skills/hack23/cia/information-security-strategy

information-security-strategy

SKILL.md

Information Security Strategy Skill

Purpose

This skill provides strategic security planning guidance aligned with Hack23 AB's AI-augmented operating model and transparent ISMS implementation. It enables security architects and business leaders to align security controls with business impact classifications, demonstrate security excellence through public transparency, and leverage ISMS as competitive advantage for cybersecurity consulting services.

When to Use This Skill

Apply this skill when:

  • ✅ Developing security strategies for new products or services
  • ✅ Aligning security controls with business impact classifications
  • ✅ Designing defense-in-depth architectures
  • ✅ Evaluating risk-based security control selection
  • ✅ Planning AI-augmented security operations
  • ✅ Preparing security posture demonstrations for clients
  • ✅ Integrating security with Porter's Five Forces strategic analysis
  • ✅ Documenting security architecture decisions
  • ✅ Balancing transparency with confidentiality requirements

Do NOT use for:

  • ❌ Tactical incident response (use incident-response skill)
  • ❌ Specific vulnerability remediation (use vulnerability-management skill)
  • ❌ Code-level security reviews (use secure-code-review skill)

AI-First Security Operations Model

graph TB
    CEO[👨‍💼 CEO/Founder<br/>Strategic Oversight]
    
    subgraph AI_AGENTS["🤖 Specialist AI Agent Ecosystem"]
        SEC_ARCH[🔐 Security Architect Agent<br/>Architecture design & review]
        DEV_SEC[💻 DevSecOps Agent<br/>CI/CD security integration]
        TEST_SEC[🧪 Security Testing Agent<br/>SAST/DAST/Fuzzing]
        DOC_SEC[📚 Documentation Agent<br/>Policy & procedure creation]
        BIZ_SEC[💼 Business Agent<br/>Risk/value alignment]
        MARKET_SEC[📢 Marketing Agent<br/>Security posture communication]
    end
    
    CEO --> SEC_ARCH
    CEO --> DEV_SEC
    CEO --> TEST_SEC
    CEO --> DOC_SEC
    CEO --> BIZ_SEC
    CEO --> MARKET_SEC
    
    SEC_ARCH --> ARCH_OUT[📋 SECURITY_ARCHITECTURE.md<br/>THREAT_MODEL.md]
    DEV_SEC --> CICD_OUT[⚙️ GitHub Actions Workflows<br/>Security Gates]
    TEST_SEC --> TEST_OUT[🧪 CodeQL / OWASP ZAP<br/>Vulnerability Reports]
    DOC_SEC --> DOC_OUT[📖 ISMS Policies<br/>Compliance Evidence]
    BIZ_SEC --> BIZ_OUT[💰 Risk Register<br/>Business Impact Analysis]
    MARKET_SEC --> MARKET_OUT[🏆 Security Badges<br/>Public Metrics]
    
    ARCH_OUT --> EVIDENCE[🎖️ Public Evidence<br/>OpenSSF Scorecard<br/>CII Best Practices<br/>SLSA Level 3]
    CICD_OUT --> EVIDENCE
    TEST_OUT --> EVIDENCE
    DOC_OUT --> EVIDENCE
    BIZ_OUT --> EVIDENCE
    MARKET_OUT --> EVIDENCE
    
    EVIDENCE --> CLIENTS[🤝 Client Demonstration<br/>Competitive Advantage]
    
    style CEO fill:#1565C0,stroke:#0D47A1,stroke-width:3px,color:#fff
    style AI_AGENTS fill:#4CAF50,stroke:#2E7D32,stroke-width:2px
    style EVIDENCE fill:#FF9800,stroke:#F57C00,stroke-width:2px
    style CLIENTS fill:#9C27B0,stroke:#6A1B9A,stroke-width:2px

Key Strategic Principles:

  • <1 FTE Operations: AI agents handle 80%+ security tasks under CEO oversight
  • Transparent by Default: 70% of ISMS publicly visible (only credentials/pricing redacted)
  • Evidence-Based: All security claims backed by public badges and metrics
  • Business Alignment: ISMS is not separate from business—it IS the business model

Product Security Architecture Decision Framework

Use this decision tree when designing security controls for new products:

flowchart TD
    START[🎯 New Product/Service] --> CLASS{What is the<br/>Confidentiality<br/>Classification?}
    
