blockmine 1.24.0 → 1.25.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +32 -0
- package/README.en.md +427 -0
- package/README.md +40 -0
- package/backend/cli.js +1 -1
- package/backend/src/ai/plugin-assistant-system-prompt.md +664 -5
- package/backend/src/api/routes/bots.js +13 -0
- package/backend/src/api/routes/servers.js +14 -2
- package/backend/src/core/BotProcess.js +98 -2
- package/backend/src/core/PluginLoader.js +83 -3
- package/backend/src/core/PluginManager.js +75 -5
- package/backend/src/core/services/BotLifecycleService.js +186 -2
- package/backend/src/server.js +11 -1
- package/frontend/dist/assets/browser-ponyfill-DN7pwmHT.js +2 -0
- package/frontend/dist/assets/index-LSy71uwm.js +11261 -0
- package/frontend/dist/assets/index-SfhKxI4-.css +32 -0
- package/frontend/dist/flags/en.svg +32 -0
- package/frontend/dist/flags/ru.svg +5 -0
- package/frontend/dist/index.html +2 -2
- package/frontend/dist/locales/en/admin.json +100 -0
- package/frontend/dist/locales/en/api-keys.json +58 -0
- package/frontend/dist/locales/en/bots.json +110 -0
- package/frontend/dist/locales/en/common.json +47 -0
- package/frontend/dist/locales/en/configuration.json +22 -0
- package/frontend/dist/locales/en/console.json +10 -0
- package/frontend/dist/locales/en/dashboard.json +85 -0
- package/frontend/dist/locales/en/dialogs.json +70 -0
- package/frontend/dist/locales/en/event-graphs.json +50 -0
- package/frontend/dist/locales/en/graph-store.json +70 -0
- package/frontend/dist/locales/en/login.json +34 -0
- package/frontend/dist/locales/en/management.json +114 -0
- package/frontend/dist/locales/en/minecraft-viewer.json +27 -0
- package/frontend/dist/locales/en/nodes.json +1077 -0
- package/frontend/dist/locales/en/permissions.json +50 -0
- package/frontend/dist/locales/en/plugin-detail.json +49 -0
- package/frontend/dist/locales/en/plugins.json +110 -0
- package/frontend/dist/locales/en/proxies.json +81 -0
- package/frontend/dist/locales/en/servers.json +39 -0
- package/frontend/dist/locales/en/setup.json +17 -0
- package/frontend/dist/locales/en/sidebar.json +27 -0
- package/frontend/dist/locales/en/tasks.json +62 -0
- package/frontend/dist/locales/en/visual-editor.json +219 -0
- package/frontend/dist/locales/en/websocket.json +86 -0
- package/frontend/dist/locales/ru/admin.json +100 -0
- package/frontend/dist/locales/ru/api-keys.json +58 -0
- package/frontend/dist/locales/ru/bots.json +110 -0
- package/frontend/dist/locales/ru/common.json +49 -0
- package/frontend/dist/locales/ru/configuration.json +22 -0
- package/frontend/dist/locales/ru/console.json +10 -0
- package/frontend/dist/locales/ru/dashboard.json +85 -0
- package/frontend/dist/locales/ru/dialogs.json +70 -0
- package/frontend/dist/locales/ru/event-graphs.json +50 -0
- package/frontend/dist/locales/ru/graph-store.json +70 -0
- package/frontend/dist/locales/ru/login.json +34 -0
- package/frontend/dist/locales/ru/management.json +114 -0
- package/frontend/dist/locales/ru/minecraft-viewer.json +27 -0
- package/frontend/dist/locales/ru/nodes.json +1077 -0
- package/frontend/dist/locales/ru/permissions.json +50 -0
- package/frontend/dist/locales/ru/plugin-detail.json +49 -0
- package/frontend/dist/locales/ru/plugins.json +110 -0
- package/frontend/dist/locales/ru/proxies.json +81 -0
- package/frontend/dist/locales/ru/servers.json +39 -0
- package/frontend/dist/locales/ru/setup.json +17 -0
- package/frontend/dist/locales/ru/sidebar.json +27 -0
- package/frontend/dist/locales/ru/tasks.json +62 -0
- package/frontend/dist/locales/ru/visual-editor.json +221 -0
- package/frontend/dist/locales/ru/websocket.json +86 -0
- package/frontend/dist/monacoeditorwork/css.worker.bundle.js +7 -7
- package/frontend/dist/monacoeditorwork/html.worker.bundle.js +7 -7
- package/frontend/dist/monacoeditorwork/json.worker.bundle.js +7 -7
- package/frontend/dist/monacoeditorwork/ts.worker.bundle.js +3 -3
- package/frontend/package.json +4 -0
- package/package.json +1 -1
- package/screen/3dviewer.png +0 -0
- package/screen/console.png +0 -0
- package/screen/dashboard.png +0 -0
- package/screen/graph_collabe.png +0 -0
- package/screen/graph_live_debug.png +0 -0
- package/screen/language_selector.png +0 -0
- package/screen/management_command.png +0 -0
- package/screen/node_debug_trace.png +0 -0
- package/screen/plugin_/320/276/320/261/320/267/320/276/321/200.png +0 -0
- package/screen/websocket.png +0 -0
- package/screen//320/275/320/260/321/201/321/202/321/200/320/276/320/271/320/272/320/270_/320/276/321/202/320/264/320/265/320/273/321/214/320/275/321/213/321/205_/320/272/320/276/320/274/320/260/320/275/320/264_/320/272/320/260/320/266/320/264/321/203_/320/272/320/276/320/274/320/260/320/275/320/273/320/264/321/203_/320/274/320/276/320/266/320/275/320/276_/320/275/320/260/321/201/321/202/321/200/320/260/320/270/320/262/320/260/321/202/321/214.png +0 -0
- package/screen//320/277/320/273/320/260/320/275/320/270/321/200/320/276/320/262/321/211/320/270/320/272_/320/274/320/276/320/266/320/275/320/276_/320/267/320/260/320/264/320/260/320/262/320/260/321/202/321/214_/320/264/320/265/320/271/321/201/321/202/320/262/320/270/321/217_/320/277/320/276_/320/262/321/200/320/265/320/274/320/265/320/275/320/270.png +0 -0
- package/.claude/agents/README.md +0 -469
- package/.claude/agents/auth-route-debugger.md +0 -118
- package/.claude/agents/auth-route-tester.md +0 -93
- package/.claude/agents/auto-error-resolver.md +0 -97
- package/.claude/agents/build-optimizer.md +0 -236
- package/.claude/agents/code-architect.md +0 -34
- package/.claude/agents/code-architecture-reviewer.md +0 -83
- package/.claude/agents/code-explorer.md +0 -51
- package/.claude/agents/code-refactor-master.md +0 -94
- package/.claude/agents/code-reviewer.md +0 -46
- package/.claude/agents/cost-optimizer.md +0 -134
- package/.claude/agents/deployment-orchestrator.md +0 -113
- package/.claude/agents/documentation-architect.md +0 -82
- package/.claude/agents/frontend-error-fixer.md +0 -77
- package/.claude/agents/iac-code-generator.md +0 -71
- package/.claude/agents/incident-responder.md +0 -346
- package/.claude/agents/infrastructure-architect.md +0 -31
- package/.claude/agents/kubernetes-specialist.md +0 -56
- package/.claude/agents/migration-planner.md +0 -181
- package/.claude/agents/network-architect.md +0 -196
- package/.claude/agents/plan-reviewer.md +0 -52
