← Back to list

security-documentation
by spjoshis
Modular Claude plugins for agent-based expertise and reusable skills across software development and Agile. Easily extend, share, and automate best practices for modern development.
⭐ 1🍴 0📅 Dec 30, 2025
SKILL.md
name: security-documentation description: Master security documentation with security policies, incident response plans, security procedures, and compliance documentation.
Security Documentation
Create comprehensive security documentation including policies, procedures, incident response plans, and compliance documentation.
When to Use This Skill
- Policy development
- Procedure documentation
- Incident response planning
- Compliance documentation
- Security training
- Audit preparation
- Risk documentation
- Stakeholder communication
Core Concepts
1. Security Policy Template
# Information Security Policy
## Purpose
Define security requirements and responsibilities for protecting company information assets.
## Scope
All employees, contractors, systems, and data.
## Password Policy
- Minimum 12 characters
- Complexity requirements (upper, lower, number, special)
- No password reuse (last 10)
- 90-day expiration
- MFA required for sensitive systems
## Access Control
- Principle of least privilege
- Role-based access control
- Access review quarterly
- Termination procedures
- Remote access via VPN only
## Data Classification
- Public: No restrictions
- Internal: Company personnel only
- Confidential: Need-to-know basis
- Restricted: Executive approval required
## Incident Reporting
- Report security incidents within 1 hour
- Contact: security@company.com
- Incident response team activation
## Compliance
- Violation consequences
- Review annually
- Approval: CISO
**Effective Date**: 2024-01-01
**Version**: 1.0
2. Incident Response Plan
# Incident Response Plan
## Incident Types
- Data breach
- Malware infection
- Unauthorized access
- Denial of service
- Physical security breach
## Response Team
- Incident Commander: CISO
- Technical Lead: IT Director
- Communications: PR Manager
- Legal: General Counsel
- HR: HR Director
## Response Phases
### 1. Detection & Analysis (0-1 hour)
- Identify incident type
- Assess severity
- Activate response team
- Begin logging
### 2. Containment (1-4 hours)
- Isolate affected systems
- Preserve evidence
- Implement temporary controls
- Prevent spread
### 3. Eradication (4-24 hours)
- Remove threat
- Patch vulnerabilities
- Reset credentials
- Verify clean
### 4. Recovery (24-72 hours)
- Restore systems
- Monitor for reoccurrence
- Validate functionality
- Return to normal
### 5. Post-Incident (Week 1)
- Document timeline
- Lessons learned
- Update procedures
- Report to stakeholders
## Communication Protocol
- Internal: Email, Slack
- External: PR team approval
- Customers: Within 72 hours (GDPR)
- Regulators: As required
Best Practices
- Clear and concise - Easy to understand
- Regular updates - Keep current
- Version control - Track changes
- Stakeholder review - Get feedback
- Accessible - Easy to find
- Testable - Practice procedures
- Compliance-aligned - Meet regulations
- Executive approval - Official authorization
Resources
- NIST Cybersecurity Framework: Policy guidance
- SANS Security Policy Templates: Ready-to-use templates
Score
Total Score
60/100
Based on repository quality metrics
✓SKILL.md
SKILL.mdファイルが含まれている
+20
○LICENSE
ライセンスが設定されている
0/10
✓説明文
100文字以上の説明がある
+10
○人気
GitHub Stars 100以上
0/15
✓最近の活動
3ヶ月以内に更新
+5
○フォーク
10回以上フォークされている
0/5
✓Issue管理
オープンIssueが50未満
+5
○言語
プログラミング言語が設定されている
0/5
✓タグ
1つ以上のタグが設定されている
+5
Reviews
💬
Reviews coming soon