    CLASS -->|Low| LOW_CONF[⚪ Low Confidentiality<br/>Public data only]
    CLASS -->|Moderate| MOD_CONF[🟡 Moderate Confidentiality<br/>User accounts/data]
    CLASS -->|High/Very High| HIGH_CONF[🔴 High/Very High<br/>Sensitive operations]
    
    LOW_CONF --> AUTH_LOW{Does app process<br/>user-specific data?}
    AUTH_LOW -->|No| NO_AUTH[❌ No Authentication<br/>✅ TLS 1.3 Required<br/>Example: CIA CM, Black Trigram]
    AUTH_LOW -->|Yes| BASIC_AUTH[🔐 Basic Authentication<br/>Username/Password]
    
    MOD_CONF --> AUTH_MOD[🔐 Full Authentication Stack]
    AUTH_MOD --> MFA[✅ MFA Required<br/>✅ RBAC<br/>✅ Session Management<br/>✅ Audit Logging]
    
    HIGH_CONF --> AUTH_HIGH[🔐 Enhanced Security]
    AUTH_HIGH --> ENHANCED[✅ MFA Mandatory<br/>✅ Fine-grained RBAC<br/>✅ Comprehensive Audit<br/>✅ Encryption at Rest<br/>Example: CIA Platform]
    
    NO_AUTH --> RATIONALE_LOW[📋 Document Risk Acceptance<br/>Update Risk Register<br/>Reference Classification Framework]
    BASIC_AUTH --> RATIONALE_MOD[📋 Document Control Selection<br/>Map to Classification Framework]
    MFA --> RATIONALE_HIGH[📋 Full Security Architecture<br/>SECURITY_ARCHITECTURE.md]
    ENHANCED --> RATIONALE_HIGH
    
    RATIONALE_LOW --> VERIFY[🧪 Verification Required]
    RATIONALE_MOD --> VERIFY
    RATIONALE_HIGH --> VERIFY
    
    VERIFY --> V1[✅ SECURITY_ARCHITECTURE.md created]
    VERIFY --> V2[✅ THREAT_MODEL.md completed]
    VERIFY --> V3[✅ Risk Register updated]
    VERIFY --> V4[✅ Classification badges in README]
    
    style START fill:#1565C0,stroke:#0D47A1,stroke-width:2px,color:#fff
    style LOW_CONF fill:#9E9E9E,stroke:#616161,stroke-width:2px
    style MOD_CONF fill:#FF9800,stroke:#F57C00,stroke-width:2px
    style HIGH_CONF fill:#D32F2F,stroke:#B71C1C,stroke-width:3px,color:#fff
    style NO_AUTH fill:#4CAF50,stroke:#2E7D32,stroke-width:2px,color:#fff
    style ENHANCED fill:#B71C1C,stroke:#880E4F,stroke-width:3px,color:#fff
    style VERIFY fill:#7B1FA2,stroke:#4A148C,stroke-width:2px,color:#fff

Security Control Selection by Business Impact

Map security controls to Classification Framework business impact levels:

High Business Impact Products

CIA Platform - Moderate Confidentiality, High Integrity, Moderate Availability

Required Controls:

authentication:
  type: "Multi-factor with RBAC"
  implementation: "Spring Security + JWT + MFA"
  session: "Server-side with Redis"
  
audit_logging:
  framework: "Javers + AWS CloudTrail"
  retention: "7 years (regulatory compliance)"
  monitoring: "Real-time with CloudWatch alarms"
  
encryption:
  in_transit: "TLS 1.3 enforced"
  at_rest: "PostgreSQL encryption + AWS KMS"
  
access_control:
  model: "Role-Based Access Control (RBAC)"
  segregation: "Admin/User/Anonymous roles"

Architecture Documentation:

Low Business Impact Products

CIA Compliance Manager, Black Trigram - Low Confidentiality, Moderate Integrity

Required Controls:

authentication:
  type: "None (intentional risk acceptance)"
  rationale: "Public data only, no user-specific operations"
  risk_documentation: "Risk_Register.md entry with annual review"
  
encryption:
  in_transit: "TLS 1.3 enforced via CDN"
  at_rest: "Not applicable (no backend database)"
  
session_management:
  type: "Browser-only (localStorage/sessionStorage)"
  scope: "UI state persistence only"
  
monitoring:
  application: "None (frontend-only, stateless)"
  infrastructure: "CDN access logs only"

Risk Acceptance Documentation:

The absence of authentication is an intentional architectural decision based on Low confidentiality classification. All data processed is public compliance framework information with no sensitive user data. This risk is documented in the Risk Register with periodic review triggers if feature requirements change.

