@esoteric-logic/praxis-harness 3.0.1 → 3.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (22) hide show
  1. package/bin/prompt-compile.js +3 -3
  2. package/lib/loader.js +5 -5
  3. package/package.json +1 -1
  4. package/prompts/work/ecs-limited/client-config.yaml +9 -0
  5. package/prompts/work/ecs-limited/projects/soc2-zero-trust/project-instructions-claude-desktop.md +32 -0
  6. package/prompts/work/ecs-limited/projects/soc2-zero-trust/prompt-config.yaml +24 -0
  7. package/prompts/work/ecs-limited/projects/soc2-zero-trust/references/engagement-sow.md +82 -0
  8. package/prompts/work/ecs-limited/projects/soc2-zero-trust/references/soc2-compliance.md +62 -0
  9. package/prompts/work/ecs-limited/projects/soc2-zero-trust/references/zero-trust-azure.md +86 -0
  10. package/prompts/work/ecs-limited/projects/soc2-zero-trust/space-instructions-perplexity.md +47 -0
  11. package/prompts/work/ecs-limited/projects/soc2-zero-trust/system-prompt.md +83 -0
  12. /package/prompts/work/elect/{deals → projects}/azure-architecture/CLAUDE.md +0 -0
  13. /package/prompts/work/elect/{deals → projects}/azure-architecture/prompt-config.yaml +0 -0
  14. /package/prompts/work/elect/{deals → projects}/azure-architecture/space-instructions-perplexity.md +0 -0
  15. /package/prompts/work/elect/{deals → projects}/azure-architecture/system-prompt.md +0 -0
  16. /package/prompts/work/maximus/{deals → projects}/dha-tricare/CLAUDE.md +0 -0
  17. /package/prompts/work/maximus/{deals → projects}/dha-tricare/knowledge/deal-context.md +0 -0
  18. /package/prompts/work/maximus/{deals → projects}/dha-tricare/knowledge/maximus-corporate.md +0 -0
  19. /package/prompts/work/maximus/{deals → projects}/dha-tricare/project-instructions-claude-desktop.md +0 -0
  20. /package/prompts/work/maximus/{deals → projects}/dha-tricare/prompt-config.yaml +0 -0
  21. /package/prompts/work/maximus/{deals → projects}/dha-tricare/references/dha-tricare-intel.md +0 -0
  22. /package/prompts/work/maximus/{deals → projects}/dha-tricare/space-instructions-perplexity.md +0 -0
@@ -16,7 +16,7 @@ const {
16
16
  loadBlocks,
17
17
  applyOverrides,
18
18
  loadClientConfig,
19
- discoverAllDeals,
19
+ discoverAllWorkProjects,
20
20
  resolveProject,
21
21
  mergeClientDealConfig,
22
22
  } = require('../lib/loader');
@@ -35,8 +35,8 @@ const PROJECTS_DIR = path.join(PROMPTS_DIR, 'projects');
35
35
  function discoverAllProjects() {
36
36
  const results = [];
37
37
 
38
- // New hierarchy: clients/*/deals/*/
39
- for (const entry of discoverAllDeals()) {
38
+ // New hierarchy: work/*/projects/* + personal/*
39
+ for (const entry of discoverAllWorkProjects()) {
40
40
  results.push({ name: entry.displayName, dir: entry.dealDir, client: entry.client, deal: entry.deal, clientDir: entry.clientDir });
41
41
  }
42
42
 
package/lib/loader.js CHANGED
@@ -163,7 +163,7 @@ function loadClientConfig(clientDir) {
163
163
  * Discover all projects across work/ (client → deals) and personal/ (flat).
164
164
  * Returns array of { client, deal, dealDir, clientDir, displayName }.
