cybersecurity-analyst

Analyzes security risks, threats, and vulnerabilities using industry frameworks like STRIDE, MITRE ATT&CK, and CIA triad. Applies threat modeling, attack surface analysis, and defense-in-depth principles to identify security weaknesses across systems, applications, and architectures Evaluates confidentiality, integrity, and availability risks; assesses threat actors, attack vectors, and defensive control effectiveness Provides incident analysis, vulnerability assessment, security architecture review, and risk-based remediation recommendations aligned to NIST, ISO 27001, and compliance standards Covers detection and response capabilities, zero-trust design, and supply chain security considerations for comprehensive security posture evaluation

INSTALLATION
npx skills add https://github.com/rysweet/amplihack --skill cybersecurity-analyst
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

$2c

Cybersecurity analysis rests on fundamental principles:

Defense in Depth: No single security control is perfect. Layer multiple independent controls so compromise of one doesn't compromise the whole system.

Assume Breach: Modern security assumes attackers will penetrate perimeter defenses. Design systems to minimize damage and enable detection when (not if) breach occurs.

Least Privilege: Grant minimum access necessary for legitimate function. Every excess permission is an opportunity for exploitation.

Zero Trust: Never trust, always verify. Verify explicitly, use least privilege access, and assume breach regardless of network location.

Security by Design: Security cannot be bolted on afterward. It must be fundamental to architecture and implementation from the beginning.

CIA Triad: Security protects three properties—Confidentiality (only authorized access), Integrity (only authorized modification), Availability (accessible when needed).

Threat-Informed Defense: Base defensive priorities on understanding of actual threat actors, their capabilities, motivations, and tactics (threat intelligence).

Risk-Based Approach: Perfect security is impossible. Prioritize security investments based on risk (likelihood × impact) to maximize security per dollar spent.

Theoretical Foundations (Expandable)

Foundation 1: CIA Triad (Classic Security Model)

Components:

Confidentiality: Information accessible only to authorized entities

  • Protection mechanisms: Encryption, access controls, authentication
  • Threats: Eavesdropping, data theft, unauthorized disclosure
  • Example violations: Data breach, password theft, insider leak

Integrity: Information modifiable only by authorized entities in authorized ways

  • Protection mechanisms: Hashing, digital signatures, access controls, version control
  • Threats: Tampering, unauthorized modification, malware
  • Example violations: Database manipulation, man-in-the-middle attacks, ransomware encryption

Availability: Information and systems accessible when needed by authorized entities

  • Protection mechanisms: Redundancy, backups, DDoS mitigation, incident response
  • Threats: Denial of service, ransomware, system destruction
  • Example violations: DDoS attacks, ransomware, infrastructure failures

Extensions:

  • Authenticity: Verified identity of entities and origin of information
  • Non-repudiation: Cannot deny taking action
  • Accountability: Actions traceable to entities

Application: Every security analysis should identify which aspects of CIA triad are at risk and how controls protect each.

Sources:

Foundation 2: Defense in Depth (Layered Security)

Principle: Deploy multiple layers of security controls so compromise of one layer doesn't compromise entire system.

Historical Origin: Military defensive strategy—multiple concentric perimeter defenses

Security Layers:

  • Physical: Facility access controls, locked server rooms
  • Network: Firewalls, network segmentation, IDS/IPS
  • Host: Endpoint protection, host firewalls, patch management
  • Application: Input validation, secure coding, authentication
  • Data: Encryption at rest and in transit, DLP, tokenization
  • Human: Security awareness training, phishing simulation

Key Insight: Redundancy is not waste—it's resilience. Even if attacker bypasses firewall, they still face authentication, authorization, monitoring, encryption, and detection controls.

Application: Security architecture should have multiple independent defensive layers protecting critical assets.

Limitation: Can create complexity and false sense of security if layers are not maintained or are interdependent.

Sources:

Foundation 3: Zero Trust Architecture

Core Principle: "Never trust, always verify" regardless of network location

Contrast with Perimeter Model: Traditional security assumed internal network is trusted ("castle and moat"). Zero trust assumes no network location is trusted.

Key Tenets (NIST SP 800-207):

  • Verify explicitly: Always authenticate and authorize based on all available data points
  • Least privilege access: Limit user access with Just-In-Time and Just-Enough-Access
  • Assume breach: Minimize blast radius and segment access; verify end-to-end encryption

Components:

  • Identity-centric security: Identity becomes new perimeter
  • Micro-segmentation: Network divided into small zones with separate controls
  • Continuous verification: Authentication and authorization are continuous, not one-time
  • Data-centric: Protect data itself, not just perimeter around it

Drivers:

  • Cloud adoption (no clear perimeter)
  • Remote work (users outside traditional perimeter)
  • Sophisticated attacks (perimeter breaches common)

Application: Modern security architectures should be designed with zero trust principles, especially for cloud and hybrid environments.

Sources:

Foundation 4: Threat Modeling

Definition: Structured approach to identify and prioritize potential threats to a system

Purpose: Proactively identify security issues during design phase when fixes are cheapest

Benefits:

  • Find vulnerabilities before implementation
  • Prioritize security work
  • Communicate risks to stakeholders
  • Guide security testing

Common Methodologies:

STRIDE (Microsoft):

  • Spoofing identity
  • Tampering with data
  • Repudiation
  • Information disclosure
  • Denial of service
  • Elevation of privilege

PASTA (Process for Attack Simulation and Threat Analysis):

  • Seven-stage risk-centric methodology
  • Aligns business objectives with technical requirements

VAST (Visual, Agile, and Simple Threat modeling):

  • Scalable for agile development
  • Two types: application threat models and operational threat models

Application: Use threat modeling for new features, architecture changes, or security reviews.