Architecture Documentation:

Defense-in-Depth Layered Security Model

Implement security controls across multiple layers aligned with product classification:

graph TB
    subgraph LAYER7["🎯 Layer 7: Policies & Governance"]
        POLICY[Information Security Policy<br/>Classification Framework<br/>Risk Register]
    end
    
    subgraph LAYER6["👥 Layer 6: Application Security"]
        APP[Authentication & Authorization<br/>Input Validation<br/>Session Management]
    end
    
    subgraph LAYER5["🔐 Layer 5: Data Security"]
        DATA[Encryption at Rest<br/>Encryption in Transit<br/>Data Classification]
    end
    
    subgraph LAYER4["🌐 Layer 4: Network Security"]
        NETWORK[TLS 1.3 Enforcement<br/>CDN Protection<br/>DDoS Mitigation]
    end
    
    subgraph LAYER3["🖥️ Layer 3: Infrastructure Security"]
        INFRA[AWS Security Groups<br/>IAM Policies<br/>VPC Configuration]
    end
    
    subgraph LAYER2["🛠️ Layer 2: CI/CD Security"]
        CICD[SAST: CodeQL/SonarCloud<br/>SCA: Dependabot/FOSSA<br/>DAST: OWASP ZAP]
    end
    
    subgraph LAYER1["📊 Layer 1: Monitoring & Response"]
        MONITOR[CloudWatch Alarms<br/>Security Hub<br/>Incident Response]
    end
    
    POLICY --> APP
    APP --> DATA
    DATA --> NETWORK
    NETWORK --> INFRA
    INFRA --> CICD
    CICD --> MONITOR
    MONITOR -->|Feedback Loop| POLICY
    
    style LAYER7 fill:#D32F2F,stroke:#B71C1C,stroke-width:2px,color:#fff
    style LAYER6 fill:#FF5722,stroke:#D84315,stroke-width:2px,color:#fff
    style LAYER5 fill:#FF9800,stroke:#F57C00,stroke-width:2px
    style LAYER4 fill:#FFC107,stroke:#FFA000,stroke-width:2px
    style LAYER3 fill:#4CAF50,stroke:#388E3C,stroke-width:2px,color:#fff
    style LAYER2 fill:#2196F3,stroke:#1976D2,stroke-width:2px,color:#fff
    style LAYER1 fill:#9C27B0,stroke:#7B1FA2,stroke-width:2px,color:#fff

Porter's Five Forces Security Integration

Align security strategy with competitive advantage:

Force Security Implication Strategic Response
Buyer Power Customers demand security evidence Public badges: OpenSSF Scorecard ≥7.0, CII Best Practices, SLSA Level 3
Supplier Power Cloud/SaaS vendor dependencies Multi-vendor flexibility, open source preference, SBOM transparency
Entry Barriers Expertise required for ISMS Transparent ISMS creates moat—competitors lack documentation maturity
Substitute Threat In-house security teams Demonstrate AI-augmented efficiency (<1 FTE overhead vs 3-5 FTE teams)
Rivalry Cybersecurity consulting competition ISMS transparency differentiates—"eat our own dog food" credibility

Reference: Information Security Strategy § Porter's Five Forces

Compliance Mapping Quick Reference

Map strategic security decisions to compliance frameworks:

Security Decision ISO 27001:2022 NIST CSF 2.0 CIS Controls v8
Authentication model A.5.15, A.5.16 PR.AC-01 5.2, 6.3
Encryption requirements A.8.24 PR.DS-01 3.10
Risk acceptance process A.5.7, A.8.3 GV.RM-01 4.1
Security architecture A.8.1 PR.IP-01 16.1
Monitoring & logging A.8.15, A.8.16 DE.AE-01 8.2, 8.5