165
165
  */
166
- function discoverAllDeals() {
166
+ function discoverAllWorkProjects() {
167
167
  const results = [];
168
168
 
169
169
  // Work projects: work/<client>/deals/<deal>/
@@ -173,7 +173,7 @@ function discoverAllDeals() {
173
173
 
174
174
  for (const client of clients) {
175
175
  const clientDir = path.join(WORK_DIR, client);
176
- const dealsDir = path.join(clientDir, 'deals');
176
+ const dealsDir = path.join(clientDir, 'projects');
177
177
  if (!fs.existsSync(dealsDir)) continue;
178
178
 
179
179
  const deals = fs.readdirSync(dealsDir)
@@ -226,7 +226,7 @@ function resolveProject(identifier) {
226
226
  return { client: 'personal', deal: name, dealDir: projectDir, clientDir: null, legacy: false };
227
227
  }
228
228
  } else {
229
- const dealDir = path.join(WORK_DIR, scope, 'deals', name);
229
+ const dealDir = path.join(WORK_DIR, scope, 'projects', name);
230
230
  const clientDir = path.join(WORK_DIR, scope);
231
231
  if (fs.existsSync(dealDir)) {
232
232
  return { client: scope, deal: name, dealDir, clientDir, legacy: false };
@@ -235,7 +235,7 @@ function resolveProject(identifier) {
235
235
  }
236
236
 
237
237
  // Search all projects for a matching name
238
- const allDeals = discoverAllDeals();
238
+ const allDeals = discoverAllWorkProjects();
239
239
  const match = allDeals.find((d) => d.deal === identifier);
240
240
  if (match) {
241
241
  return { client: match.client, deal: match.deal, dealDir: match.dealDir, clientDir: match.clientDir, legacy: false };
@@ -301,7 +301,7 @@ module.exports = {
301
301
  loadBlocks,
302
302
  applyOverrides,
303
303
  loadClientConfig,
304
- discoverAllDeals,
304
+ discoverAllWorkProjects,
305
305
  resolveProject,
306
306
  mergeClientDealConfig,
307
307
  };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@esoteric-logic/praxis-harness",
3
- "version": "3.0.1",
3
+ "version": "3.1.1",
4
4
  "description": "Layered Claude Code harness — workflow discipline, AI-Kits, persistent vault integration",
5
5
  "bin": {
6
6
  "praxis-harness": "./bin/praxis.js",
@@ -0,0 +1,9 @@
1
+ client: ecs-limited
2
+ description: ECS Limited — SOC 2 compliance and Zero Trust for Azure
3
+ profile: null
4
+
5
+ vars: {}
6
+
7
+ shared_references: []
8
+
9
+ knowledge_packs: []
@@ -0,0 +1,32 @@
1
+ ## Role
2
+ Solutions architect supporting ECS Limited's Azure Zero Trust security engagement. Brownfield Azure environment (50-100+ apps, 50-100 VMs) targeting SOC 2 Type 2 and ISO 27001:2022 readiness.
3
+
4
+ ## Engagement Context
5
+ 3-phase contractor engagement: Discovery → Zero Trust Implementation → Future Architecture. 93 checklist items (84 contractor, 9 internal). No hard compliance deadline.
6
+
7
+ ## Behavioral Constraints
8
+ - Lead with recommendations and rationale, not options lists
9
+ - Verify claims against the engagement SOW and knowledge files before presenting as fact
10
+ - When uncertain, ask one clarifying question. Flag confidence: HIGH / MEDIUM / LOW
11
+
12
+ ## Domain Expertise
13
+ - Tiered network: User → Web → App/API → Data (deny-all default, no direct backend access)
14
+ - Uncontrolled device model: all devices untrusted, no compliance gates. PAW for admin only.
15
+ - Environment parity: dev = staging = prod for all security controls
16
+ - Azure stack: Entra ID, Conditional Access, PIM, Firewall, NSGs, Private Link, Sentinel, Defender, Key Vault
17
+ - SOC 2 TSC (2017/2022), ISO 27001:2022
18
+ - 6 critical risks: R-01 (segmentation outages), R-05 (trusted client apps), R-07 (env parity), R-22 (dev adaptation), R-26 (client disruption), R-28 (no detection during transition)
19
+
20
+ ## Output Format
21
+ - Tables for control mappings, gap analyses, risk assessments
22
+ - Map to 93-item engagement checklist where applicable
23
+ - BLUF structure: bottom line, evidence, next steps
24
+
25
+ ## Quality Controls
26
+ - Cross-reference SOW and knowledge files. Flag contradictions.
27
+ - Never fabricate version numbers, dates, statistics, or citations
28
+ - Cite specific TSC criteria and ISO controls by reference
29
+ - Flag information older than 12 months
30
+
31
+ ## When Uncertain
32
+ State uncertainty explicitly. Flag confidence: HIGH (verified), MEDIUM (corroborated), LOW (inferred).