Sources:

Foundation 5: MITRE ATT&CK Framework

Description: Knowledge base of adversary tactics and techniques based on real-world observations

Purpose: Understand how attackers operate to inform defense, detection, and threat hunting

Structure:

  • Tactics: High-level goals (e.g., Initial Access, Execution, Persistence, Privilege Escalation)
  • Techniques: Ways to achieve tactics (e.g., Phishing, Exploiting Public Applications)
  • Sub-techniques: Specific implementations
  • Procedures: Specific attacker behaviors

14 Tactics (Enterprise Matrix):

  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
  • Exfiltration
  • Impact

Application:

  • Map defensive controls to ATT&CK techniques
  • Identify detection gaps
  • Threat intelligence sharing
  • Red team/purple team exercises

Value: Common language for describing attacker behavior; basis for threat-informed defense

Sources:

Core Analytical Frameworks (Expandable)

Framework 1: Attack Surface Analysis

Definition: Identification and assessment of all points where unauthorized user could enter or extract data from system

Components:

Attack Surface Elements:

  • Network attack surface: Exposed ports, services, protocols
  • Software attack surface: Applications, APIs, web interfaces
  • Human attack surface: Users, administrators, social engineering targets
  • Physical attack surface: Facility access, hardware access

Attack Vectors: Methods attackers use to exploit attack surface

  • Network-based: Port scanning, protocol exploits, man-in-the-middle
  • Web-based: SQL injection, XSS, CSRF, authentication bypass
  • Email-based: Phishing, malicious attachments, credential harvesting
  • Physical: Theft, unauthorized access, evil maid attacks
  • Social engineering: Pretexting, baiting, tailgating

Analysis Process:

  • Enumerate: List all entry points and assets
  • Classify: Categorize by type and criticality
  • Assess: Evaluate exploitability and impact
  • Prioritize: Rank by risk
  • Reduce: Minimize unnecessary exposure

Metrics:

  • Number of exposed services
  • Number of internet-facing applications
  • Number of privileged accounts
  • Lines of code exposed to untrusted input

Application: Reducing attack surface is fundamental defensive strategy. Eliminate unnecessary exposure.

Sources:

Framework 2: Risk Assessment Frameworks

Purpose: Quantify and prioritize security risks to guide resource allocation

Common Frameworks:

CVSS (Common Vulnerability Scoring System):

  • Standard for assessing vulnerability severity
  • Score 0-10 based on exploitability, impact, scope
  • Base score (intrinsic characteristics) + temporal + environmental scores
  • Widely used but criticized for not capturing actual risk in specific contexts

FAIR (Factor Analysis of Information Risk):

  • Quantitative risk framework
  • Risk = Loss Event Frequency × Loss Magnitude
  • Enables cost-benefit analysis of security investments
  • More complex but provides dollar-denominated risk figures

NIST Risk Management Framework (RMF):

  • Seven steps: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor
  • Links security controls to risk management
  • Used by U.S. federal agencies

Qualitative vs. Quantitative:

  • Qualitative: High/Medium/Low risk ratings (simpler, faster, subjective)
  • Quantitative: Numerical risk values (complex, objective, requires data)

Application: Risk assessment informs prioritization. Not all vulnerabilities are equally important—focus on highest risks.

Sources:

Framework 3: Security Control Frameworks

Purpose: Structured set of security controls to achieve security objectives

Major Frameworks:

NIST Cybersecurity Framework:

  • Five core functions: Identify, Protect, Detect, Respond, Recover
  • Not prescriptive—flexible for different organizations
  • Widely adopted across industries and internationally

NIST SP 800-53 (Security and Privacy Controls):

  • Comprehensive catalog of security controls for federal systems
  • 20 control families (Access Control, Incident Response, etc.)
  • Detailed implementation guidance

CIS Controls (Center for Internet Security):

  • 18 prioritized security controls
  • Implementation groups (IG1, IG2, IG3) based on organizational maturity
  • Actionable and measurable

ISO/IEC 27001:

  • International standard for information security management systems
  • 14 control domains, 114 controls
  • Certification available

Application: Use frameworks to:

  • Ensure comprehensive coverage
  • Benchmark security posture
  • Communicate with stakeholders
  • Meet compliance requirements

Sources:

Framework 4: Incident Response Lifecycle

Definition: Structured approach to handling security incidents

Standard Model (NIST SP 800-61):

Phase 1: Preparation

  • Establish IR capability, tools, playbooks
  • Training and exercises
  • Communication plans

Phase 2: Detection and Analysis

  • Monitoring and alerting
  • Incident classification and prioritization
  • Initial investigation
  • Scope determination

Phase 3: Containment, Eradication, and Recovery

  • Containment: Stop spread (short-term and long-term)
  • Eradication: Remove threat from environment
  • Recovery: Restore systems to normal operation

Phase 4: Post-Incident Activity

  • Lessons learned
  • Evidence preservation
  • Incident report
  • Process improvement

Key Concepts:

  • Playbooks: Predefined procedures for common incident types
  • Indicators of Compromise (IoCs): Artifacts indicating malicious activity
  • Chain of custody: Evidence handling procedures
  • Communication: Internal and external stakeholders, legal, PR

Metrics:

  • Mean Time to Detect (MTTD)
  • Mean Time to Respond (MTTR)
  • Mean Time to Contain (MTTC)

Application: Effective incident response minimizes damage, reduces recovery time, and captures learning.

Sources:

Framework 5: Secure Development Lifecycle (SDL)

Purpose: Integrate security into software development process

Microsoft SDL Phases:

  • Training: Security training for developers
  • Requirements: Define security requirements and privacy requirements
  • Design: Threat modeling, attack surface reduction, defense in depth
  • Implementation: Secure coding standards, code analysis tools
  • Verification: Security testing (SAST, DAST, penetration testing)
  • Release: Final security review, incident response plan
  • Response: Execute incident response plan if vulnerability discovered

Key Practices:

  • Static Analysis (SAST): Analyze source code for vulnerabilities
  • Dynamic Analysis (DAST): Test running application
  • Dependency Scanning: Check third-party libraries for known vulnerabilities
  • Penetration Testing: Simulate real attacks
  • Security Champions: Embed security expertise in development teams

OWASP SAMM (Software Assurance Maturity Model):

  • Maturity model for secure software development
  • Five business functions: Governance, Design, Implementation, Verification, Operations
  • Three maturity levels for each function

Application: Security must be integrated throughout development lifecycle, not just at the end.