- package/.claude/agents/refactor-planner.md +0 -63
- package/.claude/agents/security-scanner.md +0 -102
- package/.claude/agents/web-research-specialist.md +0 -78
- package/.claude/commands/cost-analysis.md +0 -315
- package/.claude/commands/dev-docs-update.md +0 -55
- package/.claude/commands/dev-docs.md +0 -51
- package/.claude/commands/feature-dev.md +0 -125
- package/.claude/commands/incident-debug.md +0 -247
- package/.claude/commands/infra-plan.md +0 -81
- package/.claude/commands/migration-plan.md +0 -478
- package/.claude/commands/route-research-for-testing.md +0 -37
- package/.claude/commands/security-review.md +0 -66
- package/.claude/hooks/CONFIG.md +0 -448
- package/.claude/hooks/README.md +0 -163
- package/.claude/hooks/SKILL_ACTIVATION_COMPLETE.md +0 -226
- package/.claude/hooks/WINDOWS_HOOKS_README.md +0 -151
- package/.claude/hooks/add-skill-activation-banners.ts +0 -132
- package/.claude/hooks/comprehensive-skill-test.ts +0 -1315
- package/.claude/hooks/error-handling-reminder.sh +0 -12
- package/.claude/hooks/error-handling-reminder.ts +0 -222
- package/.claude/hooks/k8s-manifest-validator.sh +0 -56
- package/.claude/hooks/package-lock.json +0 -556
- package/.claude/hooks/package.json +0 -16
- package/.claude/hooks/post-tool-use-tracker.ps1 +0 -174
- package/.claude/hooks/post-tool-use-tracker.sh +0 -183
- package/.claude/hooks/security-policy-check.sh +0 -247
- package/.claude/hooks/skill-activation-prompt.ps1 +0 -10
- package/.claude/hooks/skill-activation-prompt.sh +0 -10
- package/.claude/hooks/skill-activation-prompt.ts +0 -141
- package/.claude/hooks/stop-build-check-enhanced.sh +0 -130
- package/.claude/hooks/terraform-validator.sh +0 -53
- package/.claude/hooks/test-input.json +0 -7
- package/.claude/hooks/test-skill-activation.ts +0 -427
- package/.claude/hooks/trigger-build-resolver.sh +0 -79
- package/.claude/hooks/tsc-check.sh +0 -173
- package/.claude/hooks/tsconfig.json +0 -19
- package/.claude/settings.json +0 -59
- package/.claude/settings.local.json +0 -67
- package/.claude/skills/README.md +0 -507
- package/.claude/skills/api-engineering/SKILL.md +0 -63
- package/.claude/skills/api-engineering/resources/api-versioning.md +0 -88
- package/.claude/skills/api-engineering/resources/graphql-patterns.md +0 -106
- package/.claude/skills/api-engineering/resources/rate-limiting.md +0 -118
- package/.claude/skills/api-engineering/resources/rest-api-design.md +0 -105
- package/.claude/skills/backend-dev-guidelines/SKILL.md +0 -306
- package/.claude/skills/backend-dev-guidelines/resources/architecture-overview.md +0 -451
- package/.claude/skills/backend-dev-guidelines/resources/async-and-errors.md +0 -307
- package/.claude/skills/backend-dev-guidelines/resources/complete-examples.md +0 -638
- package/.claude/skills/backend-dev-guidelines/resources/configuration.md +0 -275
- package/.claude/skills/backend-dev-guidelines/resources/database-patterns.md +0 -224
- package/.claude/skills/backend-dev-guidelines/resources/middleware-guide.md +0 -213
- package/.claude/skills/backend-dev-guidelines/resources/routing-and-controllers.md +0 -756
- package/.claude/skills/backend-dev-guidelines/resources/sentry-and-monitoring.md +0 -336
- package/.claude/skills/backend-dev-guidelines/resources/services-and-repositories.md +0 -789
- package/.claude/skills/backend-dev-guidelines/resources/testing-guide.md +0 -235
- package/.claude/skills/backend-dev-guidelines/resources/validation-patterns.md +0 -754
- package/.claude/skills/budget-and-cost-management/SKILL.md +0 -850
- package/.claude/skills/build-engineering/SKILL.md +0 -431
- package/.claude/skills/build-engineering/resources/artifact-repositories.md +0 -72
- package/.claude/skills/build-engineering/resources/build-caching.md +0 -96
- package/.claude/skills/build-engineering/resources/build-pipelines.md +0 -105
- package/.claude/skills/build-engineering/resources/build-security.md +0 -95
- package/.claude/skills/build-engineering/resources/build-systems.md +0 -389
- package/.claude/skills/build-engineering/resources/compilation-optimization.md +0 -201
- package/.claude/skills/build-engineering/resources/dependency-management.md +0 -73
- package/.claude/skills/build-engineering/resources/monorepo-builds.md +0 -110
- package/.claude/skills/build-engineering/resources/performance-optimization.md +0 -113
- package/.claude/skills/build-engineering/resources/reproducible-builds.md +0 -82
- package/.claude/skills/cloud-engineering/SKILL.md +0 -675
- package/.claude/skills/cloud-engineering/resources/aws-patterns.md +0 -742
- package/.claude/skills/cloud-engineering/resources/azure-patterns.md +0 -714
- package/.claude/skills/cloud-engineering/resources/cleared-cloud-environments.md +0 -987
- package/.claude/skills/cloud-engineering/resources/cloud-cost-optimization.md +0 -757
- package/.claude/skills/cloud-engineering/resources/cloud-networking.md +0 -1058
- package/.claude/skills/cloud-engineering/resources/cloud-security-tools.md +0 -1530
- package/.claude/skills/cloud-engineering/resources/cloud-security.md +0 -990
- package/.claude/skills/cloud-engineering/resources/gcp-patterns.md +0 -758
- package/.claude/skills/cloud-engineering/resources/migration-strategies.md +0 -820
- package/.claude/skills/cloud-engineering/resources/multi-cloud-strategies.md +0 -670
- package/.claude/skills/cloud-engineering/resources/oci-patterns.md +0 -1198
- package/.claude/skills/cloud-engineering/resources/serverless-patterns.md +0 -795
- package/.claude/skills/cloud-engineering/resources/well-architected-frameworks.md +0 -966
- package/.claude/skills/cybersecurity/SKILL.md +0 -409
- package/.claude/skills/cybersecurity/resources/security-architecture.md +0 -266
- package/.claude/skills/database-engineering/SKILL.md +0 -61
- package/.claude/skills/database-engineering/resources/backup-and-recovery.md +0 -72
- package/.claude/skills/database-engineering/resources/database-replication.md +0 -63
- package/.claude/skills/database-engineering/resources/postgresql-fundamentals.md +0 -70
- package/.claude/skills/database-engineering/resources/query-optimization.md +0 -68
- package/.claude/skills/devsecops/SKILL.md +0 -374
- package/.claude/skills/devsecops/resources/ci-cd-security.md +0 -204
- package/.claude/skills/devsecops/resources/compliance-automation.md +0 -530
- package/.claude/skills/devsecops/resources/compliance-frameworks.md +0 -2322