@@ -0,0 +1,24 @@
1
+ name: ecs-limited/soc2-zero-trust
2
+ description: ECS Limited Azure Zero Trust engagement — SOC 2 Type 2 + ISO 27001:2022
3
+ mode: standalone
4
+ role: solutions-architect
5
+ platforms:
6
+ - claude-projects
7
+ - perplexity-spaces
8
+ domains:
9
+ - soc2-compliance
10
+ - zero-trust-azure
11
+ - azure-security
12
+ research_domains:
13
+ - Azure Zero Trust tiered architecture and network segmentation
14
+ - SOC 2 Type 2 audit preparation and control mapping for Azure
15
+ - ISO 27001:2022 certification requirements
16
+ - Microsoft Sentinel SIEM and Defender for Cloud deployment
17
+ - Brownfield Azure migration to segmented networks
18
+ knowledge_files:
19
+ - references/engagement-sow.md
20
+ - references/soc2-compliance.md
21
+ - references/zero-trust-azure.md
22
+ version: "2.0"
23
+ created: 2026-04-05
24
+ last_updated: 2026-04-05
@@ -0,0 +1,82 @@
1
+ ---
2
+ domain: engagement-scope
3
+ generated: 2026-04-05
4
+ source: client-document
5
+ ---
6
+
7
+ # Azure Zero Trust Security Engagement — Scope of Work
8
+
9
+ ## Engagement Overview
10
+ - Brownfield Azure environment: 50-100+ applications, 50-100 VMs
11
+ - 3-phase contractor engagement: Discovery → Zero Trust Implementation → Future Architecture
12
+ - 93 checklist items: 84 contractor-delivered technical, 9 internal policy/process
13
+ - Targets: SOC 2 Type 2 readiness, ISO 27001:2022 certification
14
+ - No hard compliance deadline — prioritize correctness over speed
15
+
16
+ ## Current State Gaps
17
+ - Flat network — no segmentation, unrestricted lateral movement
18
+ - No SIEM — no centralized monitoring, no automated threat detection
19
+ - Informal change management — verbal/Teams approvals, no audit trail
20
+ - Standing privileged access — PIM exists but not widely adopted
21
+ - No tiered architecture — users can reach VMs, databases, APIs directly
22
+
23
+ ## Security Model
24
+
25
+ ### Tiered Network Architecture
26
+ - **User tier → Web front-end only.** NSGs and firewall deny user traffic to anything non-web.
27
+ - **Front-end → Application/API tier.** Backend only accepts traffic from front-end subnets on specific ports.
28
+ - **Application → Data tier.** Databases only accept connections from authorized app servers.
29
+ - Enforcement via deny-all rules, not obscurity.
30
+
31
+ ### Uncontrolled Device Model
32
+ - ALL devices treated as untrusted — managed, unmanaged, corporate, personal
33
+ - No device compliance gates for general users
34
+ - Security enforced at identity, network, application, and data layers
35
+ - Exception: PAW (Privileged Access Workstation) required for Azure management plane
36
+ - EDR (Defender for Endpoint) deployed on corporate endpoints for detection — does not change trust model
37
+
38
+ ### No Trusted Client Assumptions
39
+ - Every application treated as publicly available
40
+ - Server-side validation, secure sessions, CSRF protection, API authorization required on ALL apps
41
+ - "It's internal" justification eliminated
42
+ - Significant practice change for development group
43
+
44
+ ### Environment Parity
45
+ - Dev, staging, and production share identical security controls
46
+ - Same tiered architecture, segmentation rules, access controls, pipeline gates
47
+ - Only scale and cost differ (smaller SKUs, fewer replicas)
48
+ - Prevents prod failures from control mismatch
49
+
50
+ ### Non-Web Service Exceptions
51
+ - Print management server — requires specific controlled network path from user subnets
52
+ - License management server — engineering workstations need license checkout/checkin access
53
+ - Architecture must accommodate with targeted rules, not broad access
54
+
55
+ ## What Does Not Change
56
+ - Users access web apps from any device — no new device restrictions
57
+ - MFA stays as-is (fully enforced)
58
+ - Private Endpoints remain in place
59
+ - Key Vault continues as secrets store
60
+ - Existing CI/CD pipeline preserved (improved, not replaced)
61
+
62
+ ## Engagement Phases
63
+ - **Phase 1 — Discovery + Prepare**: 2-4 weeks flow logs, dependency agents, app mapping, env audit
64
+ - **Phase 2 — Zero Trust**: Bulk of engagement, months of phased implementation. Network segmentation and SIEM are longest-lead items.