Sources:

Methodological Approaches (Expandable)

Method 1: Threat Intelligence Analysis

Purpose: Understand adversaries, their capabilities, tactics, and targets to inform defense

Types of Threat Intelligence:

Strategic: High-level trends for executives

  • APT group activity and motivations
  • Geopolitical cyber threats
  • Industry-specific threat landscape

Operational: Campaign-level information for security operations

  • Current attack campaigns
  • Threat actor TTPs
  • Malware families

Tactical: Technical indicators for immediate defense

  • IP addresses, domains, file hashes
  • YARA rules, Snort signatures
  • CVEs being exploited

Analytical Process:

  • Collection: Gather data from internal sources, threat feeds, OSINT, dark web
  • Processing: Normalize, correlate, deduplicate
  • Analysis: Contextualize, attribute, assess intent and capability
  • Dissemination: Share with relevant teams in actionable format
  • Feedback: Assess effectiveness and refine

Frameworks:

  • Diamond Model: Adversary, Capability, Infrastructure, Victim
  • Kill Chain: Reconnaissance → Weaponization → Delivery → Exploitation → Installation → C2 → Actions on Objectives
  • MITRE ATT&CK: Map observed techniques to ATT&CK matrix

Application: Threat intelligence enables proactive, threat-informed defense rather than generic security measures.

Sources:

Method 2: Penetration Testing

Definition: Authorized simulated attack to evaluate security of systems

Types:

Black Box: No prior knowledge (simulates external attacker)

Gray Box: Partial knowledge (simulates insider or compromised user)

White Box: Full knowledge (comprehensive security assessment)

Phases (Penetration Testing Execution Standard):

  • Pre-engagement: Scope, rules of engagement, legal agreements
  • Intelligence gathering: OSINT, network scanning, service enumeration
  • Threat modeling: Identify potential attack vectors
  • Vulnerability analysis: Identify exploitable weaknesses
  • Exploitation: Attempt to exploit vulnerabilities
  • Post-exploitation: Assess impact, lateral movement, privilege escalation
  • Reporting: Document findings, demonstrate impact, provide remediation guidance

Specialized Types:

  • Web application penetration testing: Focus on OWASP Top 10
  • Network penetration testing: Internal and external network
  • Social engineering: Phishing, vishing, physical intrusion
  • Wireless penetration testing: WiFi security assessment

Red Team vs. Penetration Testing:

  • Penetration testing: Find as many vulnerabilities as possible
  • Red teaming: Goal-oriented (e.g., access specific data), simulates APT, tests detection and response

Application: Regular penetration testing validates effectiveness of controls and identifies gaps before attackers do.

Sources:

Method 3: Security Architecture Review

Purpose: Evaluate system design for security properties and identify architectural vulnerabilities

Review Dimensions:

Structural Analysis:

  • Trust boundaries and data flows
  • Authentication and authorization architecture
  • Network segmentation and isolation
  • Data classification and protection

Threat Modeling:

  • Apply STRIDE or other methodology
  • Identify attack trees
  • Assess mitigations for identified threats

Control Assessment:

  • Map controls to CIA triad
  • Evaluate defense-in-depth layers
  • Identify single points of failure

Compliance Review:

  • Check against security frameworks (NIST, CIS, ISO)
  • Regulatory requirements (PCI-DSS, HIPAA, SOC 2)

Technology Assessment:

  • Cryptographic implementation
  • Secure protocols
  • Patch management approach
  • Secret management

Analysis Questions:

  • What are trust boundaries?
  • Where does sensitive data flow?
  • How is authentication/authorization enforced?
  • What happens if component X is compromised?
  • Are security assumptions documented and validated?

Outputs:

  • Architecture diagrams with security annotations
  • Threat model
  • Risk assessment
  • Remediation recommendations

Application: Architecture review during design phase prevents expensive security issues in production.

Method 4: Vulnerability Assessment and Management

Purpose: Systematically identify, classify, prioritize, and remediate security weaknesses

Process:

Phase 1: Discovery

  • Asset inventory (what do we have?)
  • Vulnerability scanning (automated tools)
  • Manual security testing
  • Code review (static analysis)

Phase 2: Assessment

  • Classify vulnerabilities by type and severity
  • Assess exploitability (is there exploit code? Is it being exploited?)
  • Determine impact (what data/systems at risk?)
  • Calculate risk score (CVSS, contextual factors)

Phase 3: Prioritization

  • Rank by risk (likelihood × impact)
  • Consider threat intelligence (is it being exploited in wild?)
  • Business criticality of affected assets
  • Remediation complexity

Phase 4: Remediation

  • Patching (ideal)
  • Configuration changes
  • Compensating controls (if patching impossible)
  • Accept risk (document and approve)

Phase 5: Verification

  • Rescan to confirm remediation
  • Update vulnerability database
  • Track metrics (time to remediate, vulnerability density)

Challenges:

  • Alert fatigue (too many findings)
  • False positives
  • Patching disruption
  • Legacy systems

Best Practices:

  • Risk-based prioritization (not just CVSS)
  • SLA-based remediation (Critical: 7 days, High: 30 days, etc.)
  • Automate where possible
  • Track trends and metrics

Application: Continuous vulnerability management is essential hygiene. Can't fix what you don't know about.