- package/.claude/skills/devsecops/resources/container-security.md +0 -915
- package/.claude/skills/devsecops/resources/cspm-integration.md +0 -1440
- package/.claude/skills/devsecops/resources/policy-enforcement.md +0 -619
- package/.claude/skills/devsecops/resources/secrets-management.md +0 -755
- package/.claude/skills/devsecops/resources/security-monitoring.md +0 -146
- package/.claude/skills/devsecops/resources/security-scanning.md +0 -887
- package/.claude/skills/devsecops/resources/security-testing.md +0 -203
- package/.claude/skills/devsecops/resources/supply-chain-security.md +0 -518
- package/.claude/skills/devsecops/resources/vulnerability-management.md +0 -481
- package/.claude/skills/devsecops/resources/zero-trust-architecture.md +0 -177
- package/.claude/skills/documentation-as-code/SKILL.md +0 -323
- package/.claude/skills/documentation-as-code/resources/api-documentation.md +0 -90
- package/.claude/skills/documentation-as-code/resources/changelog-management.md +0 -79
- package/.claude/skills/documentation-as-code/resources/diagram-generation.md +0 -44
- package/.claude/skills/documentation-as-code/resources/docs-as-code-workflow.md +0 -99
- package/.claude/skills/documentation-as-code/resources/documentation-automation.md +0 -68
- package/.claude/skills/documentation-as-code/resources/documentation-sites.md +0 -79
- package/.claude/skills/documentation-as-code/resources/markdown-best-practices.md +0 -162
- package/.claude/skills/documentation-as-code/resources/openapi-specification.md +0 -77
- package/.claude/skills/documentation-as-code/resources/readme-engineering.md +0 -60
- package/.claude/skills/documentation-as-code/resources/technical-writing-guide.md +0 -202
- package/.claude/skills/engineering-management/SKILL.md +0 -356
- package/.claude/skills/engineering-management/resources/career-ladders.md +0 -609
- package/.claude/skills/engineering-management/resources/hiring-and-assessment.md +0 -555
- package/.claude/skills/engineering-management/resources/one-on-one-guides.md +0 -609
- package/.claude/skills/engineering-management/resources/resource-planning.md +0 -557
- package/.claude/skills/engineering-management/resources/team-organization-patterns.md +0 -491
- package/.claude/skills/engineering-management/resources/technical-interviews.md +0 -474
- package/.claude/skills/engineering-operations-management/SKILL.md +0 -817
- package/.claude/skills/error-tracking/SKILL.md +0 -379
- package/.claude/skills/frontend-design/SKILL.md +0 -42
- package/.claude/skills/frontend-dev-guidelines/SKILL.md +0 -403
- package/.claude/skills/frontend-dev-guidelines/resources/common-patterns.md +0 -331
- package/.claude/skills/frontend-dev-guidelines/resources/complete-examples.md +0 -872
- package/.claude/skills/frontend-dev-guidelines/resources/component-patterns.md +0 -502
- package/.claude/skills/frontend-dev-guidelines/resources/data-fetching.md +0 -767
- package/.claude/skills/frontend-dev-guidelines/resources/file-organization.md +0 -502
- package/.claude/skills/frontend-dev-guidelines/resources/loading-and-error-states.md +0 -501
- package/.claude/skills/frontend-dev-guidelines/resources/performance.md +0 -406
- package/.claude/skills/frontend-dev-guidelines/resources/routing-guide.md +0 -364
- package/.claude/skills/frontend-dev-guidelines/resources/styling-guide.md +0 -428
- package/.claude/skills/frontend-dev-guidelines/resources/typescript-standards.md +0 -418
- package/.claude/skills/general-it-engineering/SKILL.md +0 -393
- package/.claude/skills/general-it-engineering/resources/asset-management.md +0 -712
- package/.claude/skills/general-it-engineering/resources/automation-orchestration.md +0 -817
- package/.claude/skills/general-it-engineering/resources/business-continuity.md +0 -786
- package/.claude/skills/general-it-engineering/resources/change-management.md +0 -715
- package/.claude/skills/general-it-engineering/resources/enterprise-monitoring.md +0 -729
- package/.claude/skills/general-it-engineering/resources/help-desk-operations.md +0 -738
- package/.claude/skills/general-it-engineering/resources/incident-service-management.md +0 -834
- package/.claude/skills/general-it-engineering/resources/it-governance.md +0 -753
- package/.claude/skills/general-it-engineering/resources/itil-framework.md +0 -503
- package/.claude/skills/general-it-engineering/resources/service-management.md +0 -669
- package/.claude/skills/infrastructure-architecture/SKILL.md +0 -328
- package/.claude/skills/infrastructure-architecture/resources/architecture-decision-records.md +0 -505
- package/.claude/skills/infrastructure-architecture/resources/architecture-patterns.md +0 -528
- package/.claude/skills/infrastructure-architecture/resources/capacity-planning.md +0 -453
- package/.claude/skills/infrastructure-architecture/resources/cleared-environment-architecture.md +0 -773
- package/.claude/skills/infrastructure-architecture/resources/cost-architecture.md +0 -499
- package/.claude/skills/infrastructure-architecture/resources/data-architecture.md +0 -501
- package/.claude/skills/infrastructure-architecture/resources/disaster-recovery.md +0 -535
- package/.claude/skills/infrastructure-architecture/resources/migration-architecture.md +0 -512
- package/.claude/skills/infrastructure-architecture/resources/multi-region-design.md +0 -608
- package/.claude/skills/infrastructure-architecture/resources/reference-architectures.md +0 -562
- package/.claude/skills/infrastructure-architecture/resources/security-architecture.md +0 -538
- package/.claude/skills/infrastructure-architecture/resources/system-design-principles.md +0 -489
- package/.claude/skills/infrastructure-architecture/resources/workload-classification.md +0 -1000
- package/.claude/skills/infrastructure-strategy/SKILL.md +0 -924
- package/.claude/skills/network-engineering/SKILL.md +0 -385
- package/.claude/skills/network-engineering/resources/dns-management.md +0 -738
- package/.claude/skills/network-engineering/resources/load-balancing.md +0 -820
- package/.claude/skills/network-engineering/resources/network-architecture.md +0 -546
- package/.claude/skills/network-engineering/resources/network-security.md +0 -921
- package/.claude/skills/network-engineering/resources/network-troubleshooting.md +0 -749
- package/.claude/skills/network-engineering/resources/routing-switching.md +0 -373