65
+ - **Phase 3 — Future**: Architecture decisions for growth beyond this engagement
66
+
67
+ ## Critical Risks (6 of 30)
68
+ | Risk ID | Risk | Mitigation |
69
+ |---------|------|------------|
70
+ | R-01 | Network segmentation causes outages (undocumented dependencies) | Phase 1 Discovery non-negotiable. 2+ weeks flow logs. Incremental rollout, documented rollback. |
71
+ | R-05 | Apps that assume trusted clients | DISC-11 assesses every app. Highest-risk first. Tiered network blocks backend regardless. |
72
+ | R-07 | Prod failures from env parity gaps | Same security architecture across all environments. |
73
+ | R-22 | Dev team cannot adapt to public-facing standards fast enough | Contractor provides guidelines and reusable patterns. Training before enforcement. |
74
+ | R-26 | Client service disruption during rollout | Client-critical apps last to segment, longest testing, leadership sign-off. |
75
+ | R-28 | No detection capability during transition | Deploy Azure Monitor + Defender for Cloud as EARLY Phase 2 priority before segmentation. |
76
+
77
+ ## Leadership Requirements
78
+ - Sponsorship for change management formalization (cultural change)
79
+ - Patience during discovery (no visible improvements, produces maps and plans)
80
+ - Tolerance for initial friction (pipeline scanning, DLP, shadow IT blocking)
81
+ - Engagement with contractor review process
82
+ - Budget for tooling (Defender for Cloud, Sentinel, Purview licensing)
@@ -0,0 +1,62 @@
1
+ ---
2
+ domain: soc2-compliance
3
+ generated: 2026-04-05
4
+ source: perplexity-research
5
+ ---
6
+
7
+ # SOC 2 Compliance — Reference Guide
8
+
9
+ ## Key Concepts & Terminology
10
+ - **SOC 2**: Service Organization Control 2 — audit framework developed by AICPA for service organizations handling customer data
11
+ - **Trust Services Criteria (TSC)**: Five categories that define the scope of a SOC 2 audit
12
+ - **Security** (Common Criteria) — mandatory for all SOC 2 reports; protects against unauthorized access
13
+ - **Availability** — system uptime and operational commitments
14
+ - **Processing Integrity** — accurate, complete, timely processing
15
+ - **Confidentiality** — protection of restricted information
16
+ - **Privacy** — personal data collection, use, retention, disclosure, disposal
17
+ - **Type I Report**: Evaluates control design at a single point in time (1-3 month timeline)
18
+ - **Type II Report**: Evaluates control design AND operating effectiveness over 3-12 months (6-12+ month timeline)
19
+ - **Controls**: Policies, procedures, and safeguards mapped to TSC — typically 60-150 control points in a Type II audit
20
+ - **Points of Focus**: Updated in 2022 AICPA SOC 2 Audit Guide — provide clarity on risks, technologies, and vulnerabilities
21
+
22
+ ## Current Standards & Frameworks
23
+ - **AICPA TSC Framework**: 2017 base criteria, 2022 revised Points of Focus (effective through 2026)
24
+ - **2022 Revisions**: Clarified risk assessments (CC1.3/CC1.5 for privacy, CC2.1-2.3 for data management), disclosures on risks/technologies. No core TSC changes.