Sources:

Method 5: Security Monitoring and Detection Engineering

Purpose: Design and operate capabilities to detect malicious activity

Components:

Data Sources:

  • Network traffic (NetFlow, full packet capture)
  • Endpoint logs (process creation, file access, registry changes)
  • Authentication logs (logins, privilege escalation)
  • Application logs (errors, transactions)
  • Cloud APIs and audit logs

Detection Mechanisms:

Signature-based: Known malicious patterns (antivirus, IDS signatures)

  • Pros: Low false positives, fast
  • Cons: Only detects known threats

Anomaly-based: Deviations from baseline behavior

  • Pros: Can detect novel attacks
  • Cons: High false positives, requires tuning

Heuristic-based: Rules based on attacker behavior patterns

  • Pros: Detects variations of known attacks
  • Cons: Requires security expertise to create rules

Threat intelligence-based: Match against known IoCs

  • Pros: Leverages collective knowledge
  • Cons: Reactive (indicators discovered post-compromise)

Detection Development:

  • Understand attacker technique (MITRE ATT&CK)
  • Identify data sources that capture technique
  • Develop detection logic
  • Test against true positives and false positives
  • Tune threshold and logic
  • Document detection and response procedures
  • Monitor effectiveness and iterate

SIEM and SOC:

  • SIEM: Aggregate, correlate, and analyze security logs
  • SOC: Security Operations Center—team that monitors alerts and responds to incidents

Metrics:

  • Detection coverage (% of ATT&CK techniques covered)
  • Alert volume and quality
  • False positive rate
  • Mean Time to Detect (MTTD)

Application: You can't respond to what you don't detect. Invest in detection capabilities aligned to threats you face.

Sources:

Analysis Rubric

What to Examine

Assets and Data:

  • What sensitive data exists? (PII, credentials, trade secrets, financial data)
  • Where is it stored, processed, transmitted?
  • Who has access?
  • What is business impact if compromised? (confidentiality, integrity, availability)

Attack Surface:

  • What systems are exposed to internet?
  • What are entry points for attackers?
  • What authentication is required?
  • What third-party dependencies exist?

Threat Actors:

  • Who might target this? (Nation-states, cybercriminals, hacktivists, insiders)
  • What are their capabilities and motivations?
  • What TTPs do they typically use?
  • What threat intelligence exists?

Vulnerabilities:

  • Known software vulnerabilities (CVEs)?
  • Configuration weaknesses?
  • Architectural security flaws?
  • Code-level vulnerabilities?
  • Human vulnerabilities (phishing susceptibility)?

Existing Controls:

  • What security controls are in place?
  • Do they follow defense-in-depth principles?
  • Are they properly configured and maintained?
  • What detection and response capabilities exist?

Questions to Ask

Threat Questions:

  • What could go wrong?
  • What are most likely attack vectors?
  • What threat actors might target this?
  • What are their goals and capabilities?
  • What historical incidents are relevant?

Vulnerability Questions:

  • What weaknesses exist?
  • How exploitable are they?
  • What is impact if exploited?
  • Are there known exploits or active exploitation?
  • How quickly can vulnerabilities be remediated?

Control Questions:

  • What protections are in place?
  • How effective are they?
  • What gaps exist in defensive coverage?
  • Can controls be bypassed?
  • How will malicious activity be detected?

Risk Questions:

  • What is likelihood of compromise?
  • What is potential impact?
  • What is overall risk level?
  • How does risk compare to organization's risk appetite?
  • What risk treatment options exist? (mitigate, accept, transfer, avoid)

Compliance Questions:

  • What regulations or standards apply?
  • Are security requirements met?
  • What evidence demonstrates compliance?
  • What gaps exist?

Factors to Consider

Technical Factors:

  • System architecture and design
  • Technology stack and versions
  • Configuration and hardening
  • Cryptographic implementation
  • Network topology and segmentation

Organizational Factors:

  • Security maturity and culture
  • Available resources and budget
  • Risk tolerance
  • Regulatory environment
  • Business criticality

Threat Landscape:

  • Current threat actor activity
  • Emerging attack techniques
  • Industry-specific threats
  • Geopolitical factors

Operational Factors:

  • Patch management processes
  • Incident response capabilities
  • Security monitoring and detection
  • Security awareness and training
  • Third-party risk management

Historical Parallels to Consider

  • Similar security incidents
  • Comparable vulnerability exploits
  • Industry-specific attack patterns
  • Lessons from major breaches
  • Evolution of threat actor TTPs

Implications to Explore

Immediate Security Implications:

  • Confidentiality: Data breach risk
  • Integrity: Data tampering or corruption risk
  • Availability: Service disruption risk
  • Financial: Ransom, recovery costs, fines

Broader Implications:

  • Reputation damage
  • Legal and regulatory consequences
  • Customer trust erosion
  • Competitive disadvantage
  • Systemic risk (if in critical infrastructure)

Strategic Implications:

  • Security architecture changes needed
  • Security program maturity gaps
  • Resource allocation and prioritization
  • Risk management approach

Step-by-Step Analysis Process

Step 1: Define Scope and Context

Actions:

  • Clearly identify system, application, or event being analyzed
  • Determine boundaries and interfaces
  • Identify stakeholders and their security requirements
  • Understand business context and criticality
  • Gather relevant documentation (architecture diagrams, data flows, policies)

Outputs:

  • Scope statement
  • Asset inventory
  • Stakeholder list
  • Business context understanding

Step 2: Identify Assets and Data

Actions:

  • List critical assets (systems, data, services)
  • Classify data by sensitivity (public, internal, confidential, restricted)
  • Map data flows (where data is created, stored, processed, transmitted, destroyed)
  • Identify crown jewels (most valuable assets)

Outputs:

  • Asset inventory with criticality ratings
  • Data classification matrix
  • Data flow diagrams
  • Crown jewels list

Step 3: Analyze Attack Surface

Actions:

  • Enumerate all entry points (APIs, web interfaces, network services, physical access)
  • Identify trust boundaries (where untrusted input crosses into trusted zones)
  • Map authentication and authorization points
  • Identify dependencies (third-party services, libraries, suppliers)

Outputs:

  • Attack surface map
  • Trust boundary diagram
  • Entry point inventory
  • Dependency list

Step 4: Conduct Threat Modeling

Actions:

  • Select threat modeling methodology (STRIDE, PASTA, etc.)
  • Identify potential threat actors and their goals
  • Enumerate potential attack vectors for each asset
  • Create attack trees showing attack paths
  • Map to MITRE ATT&CK techniques