Strategic Planning Checklist

Use this checklist when developing security strategy for new initiatives:

Phase 1: Business Context

  • Classify product using Classification Framework
  • Identify CIA triad requirements (Confidentiality/Integrity/Availability)
  • Assess Porter's Five Forces strategic positioning
  • Determine business impact levels (Financial/Operational/Reputational)
  • Document RTO/RPO requirements

Phase 2: Security Architecture

  • Select authentication model based on confidentiality classification
  • Design authorization model (RBAC/ABAC/None)
  • Plan encryption requirements (TLS/at-rest/key management)
  • Define audit logging scope and retention
  • Document risk acceptance for deviations from standards

Phase 3: Defense-in-Depth

  • Map controls to all 7 layers (Governance → Monitoring)
  • Implement least privilege access
  • Configure security boundaries (network/application/data)
  • Enable automated security testing (SAST/SCA/DAST)
  • Set up monitoring and alerting

Phase 4: Evidence & Transparency

  • Create SECURITY_ARCHITECTURE.md with Mermaid diagrams
  • Complete THREAT_MODEL.md with STRIDE analysis
  • Update Risk Register with risk acceptance decisions
  • Configure security badges (OpenSSF/CII/SLSA/SonarCloud)
  • Publish architecture documentation

Phase 5: AI Operations Integration

  • Configure GitHub Copilot security agents
  • Enable automated security reviews
  • Set up dependency scanning (Dependabot)
  • Configure secret scanning
  • Implement SBOM generation

Practical Implementation Examples

Example 1: Frontend-Only Application (Low Confidentiality)

Scenario: Educational gaming platform with no user accounts

Security Architecture:

product_name: "Black Trigram Educational Gaming"
classification:
  confidentiality: "Low"
  integrity: "Moderate"
  availability: "Moderate"

security_controls:
  authentication: "None (risk accepted)"
  authorization: "None (public content)"
  encryption_in_transit: "TLS 1.3 via CDN"
  encryption_at_rest: "N/A (no backend)"
  session_management: "Browser localStorage only"
  audit_logging: "None (frontend-only)"
  
risk_acceptance:
  rationale: "All game content is public educational material"
  risk_register_entry: "RSK-2025-001"
  review_cycle: "Annual"
  trigger_conditions:
    - "Introduction of user accounts"
    - "Addition of user-generated content"
    - "Processing of personal data"

Required Documentation:

  • SECURITY_ARCHITECTURE.md describing intentional architecture
  • THREAT_MODEL.md with frontend-specific threats
  • Risk Register entry documenting risk acceptance
  • README.md with Classification badges

Example 2: Multi-Tenant SaaS Platform (Moderate Confidentiality)

Scenario: Political transparency platform with user accounts

Security Architecture:

product_name: "Citizen Intelligence Agency"
classification:
  confidentiality: "Moderate"
  integrity: "High"
  availability: "Moderate"

security_controls:
  authentication: "Multi-factor (TOTP/SMS)"
  authorization: "RBAC (Admin/User/Anonymous)"
  encryption_in_transit: "TLS 1.3"
  encryption_at_rest: "PostgreSQL + AWS KMS"
  session_management: "Server-side JWT with Redis"
  audit_logging: "Javers + CloudWatch (7-year retention)"
  
defense_in_depth:
  layer_7_governance: "Information Security Policy"
  layer_6_application: "Spring Security + MFA"
  layer_5_data: "Field-level encryption for PII"
  layer_4_network: "VPC + Security Groups"
  layer_3_infrastructure: "AWS IAM + GuardDuty"
  layer_2_cicd: "CodeQL + SonarCloud + ZAP"
  layer_1_monitoring: "CloudWatch + Security Hub"

Required Documentation:

  • Comprehensive SECURITY_ARCHITECTURE.md
  • Detailed THREAT_MODEL.md with attack trees
  • Regular risk assessments in Risk Register
  • Full compliance mapping in README.md

Standards & Policy References

Core Hack23 ISMS Policies:

All Hack23 ISMS Policies: https://github.com/Hack23/ISMS-PUBLIC

Weekly Installs
5
Repository
hack23/cia
GitHub Stars
213
First Seen
12 days ago
Installed on
opencode5
gemini-cli5
claude-code5
github-copilot5
codex5
amp5