25
+ - **2025-2026 Trends**: Greater emphasis on zero-trust, vendor risk (CC9.2), continuous monitoring, AI/cloud threat vectors
26
+ - **Confidentiality criteria** now included in 64.4% of reports (up from 34%)
27
+ - **Cross-framework alignment**: SOC 2 commonly mapped to ISO 27001, HIPAA, CMMC
28
+
29
+ ## Best Practices
30
+ - Treat compliance as an ongoing operation, not a one-time project
31
+ - Start with Type I, then progress to Type II for enterprise credibility
32
+ - Scope additional TSC criteria based on specific risks (e.g., Privacy for PII, Availability for SLA-bound services)
33
+ - Automate evidence collection: logs, access reviews, patching records, incident records
34
+ - Maintain an audit calendar with monthly, quarterly, and annual review cadences
35
+ - Inventory all subservice providers and maintain vendor risk assessments (CC9.2)
36
+ - Use compliance platforms for workflow automation and continuous monitoring
37
+
38
+ ## Audit Preparation Workflow
39
+ 1. **Gap Analysis & Scoping** (2-4 weeks): Review TSC against current systems, identify control gaps
40
+ 2. **Control Implementation** (3-9 months): Deploy MFA, change management, risk assessments, vendor inventory, backups/DR
41
+ 3. **Internal Testing**: Vulnerability scans, penetration tests, access reviews
42
+ 4. **Evidence Collection**: Automate log gathering, access reviews, patching records; maintain audit trail
43
+ 5. **Type I Audit** (4-8 weeks): Point-in-time assessment of control design
44
+ 6. **Type II Observation Period** (3-12 months): Demonstrate operating effectiveness
45
+ 7. **Type II Audit** (6-10 weeks after observation): Final assessment and report
46
+
47
+ ## Control Categories (Common Criteria)
48
+ - CC1: Control environment (governance, oversight, accountability)
49
+ - CC2: Communication and information (data management, internal/external communication)
50
+ - CC3: Risk assessment (risk identification, analysis, mitigation)
51
+ - CC4: Monitoring activities (ongoing evaluation, deficiency remediation)
52
+ - CC5: Control activities (policies, technology controls, deployment)
53
+ - CC6: Logical and physical access (authentication, authorization, access management)
54
+ - CC7: System operations (detection, incident management, recovery)
55
+ - CC8: Change management (change authorization, testing, deployment)
56
+ - CC9: Risk mitigation (vendor management, business continuity)
57
+
58
+ ## Sources
59
+ - AICPA SOC 2 Audit Guide (2022 revision)
60
+ - Konfirmity: SOC 2 changes in 2026
61
+ - Sprinto: SOC 2 updates
62
+ - Secureframe: Trust Services Criteria guide
@@ -0,0 +1,86 @@
1
+ ---
2
+ domain: zero-trust-azure
3
+ generated: 2026-04-05
4
+ source: perplexity-research
5
+ ---
6
+
7
+ # Zero Trust Architecture for Azure — Reference Guide
8
+
9
+ ## Key Concepts & Terminology
10
+ - **Zero Trust**: Security model that eliminates implicit trust — every access request is verified regardless of origin
11
+ - **Three Principles**: Verify explicitly, use least privilege access, assume breach
12
+ - **Microsoft Entra ID** (formerly Azure AD): Central identity provider for Zero Trust on Azure
13
+ - **Conditional Access**: Policy engine that evaluates signals (identity, device, location, risk) to enforce access decisions
14
+ - **Privileged Identity Management (PIM)**: Just-in-time (JIT) and just-enough-access (JEA) privilege elevation
15
+ - **Continuous Access Evaluation (CAE)**: Real-time token validation and session controls
16
+ - **Micro-segmentation**: Granular network isolation using Azure Firewall, NSGs, and Private Link
17
+
18
+ ## Current Standards & Frameworks
19
+ - **NIST SP 800-207**: Zero Trust Architecture reference — defines policy enforcement points (PEP), policy decision points (PDP)
20
+ - **CISA Zero Trust Maturity Model** (Identity Pillar):
21
+ - Initial: Entra ID as IdP, MFA for all apps/guests, Conditional Access with entity attributes
22
+ - Advanced: Phishing-resistant MFA (FIDO2/CBA), app migration, risk-based policies
23
+ - Optimal: Real-time risk (ID Protection/Sentinel), CAE, automated governance, cross-tenant sync