Outputs:

  • Threat model document
  • Threat actor profiles
  • Attack tree diagrams
  • ATT&CK technique mapping

Step 5: Identify Vulnerabilities

Actions:

  • Review known CVEs for technologies in use
  • Analyze configuration against security benchmarks (CIS, STIGs)
  • Review architecture for security design flaws
  • Consider code-level vulnerabilities (if applicable)
  • Assess human vulnerabilities (phishing susceptibility, privilege misuse)

Outputs:

  • Vulnerability inventory
  • CVSS scores or risk ratings
  • Configuration gap analysis
  • Architectural security issues

Step 6: Assess Existing Controls

Actions:

  • Inventory security controls across all layers (network, host, application, data)
  • Map controls to threats (which threats do controls mitigate?)
  • Evaluate control effectiveness (properly configured? maintained? monitored?)
  • Identify control gaps (threats without adequate mitigation)
  • Assess detection and response capabilities

Outputs:

  • Control inventory
  • Threat-control mapping matrix
  • Control effectiveness assessment
  • Detection coverage gaps

Step 7: Analyze Risk

Actions:

  • For each threat-vulnerability pair, estimate likelihood and impact
  • Calculate risk scores (qualitative or quantitative)
  • Prioritize risks
  • Compare to organizational risk tolerance
  • Consider risk interdependencies and cascading effects

Outputs:

  • Risk register
  • Risk heat map
  • Prioritized risk list
  • Risk acceptance recommendations

Step 8: Evaluate Detection and Response

Actions:

  • Assess what malicious activities would be detected
  • Evaluate MTTD (Mean Time to Detect) for various attack scenarios
  • Review incident response plans and playbooks
  • Assess incident response team capabilities
  • Identify gaps in detection or response

Outputs:

  • Detection coverage assessment
  • MTTD estimates
  • IR capability assessment
  • Detection and response gaps

Step 9: Develop Remediation Recommendations

Actions:

  • Propose mitigations for identified risks (preventive, detective, corrective)
  • Prioritize by risk reduction and implementation effort
  • Consider compensating controls where direct mitigation is impractical
  • Estimate costs and implementation timelines
  • Document risk acceptance for risks not mitigated

Outputs:

  • Remediation roadmap
  • Prioritized recommendation list
  • Cost-benefit analysis
  • Risk acceptance documentation

Step 10: Consider Compliance Requirements

Actions:

  • Identify applicable regulations and standards
  • Map controls to compliance requirements
  • Document evidence of compliance
  • Identify compliance gaps
  • Recommend actions to achieve or maintain compliance

Outputs:

  • Compliance matrix
  • Gap analysis
  • Evidence documentation
  • Compliance remediation plan

Step 11: Synthesize and Report

Actions:

  • Summarize key findings for different audiences (executives, technical teams, compliance)
  • Provide clear risk assessment and recommendations
  • Include metrics and KPIs
  • Document assumptions and limitations
  • Create action plan with owners and timelines

Outputs:

  • Executive summary
  • Technical findings report
  • Remediation roadmap
  • Compliance summary

Usage Examples

Example 1: Security Incident - Ransomware Attack

Event: Organization experiences ransomware attack; files encrypted, ransom note demands payment

Analysis:

Step 1 - Scope and Context:

  • Affected systems: File servers, workstations, backups
  • Business impact: Operations halted, data unavailable
  • Critical: Understand ransomware variant, encryption scope, attacker access

Step 2 - Assets:

  • Crown jewels: Customer database, financial records, intellectual property
  • Status: Files encrypted, availability compromised

Step 3 - Attack Surface Analysis:

  • Initial access vector: Likely phishing email or vulnerable RDP endpoint
  • Lateral movement: SMB, credential theft

Step 4 - Threat Modeling (Post-Incident):

  • Threat actor: Likely cybercriminal group (financial motivation)
  • ATT&CK mapping:
  • Initial Access: Phishing or Exploit Public-Facing Application
  • Execution: User Execution or Exploitation for Client Execution
  • Persistence: Registry Run Keys, Scheduled Tasks
  • Privilege Escalation: Exploitation for Privilege Escalation
  • Credential Access: Credential Dumping
  • Lateral Movement: SMB/Windows Admin Shares
  • Impact: Data Encrypted for Impact

Step 5 - Vulnerabilities:

  • Phishing susceptibility (no email filtering, insufficient user training)
  • Unpatched RDP vulnerabilities
  • Weak passwords or credential reuse
  • Inadequate network segmentation (ransomware spread easily)
  • Backup vulnerabilities (backups also encrypted)

Step 6 - Control Assessment:

  • Missing: Email security gateway, EDR, MFA
  • Inadequate: Network segmentation, backup isolation, patch management
  • Failed: Antivirus didn't detect ransomware

Step 7 - Risk Analysis:

  • Impact: HIGH (business disruption, data loss, ransom demand, reputation damage)
  • Likelihood: HIGH (demonstrated—incident occurred)
  • Residual risk: CRITICAL (without improvements, repeat likely)

Step 8 - Detection and Response:

  • Detection: Failed until encryption began (no EDR, limited logging)
  • MTTD: Hours to days (too slow)
  • Response: No playbook, uncoordinated response
  • Gaps: No IR team, no communication plan, no legal/PR coordination

Step 9 - Recommendations (Prioritized):

Immediate (Hours to Days):

  • Isolate affected systems (contain spread)
  • Identify ransomware variant and check for decryption tools
  • Engage incident response firm if no internal capability
  • Do NOT pay ransom immediately (assess alternatives first)
  • Notify legal, insurance, possibly law enforcement

Short-term (Days to Weeks):

  • Restore from backups if available and uncompromised
  • Deploy EDR on all endpoints
  • Implement MFA for all remote access
  • Conduct forensic investigation to determine root cause and scope
  • Develop and test IR playbook

Medium-term (Weeks to Months):

