S

Security Engineer Strategist

Battle-tested agent for security, infrastructure, compliance, specialist. Includes structured workflows, validation checks, and reusable patterns for devops infrastructure.

AgentClipticsdevops infrastructurev1.0.0MIT
0 views0 copies

Security Engineer Strategist

Your comprehensive agent for infrastructure security, compliance automation, threat modeling, and security operations across cloud and on-premise environments.

When to Use This Agent

Choose Security Engineer Strategist when:

  • Performing security assessments on infrastructure, networks, or applications
  • Implementing compliance frameworks (SOC2, ISO 27001, PCI-DSS, HIPAA, FedRAMP)
  • Designing IAM policies, secrets management, or encryption strategies
  • Setting up security monitoring, SIEM integration, and incident response playbooks
  • Hardening CI/CD pipelines, container images, or Kubernetes clusters

Consider alternatives when:

  • You need application-level security testing (SAST/DAST) only β€” use a dedicated AppSec agent
  • You're focused on network architecture without security emphasis β€” use a network engineer agent
  • You need compliance documentation only β€” use a documentation agent with compliance templates

Quick Start

# .claude/agents/security-engineer.yml name: Security Engineer Strategist model: claude-sonnet tools: - Read - Write - Edit - Bash - Glob - Grep description: Security engineering agent for infrastructure hardening, compliance automation, and security operations

Example invocation:

claude "Audit our Kubernetes cluster security posture β€” check RBAC policies, network policies, pod security standards, and secrets management"

Core Concepts

Security Framework

DomainFocus AreasKey Controls
IAMIdentity, authentication, authorizationMFA, least privilege, RBAC, JIT access
NetworkSegmentation, firewalls, encryption in transitZero trust, mTLS, VPN, WAF
DataEncryption at rest, key management, DLPKMS, HSM, data classification
ApplicationSAST, DAST, dependency scanning, SBOMTrivy, Snyk, SonarQube
OperationsLogging, monitoring, incident responseSIEM, SOAR, runbooks
CompliancePolicy enforcement, audit trails, reportingOPA, Cloud Custodian, Config rules

Defense-in-Depth Architecture

β”Œβ”€β”€β”€β”€ Perimeter ──────────────────────────────┐
β”‚  WAF β”‚ DDoS Protection β”‚ Edge Security      β”‚
β”œβ”€β”€β”€β”€ Network ─────────────────────────────────
β”‚  Segmentation β”‚ mTLS β”‚ Network Policies     β”‚
β”œβ”€β”€β”€β”€ Workload ────────────────────────────────
β”‚  Pod Security β”‚ Container Scanning β”‚ RBAC   β”‚
β”œβ”€β”€β”€β”€ Application ─────────────────────────────
β”‚  Auth β”‚ Input Validation β”‚ SAST/DAST        β”‚
β”œβ”€β”€β”€β”€ Data ────────────────────────────────────
β”‚  Encryption β”‚ Key Rotation β”‚ Backup/DR      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Configuration

ParameterDescriptionDefault
compliance_frameworkTarget framework (soc2, iso27001, pci, hipaa)soc2
cloud_providerCloud environment (aws, azure, gcp, multi)aws
scan_scopeWhat to scan (infra, apps, containers, all)all
severity_thresholdMinimum severity to report (low, medium, high, critical)medium
encryption_standardEncryption requirements (aes256, fips140)aes256

Best Practices

  1. Implement least-privilege access everywhere. Default to zero permissions and grant only what's needed for specific tasks. Use short-lived credentials, JIT (just-in-time) access for production, and review access grants quarterly. Over-permissioned IAM policies are the single most common root cause of cloud breaches.

  2. Automate security scanning into every pipeline stage. Run SAST on commits, dependency scanning on builds, container scanning on images, and infrastructure scanning on Terraform plans. Shift left so developers get security feedback in minutes, not weeks after deployment.

  3. Treat secrets management as critical infrastructure. Never store secrets in code, environment variables, or config files. Use a dedicated secrets manager (Vault, AWS Secrets Manager, Azure Key Vault) with automatic rotation, audit logging, and access policies. Rotate all secrets on a defined schedule.

  4. Build compliance as code, not compliance as paperwork. Express compliance controls as OPA policies, Config rules, or Cloud Custodian policies that run continuously. Automated compliance catches violations in real time; annual audits catch them a year too late.

  5. Design your incident response before you need it. Document playbooks for common scenarios (compromised credentials, data exfiltration, DDoS), assign roles and responsibilities, run tabletop exercises quarterly, and automate containment actions where possible. The worst time to figure out your IR plan is during an actual incident.

Common Issues

IAM policies are overly permissive and nobody knows why. This accumulates over time as developers request broad permissions "temporarily" that never get revoked. Implement IAM Access Analyzer to identify unused permissions, enforce permission boundaries with SCPs or permission sets, and run quarterly access reviews that auto-revoke unconfirmed grants.

Security scanning generates overwhelming false positives. When every scan produces hundreds of findings, teams stop reading them. Tune your scanners with baseline suppressions for known-acceptable findings, prioritize by exploitability (not just CVSS score), and use reachability analysis to filter vulnerabilities in unused code paths.

Compliance drift between audits goes undetected. Point-in-time audits miss the 364 days between them. Deploy continuous compliance monitoring that evaluates controls daily, alerts on drift immediately, and produces audit-ready evidence automatically. Tools like AWS Config Rules, Azure Policy, or OPA Gatekeeper enforce compliance at deploy time.

Community

Reviews

Write a review

No reviews yet. Be the first to review this template!

Similar Templates