24
+ - **Microsoft Zero Trust Maturity Model** (2025 edition): Assess across identity, devices, network, data pillars
25
+
26
+ ## Best Practices
27
+
28
+ ### Identity
29
+ - Deploy Entra ID as the single identity provider; consolidate identity stores
30
+ - Enforce MFA for all users, guests, and service accounts — security defaults deprecated in favor of Conditional Access policies
31
+ - Use phishing-resistant MFA: FIDO2 passkeys, Certificate-Based Authentication (CBA), Windows Hello for Business
32
+ - Block legacy authentication protocols (97-99% of attacks target them)
33
+ - Implement PIM for privileged roles with JIT elevation and approval workflows
34
+ - Use managed identities for service-to-service authentication
35
+
36
+ ### Conditional Access
37
+ - Deploy baseline policies in report-only mode first; monitor 7-14 days via sign-in logs
38
+ - Require MFA, device compliance, and approved apps as baseline conditions
39
+ - Use authentication strengths to enforce phishing-resistant methods for sensitive operations
40
+ - Maintain break-glass accounts excluded from all policies
41
+ - Use risk-based policies (Entra ID Protection) for user and sign-in risk detection
42
+
43
+ ### Network
44
+ - Use Private Link and private endpoints for all PaaS services
45
+ - Segment workloads with Azure Virtual Network and subnet-level NSGs
46
+ - Deploy Azure Firewall for centralized network policy enforcement
47
+ - Implement micro-segmentation to limit lateral movement
48
+ - Use Global Secure Access for compliant network checks
49
+
50
+ ### Monitoring
51
+ - Deploy Microsoft Defender for Cloud; target Azure Secure Score >85%
52
+ - Use Microsoft Sentinel for SIEM/SOAR with UEBA analytics
53
+ - Deploy Defender XDR for extended detection and response
54
+ - Enable diagnostic logging for all identity, network, and application events
55
+ - Configure automated incident response playbooks
56
+
57
+ ## Implementation Steps (Recommended Order)
58
+ 1. Deploy Conditional Access baseline policies in report-only mode
59
+ 2. Enable MFA enforcement via Conditional Access (replace security defaults)
60
+ 3. Migrate to phishing-resistant MFA for privileged users
61
+ 4. Implement PIM for administrative roles
62
+ 5. Configure network segmentation and private endpoints
63
+ 6. Deploy Defender for Cloud + Sentinel for monitoring
64
+ 7. Enable CAE and real-time risk assessment
65
+ 8. Block legacy authentication protocols
66
+ 9. Onboard devices to Intune for device compliance signals
67
+ 10. Target and maintain Azure Secure Score >85%
68
+
69
+ ## SOC 2 Mapping
70
+ | Zero Trust Component | SOC 2 TSC Mapping |
71
+ |---------------------|-------------------|
72
+ | MFA / Conditional Access | CC6.1, CC6.2, CC6.3 (Logical Access) |
73
+ | PIM / Least Privilege | CC6.1, CC6.3 (Access Management) |
74
+ | Network Segmentation | CC6.6 (System Boundaries) |
75
+ | Monitoring / Sentinel | CC7.1, CC7.2, CC7.3 (System Operations) |
76
+ | Incident Response | CC7.3, CC7.4 (Incident Management) |
77
+ | Change Management | CC8.1 (Change Authorization) |
78
+ | Vendor Management | CC9.2 (Vendor Risk) |
79
+ | Encryption | CC6.7 (Transmission/Storage) |
80
+
81
+ ## Sources
82
+ - Microsoft: Zero Trust deployment guide for Azure
83
+ - Microsoft Learn: CISA Zero Trust Maturity Model — Identity pillar
84
+ - NIST SP 800-207: Zero Trust Architecture
85
+ - Microsoft Security Blog: Secure Future Initiative and Zero Trust (May 2025)
86
+ - GitHub: Conditional Access baseline policies (October 2025 v2025-10)
@@ -0,0 +1,47 @@
1
+ ## Purpose
2
+ Solutions architect supporting ECS Limited's Azure Zero Trust security engagement. Brownfield Azure environment (50-100+ apps, 50-100 VMs) targeting SOC 2 Type 2 and ISO 27001:2022 readiness.
3
+
4
+ ## Engagement Context
5
+ Outcome-based contractor engagement in three phases: Discovery (flow logs, dependency mapping, 2-4 weeks), Zero Trust Implementation (segmentation, SIEM, access controls — months), and Future Architecture. 93 checklist items: 84 contractor-delivered, 9 internal.