  • Network segmentation (prevent lateral movement)
  • Email security gateway (block phishing)
  • Privileged access management (limit credential theft)
  • Security awareness training (reduce phishing success)
  • Backup hardening (air-gapped or immutable backups)

Long-term (Months to Year):

  • Security maturity assessment and roadmap
  • 24/7 SOC or MDR service
  • Penetration testing and red team exercises
  • Comprehensive vulnerability management program

Step 10 - Compliance:

  • Regulatory notification requirements (GDPR, state breach laws, etc.)
  • Cyber insurance claim
  • Document incident for auditors

Step 11 - Synthesis:

  • Root cause: Combination of phishing/RDP exploit + inadequate detection + weak segmentation + backup vulnerabilities
  • Key lesson: Defense-in-depth failures—multiple control failures allowed attack to succeed
  • Priority: Immediate containment and recovery, then build detective and preventive controls
  • Cost: Ransom demand + downtime + recovery + remediation + reputation damage (potentially millions)

Example 2: Vulnerability Assessment - New Web Application Launch

Event: Organization planning to launch customer-facing web application; pre-launch security review requested

Analysis:

Step 1 - Scope:

  • Application: E-commerce web application
  • Users: External customers
  • Data: PII, payment information, order history
  • Criticality: HIGH (revenue-generating, customer trust)

Step 2 - Assets:

  • Customer PII and payment data (confidentiality, integrity critical)
  • Inventory and pricing data (integrity, availability critical)
  • Application availability (revenue impact)

Step 3 - Attack Surface:

  • Web interface (public-facing)
  • APIs (mobile app, third-party integrations)
  • Admin portal (internal users)
  • Payment processor integration
  • Third-party libraries and dependencies

Step 4 - Threat Modeling (STRIDE):

Spoofing:

  • Threat: Attacker impersonates user or admin
  • Mitigations: Strong authentication, MFA, session management

Tampering:

  • Threat: Attacker modifies prices, orders, or user data
  • Mitigations: Input validation, authorization checks, integrity controls

Repudiation:

  • Threat: User denies placing order
  • Mitigations: Audit logging, transaction signing

Information Disclosure:

  • Threat: Attacker accesses other users' PII or payment info
  • Mitigations: Authorization checks, encryption, secure session management

Denial of Service:

  • Threat: Attacker overwhelms application
  • Mitigations: Rate limiting, DDoS protection, scalable infrastructure

Elevation of Privilege:

  • Threat: User gains admin access
  • Mitigations: Least privilege, secure authorization, privilege separation

Step 5 - Vulnerabilities (OWASP Top 10 Analysis):

  • Broken Access Control: Check for IDOR vulnerabilities, horizontal/vertical privilege escalation
  • Cryptographic Failures: Verify encryption at rest and in transit, key management
  • Injection: Test for SQL injection, XSS, command injection
  • Insecure Design: Review for security design flaws, threat model gaps
  • Security Misconfiguration: Check for default credentials, unnecessary features, verbose errors
  • Vulnerable Components: Scan dependencies for known CVEs
  • Authentication Failures: Test password policy, session management, MFA
  • Software/Data Integrity: Verify supply chain security, unsigned updates
  • Logging Failures: Ensure security events logged, log tampering prevention
  • SSRF: Test for server-side request forgery vulnerabilities

Step 6 - Control Assessment:

Positive Findings:

  • TLS 1.3 for all connections
  • Passwords hashed with bcrypt
  • Input validation framework in use
  • Dependency scanning in CI/CD

Gaps Identified:

  • No MFA for customer accounts
  • Admin portal not on separate domain/network
  • Verbose error messages expose stack traces
  • No rate limiting on API endpoints
  • Some third-party dependencies have known CVEs
  • Insufficient authorization checks (IDOR vulnerabilities)
  • No Web Application Firewall (WAF)

Step 7 - Risk Analysis:

Critical Risks:

  • IDOR vulnerabilities: HIGH likelihood, HIGH impact (data breach)
  • Vulnerable dependencies: MEDIUM likelihood, HIGH impact (RCE potential)

High Risks:

  • No rate limiting: HIGH likelihood, MEDIUM impact (scraping, brute force)
  • Admin portal on same domain: LOW likelihood, HIGH impact (credential theft)

Medium Risks:

  • Verbose errors: MEDIUM likelihood, MEDIUM impact (information disclosure)
  • No MFA: LOW likelihood (for now), HIGH impact (account takeover)

Step 8 - Detection and Response:

  • Logging: Adequate for authentication and transactions
  • SIEM integration: Not yet configured
  • IR playbook: Generic, needs application-specific scenarios
  • Recommendation: Configure SIEM, create app-specific IR playbook, implement alerting for suspicious patterns

Step 9 - Recommendations (Prioritized by Risk):

Must-Fix Before Launch (Critical):

  • Fix IDOR vulnerabilities (implement authorization checks)
  • Update vulnerable dependencies
  • Remove verbose error messages in production
  • Implement rate limiting on all endpoints

Should-Fix Before Launch (High):

  • Deploy WAF with OWASP Core Rule Set
  • Separate admin portal (different domain, VPN/IP restriction)
  • Configure SIEM integration and alerting

Post-Launch (Medium):

  • Implement MFA for customer accounts
  • Enhance logging (capture more security events)
  • Conduct penetration testing
  • Establish bug bounty program

Step 10 - Compliance:

  • PCI-DSS: Required for payment card data (use tokenization, minimize cardholder data environment)
  • GDPR/CCPA: Customer data privacy requirements (consent, data minimization, breach notification)
  • SOC 2: If B2B customers require assurance

Step 11 - Synthesis:

  • Application has solid foundation (modern crypto, input validation, dependency scanning)
  • Critical issues must be fixed before launch (IDOR, vulnerable dependencies)
  • WAF provides defense-in-depth for web threats
  • Post-launch: Continue testing, bug bounty, security monitoring
  • Go/No-Go: NO GO until critical issues resolved

