Skip to main content

Security Architect Guide

This guide is for you if you perform threat modeling, build security plans, assess risks, define compliance requirements, or review system security posture. Security architects have focused but deep tooling, with 9 addressable assets centered on security planning and risk management.

CAUTION

The security agents and prompts in HVE Core are assistive tools only. They do not replace professional security tooling (SAST, DAST, SCA, penetration testing, compliance scanners) or qualified human review. All AI-generated security plans, threat models, risk registers, and incident response runbooks must be reviewed and validated by qualified security professionals before use. AI outputs may contain inaccuracies, miss critical threats, or produce recommendations that are incomplete or inappropriate for your environment. Never treat AI-generated security artifacts as authoritative without independent verification.

TIP

Install the HVE Core extension from the VS Code Marketplace to get all stable artifacts with zero configuration.

Your primary collections are security-planning (security plan creation, risk registers, and incident response tools) and project-planning (broader project context). For clone-based setups, use the hve-core-installer agent with install security-planning project-planning.

What HVE Core Does for You

  1. Creates comprehensive security plans with threat modeling and mitigation strategies
  2. Generates and manages risk registers for component-level risk assessment
  3. Provides incident response runbook templates and playbooks
  4. Supports security architecture research through deep codebase analysis
  5. Reviews implementation against security requirements and best practices

Your Lifecycle Stages

NOTE

Security architects primarily operate in these lifecycle stages:

Stage 2: Discovery: Research security requirements, investigate threat landscape, gather evidence Stage 3: Product Definition: Define threat models, security specifications, and compliance requirements Stage 7: Review: Validate implementation against security requirements Stage 9: Operations: Monitor security posture, update threat models, manage incident response

Stage Walkthrough

  1. Stage 2: Discovery. Use the task-researcher agent to investigate the threat landscape, existing security controls, and compliance requirements for your system.
  2. Stage 3: Product Definition. Run the security-plan-creator agent to generate a security plan with threat models, attack vectors, and mitigation strategies.
  3. Stage 3: Product Definition. Use /risk-register to assess and document component-level risks with severity ratings, likelihood, and mitigation plans.
  4. Stage 7: Review. Validate implementation against security requirements using the task-reviewer agent for code-level security compliance checks.
  5. Stage 9: Operations. Maintain incident response readiness with /incident-response and update threat models as the system evolves.

Starter Prompts

Select security-plan-creator agent:

Generate a security plan for our customer-facing REST API gateway. Cover
OAuth 2.0 authentication with Azure AD B2C, PII data classification in
user profiles, PCI DSS compliance for payment flows, and threat model
areas including injection attacks and broken access control.
/risk-register Assess and document risks for the payment processing
module. Focus on PCI DSS compliance gaps, injection vulnerabilities
in transaction inputs, and key management for encryption at rest.
/incident-response Create an incident response runbook for a data breach
involving customer PII exposure through a misconfigured storage bucket.
Include containment steps, GDPR notification timelines, forensic evidence
preservation, and post-incident review process.

Select task-researcher agent:

Research security patterns for GraphQL APIs, focusing on query depth
limiting to prevent DoS, field-level authorization approaches, disabling
introspection in production, and input validation for nested mutation
arguments.

Key Agents and Workflows

AgentPurposeDocs
security-plan-creatorSecurity plan and threat model generationAgent file
task-researcherSecurity-focused codebase and threat researchTask Researcher
task-reviewerSecurity compliance reviewTask Reviewer
memorySession context and preference persistenceAgent file

Prompts complement the agents for targeted security workflows:

PromptPurposeInvoke
risk-registerComponent risk assessment and documentation/risk-register
incident-responseIncident response runbook creation/incident-response

Tips

DoDon't
Start with the security-plan-creator agent for comprehensive modelsCreate ad-hoc security notes without structured threat models
Use /risk-register for each significant componentTrack risks informally or skip risk documentation
Research the threat landscape before defining mitigationsAssume threat models from other projects directly apply
Update threat models as the system architecture evolvesTreat security plans as static, one-time documents
Map security requirements to specific lifecycle stagesIsolate security from the broader product lifecycle
  • Security Architect + TPM: Security requirements integrate into BRDs and PRDs. Threat models inform product specifications and compliance gates. See the TPM Guide.
  • Security Architect + Tech Lead: Security architecture decisions align with overall system design. Threat models shape architectural choices. See the Tech Lead Guide.
  • Security Architect + SRE: Operational security, incident response, and monitoring bridge security planning with production operations. See the SRE / Operations Guide.

Next Steps

TIP

Explore security planning tools: Security Planning Collection Review the threat model documentation: Threat Model See how security fits the project lifecycle: AI-Assisted Project Lifecycle


IMPORTANT

Security-specific tooling covers Stage 2, Stage 3, Stage 7, and Stage 9 only. Stages 4 through 6 and Stage 8 rely on general-purpose agents (the task-researcher and task-reviewer agents) rather than dedicated security tooling. Specialized security coverage for decomposition, sprint planning, implementation, and delivery is a planned improvement.

🤖 Crafted with precision by ✨Copilot following brilliant human instruction, then carefully refined by our team of discerning human reviewers.