Perform threat modeling, risk assessment, and control review using OWASP ASVS framework and data classification. Identify threats (STRIDE), prioritize by risk (likelihood × impact), design mitigations, and escalate policy/legal decisions. Prefer `sec-security-vulnerability-analysis` for scanner-style findings and `sec-static-code-analysis` for source-level checks.
Review threats, data handling, secrets, permissions, and compliance-sensitive aspects of proposed work.
HUS-* story in execution-plan/backlog/ with the threat ID, risk score, proposed mitigation or justification, and a clear approve / reject / defer decision. Record the decision using gov-review-gate-management. Do not proceed past the risk until the story is approved.sec-static-code-analysis (SAST hotspots needing architecture review), sec-security-vulnerability-analysis (dependency/secret scanning), and pipeline/release packages (risk-controlled gates).docs/guidelines/shared-operating-policy.md#guideline-lookup.docs/guidelines/shared-operating-policy.md#story-maintenance for backlog, evidence, and follow-up updates tied to this skill.docs/guidelines/shared-operating-policy.md#completion-checklist as the default completion gate for this skill.HUS-* story approved by security lead, product owner, and (if required) legal/compliance.HUS-* story in execution-plan/backlog/ with reviewer name and date; security lead, product owner, and (if required) legal/compliance recorded as reviewers.Key threats: Session hijacking (HTTPS mitigation), API key exposure (vault + rotation), transaction tampering (webhook signature verification), privilege escalation (RBAC). Mitigations: HTTPS+HSTS, 15-min timeouts, encrypted API key storage, ASVS L2 controls. See risk-review.template.md for full structure.
Key threats: Service tampering shared data (mitigate: service-specific DB credentials + RLS), privilege escalation via superuser account (mitigate: remove superuser, grant minimal role), Kafka payload in plaintext (mitigate: TLS + encryption). ASVS L2 mapping: V4 (access control), V6 (encryption in flight).
Finding: CodeQL flags SELECT * FROM users WHERE id = ${input} as SQL injection. Assessment: Parameterized query (false positive); auth check validates user_id ↔ request.user_id (RLS blocks exploitation). Decision: Suppress with rationale; update tool rule when available.
risk-review.template.md — Structured output template with threat summary, control inventory, risk scoring, and multi-signer approval.threat-modeling-guide.md — OWASP 4-question framework, STRIDE methodology, DFD template, and practical scenarios.asvs-checklist-guide.md — OWASP ASVS 4.0 quick reference with verification levels, control mappings, and level selection.data-classification-framework.md — Data sensitivity levels (L1-L4), handling rules, and classification scenarios.auth-secrets-architecture-guide.md — Authentication patterns, secrets lifecycle, and trust architecture design.