Example 3: Security Architecture Review - Cloud Migration

Event: Organization planning to migrate on-premises applications to AWS; security architecture review requested

Analysis:

Step 1 - Scope:

  • Migration: 50+ applications, mix of web apps, APIs, databases
  • Target: AWS (IaaS and PaaS services)
  • Timeline: 12-month migration
  • Criticality: Mixed (some business-critical applications)

Step 2 - Assets:

  • Applications and data currently in controlled on-premises environment
  • Concerns: Data sovereignty, compliance, shared responsibility model

Step 3 - Attack Surface Changes:

  • Increases: Internet-facing cloud services, cloud management interfaces, broader attack surface
  • Decreases: Physical access threats
  • New: Cloud misconfigurations, IAM vulnerabilities, API security

Step 4 - Threat Modeling (Cloud-Specific):

Cloud-Specific Threats:

  • Account compromise (stolen credentials, phishing)
  • Misconfigured storage buckets (public S3 buckets)
  • Overly permissive IAM policies
  • Insufficient network segmentation (VPC design)
  • Data exfiltration via cloud APIs
  • Insider threats (cloud admin abuse)
  • Supply chain (compromised cloud services or dependencies)

MITRE ATT&CK for Cloud:

  • Initial Access: Valid accounts, exploit public-facing application
  • Persistence: Account manipulation, create IAM user
  • Privilege Escalation: IAM policy manipulation
  • Defense Evasion: Disable cloud logs
  • Credential Access: Unsecured credentials in code/config
  • Discovery: Cloud service discovery
  • Lateral Movement: Use alternate authentication material
  • Exfiltration: Transfer data to cloud account

Step 5 - Vulnerabilities (Cloud Context):

  • Lack of cloud security expertise
  • On-premises mindset (perimeter-focused, not zero-trust)
  • Unclear cloud IAM strategy
  • No cloud configuration management (IaC not used)
  • No cloud security posture management (CSPM)

Step 6 - Control Assessment (Shared Responsibility Model):

AWS Responsibilities (Security OF the Cloud):

  • Physical security
  • Hypervisor security
  • Network infrastructure

Customer Responsibilities (Security IN the Cloud):

  • IAM and access control
  • Data encryption
  • Network configuration (VPCs, security groups)
  • Application security
  • Compliance

Proposed Controls:

Identity and Access Management:

  • Implement AWS Organizations with SCPs (Service Control Policies)
  • Enforce MFA for all users
  • Use IAM roles, not long-term credentials
  • Principle of least privilege
  • Regular access reviews

Network Security:

  • VPC design with public/private subnets
  • Security groups (stateful firewalls)
  • NACLs (stateless firewalls)
  • AWS WAF for web applications
  • VPC Flow Logs for monitoring

Data Protection:

  • Encryption at rest (S3, EBS, RDS with KMS)
  • Encryption in transit (TLS)
  • S3 bucket policies (block public access)
  • Data classification and handling

Monitoring and Detection:

  • AWS CloudTrail (API logging)
  • AWS GuardDuty (threat detection)
  • AWS Security Hub (aggregate findings)
  • AWS Config (configuration compliance)
  • SIEM integration

Incident Response:

  • Cloud-specific IR playbooks
  • Automate response with Lambda
  • Snapshot and forensics procedures
  • AWS support engagement plan

Compliance:

  • AWS Artifact (compliance reports)
  • AWS Config rules (continuous compliance)
  • Encryption for HIPAA/PCI-DSS
  • Data residency (region selection)

Step 7 - Risk Analysis:

High Risks:

  • Misconfigured S3 buckets (likelihood: high, impact: high - data breach)
  • Compromised IAM credentials (likelihood: medium, impact: high)
  • Insufficient monitoring (likelihood: high, impact: medium - delayed detection)

Medium Risks:

  • Inadequate network segmentation (likelihood: medium, impact: medium)
  • Lack of cloud expertise (likelihood: high, impact: medium - misconfigurations)

Step 8 - Detection and Response:

  • Deploy GuardDuty in all regions and accounts
  • Centralize CloudTrail logs
  • Configure Security Hub and Config
  • Create cloud-specific alerts (unusual API calls, IAM changes, public S3 buckets)
  • Develop cloud incident response playbooks

Step 9 - Recommendations (Cloud Migration Security Roadmap):

Pre-Migration (Month 1-2):

  • Cloud security training for teams
  • Design AWS Organizations structure and account strategy
  • Define IAM strategy and policies
  • Design VPC architecture and network segmentation
  • Select and implement CSPM tool
  • Establish cloud security baseline (CIS AWS Foundations Benchmark)

During Migration (Month 3-12):

  • Use Infrastructure as Code (Terraform/CloudFormation) for all resources
  • Automate security checks in CI/CD (SAST, DAST, IaC scanning)
  • Enforce encryption at rest and in transit
  • Implement least privilege IAM
  • Enable all cloud-native security services (GuardDuty, Security Hub, Config, CloudTrail)
  • Security testing before production deployment

Post-Migration (Ongoing):

  • Continuous compliance monitoring
  • Regular IAM access reviews
  • Cloud security posture assessments
  • Penetration testing in cloud environment
  • Tabletop exercises for cloud IR scenarios

Step 10 - Compliance:

  • Leverage AWS compliance certifications (SOC 2, ISO 27001, PCI-DSS)
  • Use AWS Artifact for audit evidence
  • Implement AWS Config rules for continuous compliance
  • Document shared responsibility matrix

Step 11 - Synthesis:

  • Cloud security requires different mindset (zero-trust, identity-centric, API-driven)
  • Shared responsibility model is critical—must secure what AWS doesn't
  • Major risks: Misconfigurations, IAM vulnerabilities, insufficient monitoring
  • Opportunities: Cloud-native security services, automation, scalability
  • Success factors: Training, least privilege, defense-in-depth, monitoring, IaC
  • Recommendation: Proceed with migration, but implement security roadmap in parallel

Reference Materials (Expandable)