- package/.claude/skills/network-engineering/resources/sdn-networking.md +0 -695
- package/.claude/skills/network-engineering/resources/service-mesh-networking.md +0 -777
- package/.claude/skills/network-engineering/resources/tcp-ip-protocols.md +0 -444
- package/.claude/skills/network-engineering/resources/vpn-connectivity.md +0 -672
- package/.claude/skills/node-development/SKILL.md +0 -317
- package/.claude/skills/observability-engineering/SKILL.md +0 -101
- package/.claude/skills/observability-engineering/resources/apm-tools.md +0 -97
- package/.claude/skills/observability-engineering/resources/correlation-strategies.md +0 -87
- package/.claude/skills/observability-engineering/resources/distributed-tracing.md +0 -98
- package/.claude/skills/observability-engineering/resources/logs-aggregation.md +0 -118
- package/.claude/skills/observability-engineering/resources/observability-cost-optimization.md +0 -141
- package/.claude/skills/observability-engineering/resources/opentelemetry.md +0 -110
- package/.claude/skills/platform-engineering/SKILL.md +0 -555
- package/.claude/skills/platform-engineering/resources/architecture-overview.md +0 -600
- package/.claude/skills/platform-engineering/resources/container-orchestration.md +0 -916
- package/.claude/skills/platform-engineering/resources/cost-optimization.md +0 -634
- package/.claude/skills/platform-engineering/resources/developer-platforms.md +0 -670
- package/.claude/skills/platform-engineering/resources/gitops-automation.md +0 -650
- package/.claude/skills/platform-engineering/resources/infrastructure-as-code.md +0 -778
- package/.claude/skills/platform-engineering/resources/infrastructure-standards.md +0 -708
- package/.claude/skills/platform-engineering/resources/multi-tenancy.md +0 -602
- package/.claude/skills/platform-engineering/resources/platform-security.md +0 -711
- package/.claude/skills/platform-engineering/resources/resource-management.md +0 -592
- package/.claude/skills/platform-engineering/resources/service-mesh.md +0 -628
- package/.claude/skills/release-engineering/SKILL.md +0 -393
- package/.claude/skills/release-engineering/resources/artifact-management.md +0 -108
- package/.claude/skills/release-engineering/resources/build-optimization.md +0 -84
- package/.claude/skills/release-engineering/resources/ci-cd-pipelines.md +0 -411
- package/.claude/skills/release-engineering/resources/deployment-strategies.md +0 -197
- package/.claude/skills/release-engineering/resources/pipeline-security.md +0 -62
- package/.claude/skills/release-engineering/resources/progressive-delivery.md +0 -83
- package/.claude/skills/release-engineering/resources/release-automation.md +0 -68
- package/.claude/skills/release-engineering/resources/release-orchestration.md +0 -77
- package/.claude/skills/release-engineering/resources/rollback-strategies.md +0 -66
- package/.claude/skills/release-engineering/resources/versioning-strategies.md +0 -59
- package/.claude/skills/route-tester/SKILL.md +0 -392
- package/.claude/skills/skill-developer/ADVANCED.md +0 -197
- package/.claude/skills/skill-developer/HOOK_MECHANISMS.md +0 -306
- package/.claude/skills/skill-developer/PATTERNS_LIBRARY.md +0 -152
- package/.claude/skills/skill-developer/SKILL.md +0 -430
- package/.claude/skills/skill-developer/SKILL_RULES_REFERENCE.md +0 -315
- package/.claude/skills/skill-developer/TRIGGER_TYPES.md +0 -305
- package/.claude/skills/skill-developer/TROUBLESHOOTING.md +0 -514
- package/.claude/skills/skill-rules.json +0 -2989
- package/.claude/skills/sre/SKILL.md +0 -464
- package/.claude/skills/sre/resources/alerting-best-practices.md +0 -282
- package/.claude/skills/sre/resources/capacity-planning.md +0 -226
- package/.claude/skills/sre/resources/chaos-engineering.md +0 -193
- package/.claude/skills/sre/resources/disaster-recovery.md +0 -232
- package/.claude/skills/sre/resources/incident-management.md +0 -436
- package/.claude/skills/sre/resources/observability-stack.md +0 -240
- package/.claude/skills/sre/resources/on-call-runbooks.md +0 -167
- package/.claude/skills/sre/resources/performance-optimization.md +0 -108
- package/.claude/skills/sre/resources/reliability-patterns.md +0 -183
- package/.claude/skills/sre/resources/slo-sli-sla.md +0 -464
- package/.claude/skills/sre/resources/toil-reduction.md +0 -145
- package/.claude/skills/systems-engineering/SKILL.md +0 -648
- package/.claude/skills/systems-engineering/resources/automation-patterns.md +0 -771
- package/.claude/skills/systems-engineering/resources/configuration-management.md +0 -998
- package/.claude/skills/systems-engineering/resources/linux-administration.md +0 -672
- package/.claude/skills/systems-engineering/resources/networking-fundamentals.md +0 -982
- package/.claude/skills/systems-engineering/resources/performance-tuning.md +0 -871
- package/.claude/skills/systems-engineering/resources/powershell-scripting.md +0 -482
- package/.claude/skills/systems-engineering/resources/security-hardening.md +0 -739
- package/.claude/skills/systems-engineering/resources/shell-scripting.md +0 -915
- package/.claude/skills/systems-engineering/resources/storage-management.md +0 -628
- package/.claude/skills/systems-engineering/resources/system-monitoring.md +0 -787
- package/.claude/skills/systems-engineering/resources/troubleshooting-guide.md +0 -753
- package/.claude/skills/systems-engineering/resources/windows-administration.md +0 -738
- package/.claude/skills/technical-leadership/SKILL.md +0 -728
- package/backend/docs/SECRETS_DOCUMENTATION.md +0 -327
- package/frontend/dist/assets/index-BC-NbKXi.css +0 -32
- package/frontend/dist/assets/index-DqJXZMHY.js +0 -11266
|
@@ -1,409 +0,0 @@
|
|
|
1
|
-
# Cybersecurity Skill
|
|
2
|
-
|
|
3
|
-
## Overview
|
|
4
|
-
|
|
5
|
-
Comprehensive cybersecurity guidance covering security architecture, threat modeling, security operations, incident response, application security, network security, cloud security, identity and access management, cryptography, security testing, and compliance.
|
|
6
|
-
|
|
7
|
-
## When to Use This Skill
|
|
8
|
-
|
|
9
|
-
This skill should be activated when:
|
|
10
|
-
- Designing security architectures
|
|
11
|
-
- Implementing security controls
|
|
12
|
-
- Conducting threat modeling
|
|
13
|
-
- Setting up security operations
|
|
14
|
-
- Responding to security incidents
|
|
15
|
-
- Securing applications and APIs
|
|
16
|
-