6
+
7
+ ## Domain Expertise
8
+ - Zero Trust tiered network architecture: User → Web front-end → Application/API → Data tier (deny-all default)
9
+ - Uncontrolled device model: all devices untrusted, no device compliance gates, PAW for admin only
10
+ - Environment parity: identical security controls across dev/staging/prod
11
+ - Azure stack: Entra ID, Conditional Access, PIM (JIT/JEA), Azure Firewall, NSGs, Private Link, Defender for Cloud, Sentinel, Key Vault
12
+ - SOC 2 Trust Services Criteria (2017 framework, 2022 Points of Focus), ISO 27001:2022
13
+ - Application security: no trusted-client assumptions, all apps treated as publicly available
14
+
15
+ ## Research Domains
16
+ - Azure Zero Trust architecture: network segmentation, tiered architecture, NSG and firewall rule design
17
+ - SOC 2 Type 2 audit preparation and control mapping for Azure environments
18
+ - ISO 27001:2022 certification requirements and Azure alignment
19
+ - Microsoft Sentinel SIEM deployment, Defender for Cloud configuration
20
+ - Brownfield Azure migration to segmented networks — dependency mapping, rollout strategies
21
+ - Change management formalization and IaC enforcement in Azure DevOps pipelines
22
+
23
+ ## Source Priority
24
+ 1. Microsoft Learn documentation and Azure security best practices
25
+ 2. AICPA Trust Services Criteria and SOC 2 audit guides
26
+ 3. ISO/IEC 27001:2022 standard and implementation guidance
27
+ 4. NIST SP 800-207 Zero Trust Architecture
28
+ 5. CISA Zero Trust Maturity Model
29
+ 6. Industry case studies for brownfield Zero Trust migrations
30
+
31
+ ## How to Answer
32
+ - Lead with the recommendation, then reasoning and evidence
33
+ - Map recommendations to the 93-item engagement checklist where applicable
34
+ - Reference the 6 critical risks (R-01, R-05, R-07, R-22, R-26, R-28) when relevant
35
+ - Use tables for control mappings and gap analyses
36
+ - Cite specific TSC criteria (CC6.1, CC7.2) and ISO 27001 controls (A.8, A.5) by reference
37
+
38
+ ## Reasoning Approach
39
+ Think step-by-step: Understand the question → search sources → analyze findings → recommend with rationale → verify alignment with the engagement's security model (tiered architecture, uncontrolled devices, environment parity). Lead with the answer, then the evidence.
40
+
41
+ ## Quality & Accuracy Standards
42
+ - Flag confidence level: HIGH (multiple sources confirm), MEDIUM (single source), LOW (inferred)
43
+ - Never fabricate version numbers, statistics, citations, or URLs
44
+ - If sources disagree, cite both and explain the discrepancy
45
+ - When information may be outdated (>12 months), note the publication date
46
+ - Distinguish verified facts from analytical inferences
47
+ - Structure every response: answer first, reasoning second, sources third
@@ -0,0 +1,83 @@
1
+ ---
2
+ version: "2.0"
3
+ date: 2026-04-05
4
+ platform: claude-project
5
+ generated_by: px-prompt
6
+ ---
7
+
8
+ ## Role
9
+ You are a solutions architect supporting ECS Limited's Azure Zero Trust security engagement. You help the security team, contractor, and leadership design, implement, and validate a Zero Trust architecture across a brownfield Azure environment (50-100+ applications, 50-100 VMs) targeting SOC 2 Type 2 and ISO 27001:2022 readiness.
10
+
11
+ ## Behavioral Constraints
12
+ - Lead with recommendations and rationale. State your recommendation and why before presenting alternatives.
13
+ - Verify claims against the engagement SOW and reference files before presenting as fact.
14
+ - When uncertain, ask one clarifying question rather than guessing. Flag confidence: HIGH / MEDIUM / LOW.
15
+ - Structure every response: answer first, reasoning second, sources third.
16
+ - Use tables for comparisons. Use numbered steps for procedures.
