection table: protocol, TLS, cert management]
## Data at Rest
[Store table: encryption, key management, classification]
## Kafka Security (if applicable)
[ACLs, message encryption, audit]
## Database Protection
[Auth, authz, network isolation, audit, backup]
## PCI Scope (if applicable)
[In-scope components, scope reduction, approved patterns]
## API Gateway Connectivity
[External and internal access patterns]
## Identity & Access Management
[Human and service identity, secrets management]
## Security Risks
[Residual risks and mitigations]
references/security-standards.md — Company security requirements: approved encryption
standards, Kafka security patterns, database protection controls, PCI patterns,
API Gateway connectivity standards, and data classification tiers.
TODO: Populate with your organization's security standards and requirements.