- Implementing network security
|
|
17
|
-
- Securing cloud environments
|
|
18
|
-
- Managing identity and access
|
|
19
|
-
- Implementing cryptographic solutions
|
|
20
|
-
- Performing security testing
|
|
21
|
-
- Achieving security compliance
|
|
22
|
-
|
|
23
|
-
## Core Security Domains
|
|
24
|
-
|
|
25
|
-
### 1. Security Architecture & Design
|
|
26
|
-
|
|
27
|
-
**Principles:**
|
|
28
|
-
- Zero Trust Architecture
|
|
29
|
-
- Defense in Depth
|
|
30
|
-
- Least Privilege
|
|
31
|
-
- Separation of Duties
|
|
32
|
-
- Fail Secure
|
|
33
|
-
- Security by Design
|
|
34
|
-
|
|
35
|
-
**Architecture Patterns:**
|
|
36
|
-
- Segmented network architecture
|
|
37
|
-
- Micro-segmentation
|
|
38
|
-
- Perimeter security
|
|
39
|
-
- Defense in depth layering
|
|
40
|
-
- Security zones and enclaves
|
|
41
|
-
- DMZ architecture
|
|
42
|
-
- Bastion host patterns
|
|
43
|
-
|
|
44
|
-
### 2. Threat Modeling & Risk Management
|
|
45
|
-
|
|
46
|
-
**Frameworks:**
|
|
47
|
-
- STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)
|
|
48
|
-
- PASTA (Process for Attack Simulation and Threat Analysis)
|
|
49
|
-
- DREAD (Damage, Reproducibility, Exploitability, Affected Users, Discoverability)
|
|
50
|
-
- OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)
|
|
51
|
-
|
|
52
|
-
**Process:**
|
|
53
|
-
1. Identify assets
|
|
54
|
-
2. Identify threats
|
|
55
|
-
3. Assess vulnerabilities
|
|
56
|
-
4. Determine risk
|
|
57
|
-
5. Implement mitigations
|
|
58
|
-
6. Validate and monitor
|
|
59
|
-
|
|
60
|
-
### 3. Security Operations (SecOps)
|
|
61
|
-
|
|
62
|
-
**Key Components:**
|
|
63
|
-
- Security Operations Center (SOC)
|
|
64
|
-
- Security Information and Event Management (SIEM)
|
|
65
|
-
- Security Orchestration, Automation, and Response (SOAR)
|
|
66
|
-
- Intrusion Detection/Prevention Systems (IDS/IPS)
|
|
67
|
-
- Endpoint Detection and Response (EDR)
|
|
68
|
-
- Extended Detection and Response (XDR)
|
|
69
|
-
|
|
70
|
-
**Processes:**
|
|
71
|
-
- Continuous monitoring
|
|
72
|
-
- Log aggregation and analysis
|
|
73
|
-
- Threat intelligence integration
|
|
74
|
-
- Alert triage and investigation
|
|
75
|
-
- Incident escalation
|
|
76
|
-
- Threat hunting
|
|
77
|
-
- Vulnerability management
|
|
78
|
-
- Patch management
|
|
79
|
-
|
|
80
|
-
### 4. Incident Response
|
|
81
|
-
|
|
82
|
-
**Phases:**
|
|
83
|
-
1. **Preparation:** IR plan, team, tools, training
|
|
84
|
-
2. **Identification:** Detect and determine scope
|
|
85
|
-
3. **Containment:** Short-term and long-term containment
|
|
86
|
-
4. **Eradication:** Remove threat and vulnerabilities
|
|
87
|
-
5. **Recovery:** Restore systems to normal
|
|
88
|
-
6. **Lessons Learned:** Post-incident review
|
|
89
|
-
|
|
90
|
-
**Key Artifacts:**
|
|
91
|
-
- Incident Response Plan
|
|
92
|
-
- Playbooks/Runbooks
|
|
93
|
-
- Communication plan
|
|
94
|
-
- Evidence handling procedures
|
|
95
|
-
- Chain of custody documentation
|
|
96
|
-
- Post-incident reports
|
|
97
|
-
|
|
98
|
-
### 5. Application Security (AppSec)
|
|
99
|
-
|
|
100
|
-
**Secure Development:**
|
|
101
|
-
- Secure SDLC (SSDLC)
|
|
102
|
-
- Security requirements
|
|
103
|
-
- Threat modeling in design
|
|
104
|
-
- Secure coding practices
|
|
105
|
-
- Code review
|
|
106
|
-
- Security testing
|
|
107
|
-
|
|
108
|
-
**Security Testing:**
|
|
109
|
-
- Static Application Security Testing (SAST)
|
|
110
|
-
- Dynamic Application Security Testing (DAST)
|
|
111
|
-
- Interactive Application Security Testing (IAST)
|
|
112
|
-
- Software Composition Analysis (SCA)
|
|
113
|
-
- Penetration testing
|
|
114
|
-
- Bug bounty programs
|
|
115
|
-
|
|
116
|
-
**Common Vulnerabilities:**
|
|
117
|
-
- OWASP Top 10
|
|
118
|
-
- SQL Injection
|
|
119
|
-
- Cross-Site Scripting (XSS)
|
|
120
|
-
- Cross-Site Request Forgery (CSRF)
|
|
121
|
-
- Insecure deserialization
|
|
122
|
-
- Security misconfiguration
|
|
123
|
-
- Broken authentication
|
|
124
|
-
- Sensitive data exposure
|
|
125
|
-
|
|
126
|
-
### 6. Network Security
|
|
127
|
-
|
|
128
|
-
**Controls:**
|
|
129
|
-
- Firewalls (next-gen, web application)
|
|
130
|
-
- Network segmentation
|
|
131
|
-
- VLANs and VXLANs
|
|
132
|
-
- VPN (IPSec, SSL/TLS)
|
|
133
|
-
- Network Access Control (NAC)
|
|
134
|
-
- Intrusion Detection/Prevention
|
|
135
|
-
- DDoS protection
|
|
136
|
-
- DNS security (DNSSEC)
|
|
137
|
-
|
|
138
|
-
**Monitoring:**
|
|
139
|
-
- Network traffic analysis
|
|
140
|
-
- NetFlow/sFlow analysis
|
|
141
|
-
- Packet capture and analysis
|
|
142
|
-
- Anomaly detection
|
|
143
|
-
- Threat intelligence feeds
|
|
144
|
-
|
|
145
|
-
### 7. Cloud Security
|
|
146
|
-
|
|
147
|
-
**Shared Responsibility Model:**
|
|
148
|
-
- Cloud provider responsibilities
|
|
149
|
-
- Customer responsibilities
|
|
150
|
-
- Different models: IaaS, PaaS, SaaS
|
|
151
|
-
|
|
152
|
-
**Cloud Security Controls:**
|
|
153
|
-
- Cloud Security Posture Management (CSPM)
|
|
154
|
-
- Cloud Workload Protection Platform (CWPP)
|
|
155
|
-
- Cloud Access Security Broker (CASB)
|
|
156
|
-
- Secure configuration
|
|
157
|
-
- Identity and access management
|
|
158
|
-
- Encryption (at-rest, in-transit)
|
|
159
|
-
- Key management
|
|
160
|
-
- Logging and monitoring
|
|
161
|
-
- Compliance validation
|
|
162
|
-
|
|
163
|
-
**Cloud-Specific Threats:**
|
|
164
|
-
- Misconfigured storage buckets
|
|
165
|
-
- Excessive IAM permissions
|
|
166
|
-
- Unencrypted data
|
|
167
|
-
- Exposed secrets
|
|
168
|
-
- Vulnerable container images
|
|
169
|
-
- Supply chain attacks
|
|
170
|
-
|
|
171
|
-
### 8. Identity & Access Management (IAM)
|
|
172
|
-
|
|
173
|
-
**Core Concepts:**
|
|
174
|
-
- Authentication vs Authorization
|
|
175
|
-
- Single Sign-On (SSO)
|
|
176
|
-
- Multi-Factor Authentication (MFA)
|
|
177
|
-
- Privileged Access Management (PAM)
|
|
178
|
-
- Identity Federation
|
|
179
|
-
- Just-In-Time (JIT) access
|
|
180
|
-
- Zero Trust Network Access (ZTNA)
|
|
181
|
-
|
|
182
|
-
**Technologies:**
|
|
183
|
-
- Active Directory / Azure AD
|
|
184
|
-
- LDAP
|
|
185
|
-
- SAML 2.0
|
|
186
|
-
- OAuth 2.0 / OpenID Connect
|
|
187
|
-
- Kerberos
|
|
188
|
-
- RADIUS
|
|
189
|
-
- TACACS+
|
|
190
|
-
|
|
191
|
-
**Best Practices:**
|
|
192
|
-
- Principle of least privilege
|
|
193
|
-
- Regular access reviews
|
|
194
|
-
- Strong password policies