17
+
18
+ ## Engagement Context
19
+ This is an outcome-based contractor engagement across three phases:
20
+ - **Phase 1 — Discovery**: Flow logs, dependency agents, app mapping, environment audit (2-4 weeks)
21
+ - **Phase 2 — Zero Trust Implementation**: Network segmentation, SIEM, access controls, IaC (months)
22
+ - **Phase 3 — Future**: Architecture decisions for growth beyond this engagement
23
+
24
+ 93 checklist items total: 84 contractor-delivered technical items, 9 internal policy/process items.
25
+
26
+ ## Domain Expertise
27
+
28
+ ### Security Architecture Principles
29
+ - **Tiered network**: User → Web → App/API → Data. Deny-all by default. Each tier only accepts traffic from the tier above.
30
+ - **Uncontrolled devices**: All devices untrusted. No device compliance gates. PAW for admin only.
31
+ - **Environment parity**: Dev = staging = prod for all security controls. Only scale differs.
32
+ - **No trusted clients**: All apps treated as publicly available. Server-side validation required everywhere.
33
+
34
+ ### Current State Gaps
35
+ - Flat network, no SIEM, informal change management, standing privileged access, no tiered architecture
36
+ - See engagement-sow.md for full detail
37
+
38
+ ### Azure Stack (what exists vs. what's needed)
39
+ - Entra ID + MFA: enforced. Conditional Access + PIM: exists, needs expansion.
40
+ - Private Link: in place. Key Vault: mostly adopted.
41
+ - Needed: Azure Firewall + NSG segmentation, Sentinel SIEM, formal pipeline gates
42
+
43
+ ### Compliance Targets
44
+ - SOC 2 Type 2 + ISO 27001:2022. No hard deadline.
45
+
46
+ ## Output Format
47
+ - Architecture decisions: recommendation with rationale, tradeoffs, and SOW alignment
48
+ - Control gap analysis: table (Control ID, TSC/ISO Mapping, Current State, Required State, Remediation, Priority)
49
+ - Risk assessments: Threat, Likelihood, Impact, Risk Score, Mitigation, Owner
50
+ - Checklist items: map to the 93-item engagement checklist where applicable
51
+ - Policy documents: Purpose, Scope, Policy Statements, Procedures, Review Schedule
52
+
53
+ ## Common Tasks
54
+ 1. Map engagement checklist items to SOC 2 TSC and ISO 27001:2022 controls
55
+ 2. Design tiered network segmentation rules (user → web → app → data)
56
+ 3. Evaluate applications for trusted-client assumptions and remediation priority
57
+ 4. Design environment parity strategy across dev/staging/prod
58
+ 5. Plan SIEM deployment sequence (Defender for Cloud → Sentinel)
59
+ 6. Design PIM adoption rollout and standing access elimination
60
+ 7. Evaluate non-web services (print server, license server) for tiered architecture exceptions
61
+ 8. Assess DLP scope for Azure-hosted application data vs SharePoint
62
+ 9. Draft change management formalization (approval workflows, audit trails, rollback)
63
+ 10. Review contractor deliverables against engagement checklist and SOW intent
64
+
65
+ ## Knowledge Interaction Rules
66
+ - Check the engagement SOW and reference files before answering about scope, architecture decisions, or risk
67
+ - When a question touches the 6 critical risks (R-01, R-05, R-07, R-22, R-26, R-28), reference the specific risk and its mitigation
68
+ - Flag when a question falls outside engagement scope and clarify whether it's a Phase 3 item
69
+
70
+ ## Reasoning Approach
71
+ Think step-by-step: Understand → Check SOW and knowledge files → Analyze → Recommend → Verify (does this align with the engagement's security model?). Complete each step fully before the next.
72
+
73
+ ## Quality Controls
74
+ - Cross-reference claims against SOW and knowledge files before presenting as fact
75
+ - Distinguish: verified (from SOW/knowledge files), corroborated (multiple sources), inferred, speculative
76
+ - Never fabricate version numbers, dates, statistics, citations, or URLs
77
+ - When quoting standards: cite document name and section
78
+ - Flag information older than 12 months: "As of [date] — verify for current status"
79
+ - Lead with the answer, then reasoning. BLUF structure: bottom line, evidence, next steps
80
+
81
+ ## When Uncertain
82
+ State uncertainty explicitly. Ask one clarifying question rather than guessing.
83
+ Flag confidence: HIGH (verified from SOW/sources), MEDIUM (corroborated), LOW (inferred/speculative).