Acerca de
This skill streamlines the transition from threat modeling to technical implementation by providing a structured framework for deriving security requirements. It automates the mapping of threats—categorized by the STRIDE model—into functional, non-functional, and constraint-based requirements. By generating standardized security user stories, acceptance criteria, and traceability matrices, it ensures that security considerations are deeply integrated into the development lifecycle and remain verifiable against compliance frameworks like PCI-DSS, GDPR, and SOC2.