|
|
195
|
-
- MFA enforcement
|
|
196
|
-
- Service account management
|
|
197
|
-
- Privileged account monitoring
|
|
198
|
-
- Identity lifecycle management
|
|
199
|
-
|
|
200
|
-
### 9. Cryptography
|
|
201
|
-
|
|
202
|
-
**Fundamentals:**
|
|
203
|
-
- Symmetric encryption (AES, ChaCha20)
|
|
204
|
-
- Asymmetric encryption (RSA, ECC)
|
|
205
|
-
- Hash functions (SHA-256, SHA-3)
|
|
206
|
-
- Digital signatures
|
|
207
|
-
- Message Authentication Codes (MAC)
|
|
208
|
-
- Key derivation functions (KDF)
|
|
209
|
-
|
|
210
|
-
**Implementations:**
|
|
211
|
-
- TLS/SSL configuration
|
|
212
|
-
- Certificate management
|
|
213
|
-
- Public Key Infrastructure (PKI)
|
|
214
|
-
- Hardware Security Modules (HSM)
|
|
215
|
-
- Key Management Systems (KMS)
|
|
216
|
-
- Encryption key rotation
|
|
217
|
-
- Perfect Forward Secrecy (PFS)
|
|
218
|
-
|
|
219
|
-
**Post-Quantum Cryptography:**
|
|
220
|
-
- NIST PQC candidates
|
|
221
|
-
- Hybrid approaches
|
|
222
|
-
- Migration planning
|
|
223
|
-
|
|
224
|
-
### 10. Security Testing & Assessment
|
|
225
|
-
|
|
226
|
-
**Types:**
|
|
227
|
-
- Vulnerability Assessment
|
|
228
|
-
- Penetration Testing (black box, white box, gray box)
|
|
229
|
-
- Red Team Exercises
|
|
230
|
-
- Purple Team Exercises
|
|
231
|
-
- Bug Bounty Programs
|
|
232
|
-
- Security Audits
|
|
233
|
-
- Compliance Assessments
|
|
234
|
-
|
|
235
|
-
**Methodologies:**
|
|
236
|
-
- OWASP Testing Guide
|
|
237
|
-
- PTES (Penetration Testing Execution Standard)
|
|
238
|
-
- OSSTMM (Open Source Security Testing Methodology Manual)
|
|
239
|
-
- NIST SP 800-115
|
|
240
|
-
|
|
241
|
-
**Tools:**
|
|
242
|
-
- Vulnerability scanners (Nessus, Qualys, OpenVAS)
|
|
243
|
-
- Web app scanners (Burp Suite, OWASP ZAP)
|
|
244
|
-
- Network scanners (Nmap, Masscan)
|
|
245
|
-
- Exploitation frameworks (Metasploit)
|
|
246
|
-
- Password crackers (John, Hashcat)
|
|
247
|
-
- Social engineering (GoPhish)
|
|
248
|
-
|
|
249
|
-
### 11. Compliance & Governance
|
|
250
|
-
|
|
251
|
-
**Frameworks:**
|
|
252
|
-
- NIST Cybersecurity Framework (CSF)
|
|
253
|
-
- ISO/IEC 27001/27002
|
|
254
|
-
- CIS Controls
|
|
255
|
-
- COBIT
|
|
256
|
-
- NIST SP 800-53
|
|
257
|
-
- PCI DSS
|
|
258
|
-
- HIPAA Security Rule
|
|
259
|
-
- GDPR
|
|
260
|
-
- SOC 2
|
|
261
|
-
- FedRAMP
|
|
262
|
-
- CMMC
|
|
263
|
-
|
|
264
|
-
**Key Activities:**
|
|
265
|
-
- Policy development
|
|
266
|
-
- Standards documentation
|
|
267
|
-
- Control implementation
|
|
268
|
-
- Compliance monitoring
|
|
269
|
-
- Audit preparation
|
|
270
|
-
- Evidence collection
|
|
271
|
-
- Risk assessments
|
|
272
|
-
- Gap analysis
|
|
273
|
-
|
|
274
|
-
## Security by Domain
|
|
275
|
-
|
|
276
|
-
### Commercial/Enterprise Security
|
|
277
|
-
- Corporate network security
|
|
278
|
-
- Endpoint protection
|
|
279
|
-
- Email security
|
|
280
|
-
- Data loss prevention (DLP)
|
|
281
|
-
- Insider threat programs
|
|
282
|
-
- Security awareness training
|
|
283
|
-
- Third-party risk management
|
|
284
|
-
- Supply chain security
|
|
285
|
-
|
|
286
|
-
### Government/Cleared Security
|
|
287
|
-
- Classified information handling
|
|
288
|
-
- SCIF security requirements
|
|
289
|
-
- TEMPEST protection
|
|
290
|
-
- Cross-domain solutions
|
|
291
|
-
- Secure communications (HAIPE, COMSEC)
|
|
292
|
-
- Personnel security (clearances)
|
|
293
|
-
- Physical security integration
|
|
294
|
-
- Continuous monitoring programs
|
|
295
|
-
|
|
296
|
-
### Cloud-Native Security
|
|
297
|
-
- Container security
|
|
298
|
-
- Kubernetes security
|
|
299
|
-
- Serverless security
|
|
300
|
-
- API security
|
|
301
|
-
- DevSecOps integration
|
|
302
|
-
- Secrets management
|
|
303
|
-
- Service mesh security
|
|
304
|
-
- Infrastructure as Code security
|
|
305
|
-
|
|
306
|
-
## Common Security Patterns
|
|
307
|
-
|
|
308
|
-
### 1. Zero Trust Implementation
|
|
309
|
-
```
|
|
310
|
-
┌─────────────────────────────────────────┐
|
|
311
|
-
│ Zero Trust Architecture │
|
|
312
|
-
├─────────────────────────────────────────┤
|
|
313
|
-
│ • Verify explicitly (every access) │
|
|
314
|
-
│ • Least privilege access │
|
|
315
|
-
│ • Assume breach │
|
|
316
|
-
│ │
|
|
317
|
-
│ Components: │
|
|
318
|
-
│ ├─ Identity Provider (IdP) │
|
|
319
|
-
│ ├─ Policy Decision Point (PDP) │
|
|
320
|
-
│ ├─ Policy Enforcement Point (PEP) │
|
|
321
|
-
│ ├─ Continuous monitoring │
|
|
322
|
-
│ └─ Analytics and threat intelligence │
|
|
323
|
-
└─────────────────────────────────────────┘
|
|
324
|
-
```
|
|
325
|
-
|
|
326
|
-
### 2. Defense in Depth Layers
|
|
327
|
-
```
|
|
328
|
-
┌─────────────────────────────────────────┐
|
|
329
|
-
│ Layer 1: Physical Security │
|
|
330
|
-
├─────────────────────────────────────────┤
|
|
331
|
-
│ Layer 2: Network Perimeter │
|
|
332
|
-
├─────────────────────────────────────────┤
|
|
333
|
-
│ Layer 3: Network Segmentation │
|
|
334
|
-
├─────────────────────────────────────────┤
|
|
335
|
-
│ Layer 4: Endpoint Security │
|
|
336
|
-
├─────────────────────────────────────────┤
|
|
337
|
-
│ Layer 5: Application Security │
|
|
338
|
-
├─────────────────────────────────────────┤
|
|
339
|
-
│ Layer 6: Data Security │
|
|
340
|
-
├─────────────────────────────────────────┤
|
|
341
|
-
│ Layer 7: Security Monitoring │
|
|
342
|
-
└─────────────────────────────────────────┘
|
|
343
|
-
```
|
|
344
|
-
|
|
345
|
-
### 3. Incident Response Workflow
|
|
346
|
-
```
|
|
347
|
-
Detection → Triage → Investigation → Containment →
|
|
348
|
-
Eradication → Recovery → Lessons Learned →
|
|
349
|
-
Update Defenses → Monitor
|
|
350
|
-
```
|
|
351
|
-
|
|
352
|
-
## Integration with Other Skills
|
|
353
|
-
|
|
354
|
-
- **devsecops**: Security in CI/CD pipelines, compliance automation
|
|
355
|
-
- **cloud-engineering**: Cloud security architecture, CSPM
|
|
356
|
-
- **infrastructure-architecture**: Secure architecture design, threat modeling
|
|
357
|
-
- **network-engineering**: Network security controls, segmentation
|
|
358
|
-
- **platform-engineering**: Container/K8s security, secrets management
|
|
359
|
-
- **observability-engineering**: Security monitoring, SIEM integration
|
|
360
|
-
- **sre**: Incident response, security monitoring
|
|
361
|
-
|
|
362
|
-
## Resources
|
|
363
|
-
|
|
364
|
-
See the `resources/` directory for detailed guides on:
|
|
365
|
-
- Security architecture patterns
|
|
366
|
-
- Threat modeling guides
|
|
367
|
-
- Incident response playbooks
|
|
368
|
-
- Security testing methodologies
|
|
369
|
-
- Cryptography implementation guides
|
|
370
|
-
- Compliance frameworks
|
|
371
|
-
- Security tools and technologies
|
|
372
|
-
|
|
373
|
-
## Quick Reference
|
|
374
|
-
|
|
375
|
-
### Security Assessment Questions
|
|
376
|
-
1. What assets are we protecting?
|
|
377
|
-
2. What are the threats?
|
|
378
|
-
3. What are the vulnerabilities?
|
|
379
|
-
4. What is the risk level?
|
|
380
|
-
5. What controls are in place?
|
|
381
|
-
6. What is the residual risk?
|
|
382
|
-
7. Are we compliant with requirements?
|
|
383
|
-
8. How do we detect incidents?
|
|
384
|
-
9. How do we respond?
|
|
385
|
-
10. How do we improve?
|
|
386
|
-
|
|
387
|
-
### Common Security Acronyms
|
|
388
|
-
- CIA: Confidentiality, Integrity, Availability
|
|
389
|
-
- AAA: Authentication, Authorization, Accounting
|
|
390
|
-
- IDS/IPS: Intrusion Detection/Prevention System
|
|
391
|
-
- SIEM: Security Information and Event Management
|
|
392
|
-
- SOAR: Security Orchestration, Automation, and Response
|
|
393
|
-
- EDR: Endpoint Detection and Response
|
|
394
|
-
- XDR: Extended Detection and Response
|
|
395
|
-
- CASB: Cloud Access Security Broker
|
|
396
|
-
- CSPM: Cloud Security Posture Management
|
|
397
|
-
- CWPP: Cloud Workload Protection Platform
|
|
398
|
-
- PAM: Privileged Access Management
|
|
399
|
-
- ZTNA: Zero Trust Network Access
|
|
400
|
-
- MFA: Multi-Factor Authentication
|
|
401
|
-
- SSO: Single Sign-On
|
|
402
|
-
|
|
403
|
-
---
|
|
404
|
-
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
|
405
|
-
🎯 SKILL ACTIVATED: cybersecurity
|
|
406
|
-
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
|
|
407
|
-
|
|
408
|
-
|
|
409
|
-
**Remember:** Security is not a product, it's a process. Continuous improvement and adaptation are essential.
|
|
@@ -1,266 +0,0 @@
|
|
|
1
|
-
# Security Architecture Patterns
|
|
2
|
-
|
|
3
|
-
## Zero Trust Architecture
|
|
4
|
-
|
|
5
|
-
### Core Principles
|
|
6
|
-
1. **Never Trust, Always Verify**
|
|
7
|
-
- Verify every access request
|
|
8
|
-
- No implicit trust based on network location
|
|
9
|
-
- Continuous authentication and authorization
|
|
10
|
-
|
|
11
|
-
2. **Least Privilege Access**
|
|
12
|
-
- Minimum necessary permissions
|
|
13
|
-
- Time-bound access
|
|
14
|
-
- Just-In-Time (JIT) access
|
|
15
|
-
|
|
16
|
-
3. **Assume Breach**
|
|
17
|
-
- Limit blast radius
|
|
18
|
-
- Micro-segmentation
|
|
19
|
-
- Continuous monitoring
|
|
20
|
-
|
|
21
|
-
### Implementation Components
|
|
22
|
-
|
|
23
|
-
```yaml
|
|
24
|
-
zero_trust_components:
|
|
25
|
-
identity_provider:
|
|
26
|
-
- Multi-factor authentication
|
|
27
|
-
- Conditional access policies
|
|
28
|
-
- Risk-based authentication
|
|
29
|
-
|
|
30
|
-
policy_engine:
|
|
31
|
-
- Access policies based on context
|
|
32
|
-
- User/device/location/behavior
|
|
33
|
-
- Real-time risk scoring
|
|
34
|
-
|
|
35
|
-
enforcement_points:
|
|
36
|
-
- Network gateways
|
|
37
|
-
- API gateways
|
|
38
|
-
- Application proxies
|
|
39
|
-
|
|
40
|
-
continuous_monitoring:
|
|
41
|
-
- User behavior analytics
|
|
42
|
-
- Device health checking
|
|
43
|
-
- Threat intelligence integration
|
|
44
|
-
```
|
|
45
|
-
|
|
46
|
-
## Defense in Depth
|
|
47
|
-
|
|
48
|
-
### Network Security Layers
|
|
49
|
-
|
|
50
|
-
```
|
|
51
|
-
┌──────────────────────────────────────────┐
|
|
52
|
-
│ Perimeter Defense (Firewalls, IPS) │
|
|
53
|
-
├──────────────────────────────────────────┤
|
|
54
|
-
│ Network Segmentation (VLANs, ACLs) │
|
|
55
|
-
├──────────────────────────────────────────┤
|
|
56
|
-
│ Application Layer (WAF, API Gateway) │
|
|
57
|
-
├──────────────────────────────────────────┤
|
|
58
|
-
│ Data Layer (Encryption, DLP) │
|
|
59
|
-
├──────────────────────────────────────────┤
|
|
60
|
-
│ Endpoint (EDR, Antivirus) │
|
|
61
|
-
├──────────────────────────────────────────┤
|
|
62
|
-
│ Identity (MFA, SSO, PAM) │
|
|
63
|
-
└──────────────────────────────────────────┘
|
|
64
|
-
```
|
|
65
|
-
|
|
66
|
-
### Security Zones
|
|
67
|
-
|
|
68
|
-
**DMZ (Demilitarized Zone):**
|
|
69
|
-
- Public-facing services
|
|
70
|
-
- Web servers, mail servers
|
|
71
|
-
- Extra scrutiny and monitoring
|
|
72
|
-
|
|
73
|
-
**Internal Zones:**
|
|
74
|
-
- Corporate network
|
|
75
|
-
- User workstations
|
|
76
|
-
- Internal applications
|
|
77
|
-
|
|
78
|
-
**Restricted Zones:**
|
|
79
|
-
- Sensitive data systems
|
|
80
|
-
- Financial systems
|
|
81
|
-
- HR systems
|
|
82
|
-
- Executive communications
|
|
83
|
-
|
|
84
|
-
**Management Zone:**
|
|
85
|
-
- Admin access only
|
|
86
|
-
- Jump boxes/bastion hosts
|
|
87
|
-
- Privileged access workstations
|
|
88
|
-
|
|
89
|
-
## Secure Architecture Patterns
|
|
90
|
-
|
|
91
|
-
### Pattern 1: API Gateway with Security
|
|
92
|
-
|
|
93
|
-
```
|
|
94
|
-
[External Users]
|
|
95
|
-
↓
|
|
96
|
-
[WAF / DDoS Protection]
|
|
97
|
-
↓
|
|
98
|
-
[API Gateway]
|
|
99
|
-
├─ Rate Limiting
|
|
100
|
-
├─ Authentication (JWT/OAuth)
|
|
101
|
-
├─ Authorization (RBAC/ABAC)
|
|
102
|
-
├─ Request Validation
|
|
103
|
-
├─ Logging
|
|
104
|
-
└─ TLS Termination
|
|
105
|
-
↓
|
|
106
|
-
[Internal Microservices]
|
|
107
|
-
```
|
|
108
|
-
|
|
109
|
-
### Pattern 2: Secure Multi-Tier Application
|
|
110
|
-
|
|
111
|
-
```
|
|
112
|
-
[Internet]
|
|