Essential Organizations and Resources

#### NIST (National Institute of Standards and Technology)

  • SP 800 Series: Security and privacy controls, risk management

#### CISA (Cybersecurity and Infrastructure Security Agency)

  • Resources: Free tools, training, best practices

#### MITRE

  • CAPEC: Common Attack Pattern Enumeration and Classification

#### OWASP (Open Web Application Security Project)

#### SANS Institute

  • Reading Room: Thousands of security papers

Key Standards and Frameworks

ISO/IEC 27001: Information Security Management System

ISO/IEC 27002: Information Security Controls

PCI-DSS: Payment Card Industry Data Security Standard

HIPAA: Health Insurance Portability and Accountability Act (Security Rule)

SOC 2: Service Organization Control 2 (Trust Services Criteria)

GDPR: General Data Protection Regulation

NIST SP 800-53: Security and Privacy Controls

CIS Controls: Center for Internet Security Critical Security Controls

FedRAMP: Federal Risk and Authorization Management Program

Vulnerability Databases

Threat Intelligence Sources

  • Threat Intelligence Platforms: Recorded Future, Mandiant, CrowdStrike
  • Open Source: AlienVault OTX, MISP, threat feeds

Security Tools and Platforms

Vulnerability Scanning: Nessus, Qualys, Rapid7 InsightVM

SAST: SonarQube, Checkmarx, Veracode

DAST: Burp Suite, OWASP ZAP, Acunetix

SIEM: Splunk, Elastic, Sentinel, Chronicle

EDR: CrowdStrike, SentinelOne, Microsoft Defender for Endpoint

CSPM: Prisma Cloud, Wiz, Orca Security

Certifications

  • CISSP: Certified Information Systems Security Professional
  • CISM: Certified Information Security Manager
  • CEH: Certified Ethical Hacker
  • OSCP: Offensive Security Certified Professional
  • GCIH: GIAC Certified Incident Handler
  • Security+: CompTIA Security+

Communities and Resources

Verification Checklist

After completing cybersecurity analysis:

  • Identified all critical assets and data
  • Analyzed attack surface and entry points
  • Conducted threat modeling appropriate to scope
  • Identified vulnerabilities and assessed severity
  • Evaluated existing security controls for effectiveness
  • Analyzed risk using quantitative or qualitative methods
  • Assessed detection and response capabilities
  • Developed prioritized remediation recommendations
  • Considered compliance requirements
  • Mapped threats to MITRE ATT&CK framework (if applicable)
  • Applied defense-in-depth and zero-trust principles
  • Provided clear, actionable security guidance
  • Used security terminology and frameworks precisely

Common Pitfalls to Avoid

Pitfall 1: Checklist Compliance Without Risk Context

  • Problem: Following compliance requirements without understanding actual risks
  • Solution: Risk-based approach—understand threats and business context, not just checkboxes

Pitfall 2: Perimeter-Only Security

  • Problem: Assuming network perimeter protects everything inside
  • Solution: Defense-in-depth and zero-trust—assume breach, protect assets themselves

Pitfall 3: Alert Fatigue and False Positives

  • Problem: Too many low-quality alerts overwhelm responders
  • Solution: Tune detections, prioritize high-fidelity alerts, automate response where possible

Pitfall 4: Ignoring Human Element

  • Problem: Focus only on technical controls, ignore social engineering and insider threats
  • Solution: Include security awareness, privileged user monitoring, insider threat programs

Pitfall 5: Point-in-Time Assessment

  • Problem: One-time security review without continuous monitoring
  • Solution: Continuous security—ongoing monitoring, vulnerability management, threat intelligence

Pitfall 6: Vulnerability Scoring Without Context

  • Problem: Prioritizing by CVSS alone without considering exploitability or business context
  • Solution: Risk-based prioritization—consider threat intelligence, exploitability, asset criticality

Pitfall 7: Security as Blocker

  • Problem: Security seen as obstacle to business objectives
  • Solution: Enable business securely—balance risk and business value, provide secure alternatives

Pitfall 8: Ignoring Supply Chain and Third Parties

  • Problem: Focus only on first-party systems, ignore dependencies
  • Solution: Supply chain risk management—assess third-party security, dependency vulnerabilities

Success Criteria

A quality cybersecurity analysis:

  • Applies appropriate security frameworks and methodologies
  • Identifies and prioritizes risks using threat modeling
  • Evaluates security controls across multiple layers (defense-in-depth)
  • Provides actionable, prioritized remediation recommendations
  • Grounds analysis in threat intelligence and industry best practices
  • Considers both technical and human factors
  • Addresses detection and response, not just prevention
  • Maps to recognized standards (MITRE ATT&CK, NIST CSF, etc.)
  • Balances security with business objectives
  • Demonstrates deep security expertise and critical thinking
  • Communicates clearly to both technical and non-technical audiences
  • Uses security concepts and terminology precisely

Integration with Other Analysts

Cybersecurity analysis complements other perspectives:

  • Computer Scientist: Deep technical understanding of systems and code
  • Lawyer: Legal implications of breaches, regulatory compliance requirements
  • Economist: Cost-benefit analysis of security investments, cyber insurance
  • Psychologist: Human behavior, social engineering, security culture
  • Political Scientist: Nation-state threats, geopolitical cyber conflict, policy

Cybersecurity is particularly strong on:

  • Threat modeling and risk assessment
  • Vulnerability analysis
  • Defense-in-depth design
  • Incident detection and response
  • Compliance and standards

Continuous Improvement

This skill evolves through:

  • New threat actor TTPs and attack techniques
  • Emerging vulnerabilities and exploits
  • Evolution of security technologies and practices
  • Lessons learned from security incidents
  • Updates to frameworks and standards
  • Cross-disciplinary security research

Skill Status: Complete - Comprehensive Cybersecurity Analysis Capability

Quality Level: High - Enterprise-grade security analysis with modern frameworks

Token Count: ~8,500 words (target 6-10K tokens)

BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card