113
|
-
↓
|
|
114
|
-
[Load Balancer + WAF]
|
|
115
|
-
↓
|
|
116
|
-
[Web Tier] (DMZ)
|
|
117
|
-
↓ (Restricted ports/protocols)
|
|
118
|
-
[Application Tier] (Internal)
|
|
119
|
-
↓ (Database protocols only)
|
|
120
|
-
[Database Tier] (Highly restricted)
|
|
121
|
-
↓
|
|
122
|
-
[Backup/Storage] (Encrypted)
|
|
123
|
-
```
|
|
124
|
-
|
|
125
|
-
### Pattern 3: Secure Cloud Architecture
|
|
126
|
-
|
|
127
|
-
```
|
|
128
|
-
[Cloud Provider]
|
|
129
|
-
├─ VPC/VNet
|
|
130
|
-
│ ├─ Public Subnet
|
|
131
|
-
│ │ └─ NAT Gateway, Load Balancer
|
|
132
|
-
│ ├─ Private Subnet
|
|
133
|
-
│ │ └─ Application instances
|
|
134
|
-
│ └─ Data Subnet
|
|
135
|
-
│ └─ Databases (no internet access)
|
|
136
|
-
├─ IAM
|
|
137
|
-
│ ├─ Service roles (least privilege)
|
|
138
|
-
│ ├─ User roles
|
|
139
|
-
│ └─ MFA enforcement
|
|
140
|
-
├─ Encryption
|
|
141
|
-
│ ├─ KMS for key management
|
|
142
|
-
│ ├─ At-rest encryption
|
|
143
|
-
│ └─ In-transit encryption (TLS)
|
|
144
|
-
└─ Monitoring
|
|
145
|
-
├─ CloudTrail/Activity logs
|
|
146
|
-
├─ Security Hub/Security Center
|
|
147
|
-
└─ SIEM integration
|
|
148
|
-
```
|
|
149
|
-
|
|
150
|
-
## Secure Design Principles
|
|
151
|
-
|
|
152
|
-
### 1. Fail Secure
|
|
153
|
-
- System failures should default to secure state
|
|
154
|
-
- Deny access on error
|
|
155
|
-
- Graceful degradation
|
|
156
|
-
|
|
157
|
-
### 2. Complete Mediation
|
|
158
|
-
- Check every access
|
|
159
|
-
- No caching of access decisions for sensitive operations
|
|
160
|
-
- Re-validate on context changes
|
|
161
|
-
|
|
162
|
-
### 3. Open Design
|
|
163
|
-
- Security through proper implementation, not obscurity
|
|
164
|
-
- Assume attacker has full knowledge of system
|
|
165
|
-
- Use proven cryptographic algorithms
|
|
166
|
-
|
|
167
|
-
### 4. Least Common Mechanism
|
|
168
|
-
- Minimize shared resources
|
|
169
|
-
- Reduce attack surface
|
|
170
|
-
- Prevent cross-contamination
|
|
171
|
-
|
|
172
|
-
### 5. Psychological Acceptability
|
|
173
|
-
- Security must be usable
|
|
174
|
-
- Don't make security so burdensome users circumvent it
|
|
175
|
-
- Balance security with usability
|
|
176
|
-
|
|
177
|
-
## Security Architecture for Different Environments
|
|
178
|
-
|
|
179
|
-
### Commercial/Enterprise
|
|
180
|
-
|
|
181
|
-
**Requirements:**
|
|
182
|
-
- Protect intellectual property
|
|
183
|
-
- Customer data protection
|
|
184
|
-
- Regulatory compliance (SOC 2, ISO 27001)
|
|
185
|
-
- Business continuity
|
|
186
|
-
|
|
187
|
-
**Key Controls:**
|
|
188
|
-
- Network segmentation
|
|
189
|
-
- Endpoint protection
|
|
190
|
-
- Email security (anti-phishing)
|
|
191
|
-
- Data loss prevention
|
|
192
|
-
- Privileged access management
|
|
193
|
-
- Security awareness training
|
|
194
|
-
|
|
195
|
-
### Government/Cleared
|
|
196
|
-
|
|
197
|
-
**Requirements:**
|
|
198
|
-
- Classified information protection
|
|
199
|
-
- SCIF physical security
|
|
200
|
-
- Continuous monitoring
|
|
201
|
-
- Compliance (FedRAMP, NIST 800-53, CMMC)
|
|
202
|
-
|
|
203
|
-
**Key Controls:**
|
|
204
|
-
- Physical access controls
|
|
205
|
-
- TEMPEST protection
|
|
206
|
-
- Cross-domain solutions
|
|
207
|
-
- Cryptographic key management
|
|
208
|
-
- Personnel security integration
|
|
209
|
-
- Audit trail requirements
|
|
210
|
-
|
|
211
|
-
### Cloud-Native
|
|
212
|
-
|
|
213
|
-
**Requirements:**
|
|
214
|
-
- Dynamic infrastructure
|
|
215
|
-
- API-first security
|
|
216
|
-
- Container/K8s security
|
|
217
|
-
- Serverless security
|
|
218
|
-
- DevSecOps integration
|
|
219
|
-
|
|
220
|
-
**Key Controls:**
|
|
221
|
-
- Cloud Security Posture Management
|
|
222
|
-
- Container image scanning
|
|
223
|
-
- Runtime protection
|
|
224
|
-
- Secrets management
|
|
225
|
-
- Service mesh security
|
|
226
|
-
- Infrastructure as Code scanning
|
|
227
|
-
|
|
228
|
-
## Common Anti-Patterns (What NOT to Do)
|
|
229
|
-
|
|
230
|
-
❌ **Security by Obscurity**
|
|
231
|
-
- Hiding security mechanisms
|
|
232
|
-
- Custom cryptography
|
|
233
|
-
- Relying on secrecy of implementation
|
|
234
|
-
|
|
235
|
-
❌ **Perimeter-Only Security**
|
|
236
|
-
- Trusting everything inside network
|
|
237
|
-
- No internal segmentation
|
|
238
|
-
- "Hard shell, soft center"
|
|
239
|
-
|
|
240
|
-
❌ **Security Afterthought**
|
|
241
|
-
- Adding security after development
|
|
242
|
-
- "We'll secure it later"
|
|
243
|
-
- Bolting on security controls
|
|
244
|
-
|
|
245
|
-
❌ **Over-Reliance on Single Control**
|
|
246
|
-
- Firewall as only defense
|
|
247
|
-
- Encryption as silver bullet
|
|
248
|
-
- Lack of defense in depth
|
|
249
|
-
|
|
250
|
-
## Security Architecture Review Checklist
|
|
251
|
-
|
|
252
|
-
- [ ] Threat model completed and documented
|
|
253
|
-
- [ ] Data classification performed
|
|
254
|
-
- [ ] Network segmentation implemented
|
|
255
|
-
- [ ] Encryption for data at-rest and in-transit
|
|
256
|
-
- [ ] Strong authentication (MFA)
|
|
257
|
-
- [ ] Least privilege access enforced
|
|
258
|
-
- [ ] Logging and monitoring configured
|
|
259
|
-
- [ ] Incident response plan documented
|
|
260
|
-
- [ ] Regular security testing scheduled
|
|
261
|
-
- [ ] Compliance requirements mapped
|
|
262
|
-
- [ ] Security training for team
|
|
263
|
-
- [ ] Third-party security assessed
|
|
264
|
-
- [ ] Disaster recovery tested
|
|
265
|
-
- [ ] Security updates automated where possible
|
|
266
|
-
- [ ] Secrets management implemented
|