Agentic AI Atlasby a5c.ai
OverviewWikiGraphFor AgentsEdgesSearchWorkspace
/
GitHubDocsDiscord
iiRecord
Agentic AI Atlas · Cybersecurity
domain:cybersecuritya5c.ai
Search record views/
Record · tabs

Available views

II.Record viewspp. 1 - 1
overviewjsongraph
II.
Domain overview

domain:cybersecurity

Reference · live

Cybersecurity overview

Cybersecurity domain — narrower than `domain:security`, focused on offensive/defensive practitioner work: threat modeling, incident response, vulnerability research, red/blue team operations.

DomainOutgoing · 3Incoming · 164

Attributes

displayName
Cybersecurity
description
Cybersecurity domain — narrower than `domain:security`, focused on offensive/defensive practitioner work: threat modeling, incident response, vulnerability research, red/blue team operations.

Outgoing edges

contains3
  • specialization:security-compliance·Specialization
  • topic:ci-secrets-management·TopicCI Secrets Management
  • topic:information-trust-tiers·TopicInformation Trust Tiers

Incoming edges

applies_to51
  • benchmark:cyber-bench·BenchmarkCyberBench
  • skill-area:vulnerability-scanning-remediation·SkillAreaVulnerability Scanning and Remediation
  • skill-area:penetration-testing-ethical-hacking·SkillAreaPenetration Testing and Ethical Hacking
  • skill-area:security-monitoring-siem·SkillAreaSecurity Monitoring and SIEM
  • skill-area:endpoint-security-edr·SkillAreaEndpoint Security and EDR
  • skill-area:application-security-testing·SkillAreaApplication Security Testing (SAST/DAST)
  • skill-area:incident-response-forensics·SkillAreaIncident Response and Forensics
  • skill-area:data-protection-dlp·SkillAreaData Protection and DLP
  • skill-area:threat-intelligence-hunting·SkillAreaThreat Intelligence and Hunting
  • skill-area:ci-security·SkillAreaCI/CD Security
  • skill-area:vulnerability-scanning·SkillAreaVulnerability Scanning
  • skill-area:iac-security·SkillAreaIaC Security
  • skill-area:application-security·SkillAreaApplication Security
  • skill-area:runtime-security·SkillAreaRuntime Security
  • skill-area:threat-detection·SkillAreaThreat Detection
  • skill-area:policy-enforcement·SkillAreaPolicy Enforcement
  • skill-area:compliance-scanning·SkillAreaCompliance Scanning
  • skill-area:dast-scanning·SkillAreaDAST Scanning
  • skill-area:web-security-testing·SkillAreaWeb Security Testing
  • skill-area:fuzz-testing-strategy·SkillAreaFuzz Testing Strategy
  • stack-profile:security-operations·StackProfileSecurity Operations Stack (Trivy, Falco, OPA, Vault, Snyk)
  • stack-profile:ai-safety-guardrails·StackProfileAI Safety / Guardrails Stack (Python, OPA, FastAPI, Redis, Prometheus)
  • stack-profile:container-registry-scanning·StackProfileContainer Registry & Scanning (Docker, Trivy, Kubernetes, Go, Snyk)
  • stack-profile:secrets-management·StackProfileSecrets Management (Vault, Kubernetes, Terraform, Docker, Go)
  • stack-profile:siem-platform·StackProfileSIEM Platform (Elasticsearch, Python, RabbitMQ, Redis, React, PostgreSQL)
  • stack-profile:vulnerability-management-platform·StackProfileVulnerability Management (Python, Trivy, Snyk, PostgreSQL, React, Docker)
  • stack-profile:identity-governance·StackProfileIdentity Governance (Keycloak, PostgreSQL, React, Go, Docker)
  • topic:defense-in-depth·TopicDefense in Depth
  • topic:zero-trust-architecture·TopicZero Trust Architecture
  • topic:information-trust-tiers·TopicInformation Trust Tiers
  • topic:ci-secrets-management·TopicCI Secrets Management
  • skill:security-review·SkillSecurity Review
  • role:penetration-tester·RolePenetration Tester
  • role:security-architect·Role
  • role:threat-analyst·RoleThreat Analyst
  • role:soc-analyst·RoleSOC Analyst
  • role:forensic-analyst·RoleDigital Forensic Analyst
  • role:red-team-lead·RoleRed Team Lead
  • role:blue-team-lead·RoleBlue Team Lead
  • role:DevSecOps-engineer·Role
  • role:head-of-security·RoleHead of Security
  • role:chief-security-officer·RoleChief Security Officer
  • role:vulnerability-scanner·RoleVulnerability Scanner
  • term:authority·TermAuthority
  • term:claim·TermClaim
  • term:evidence-policy·TermEvidencePolicy
  • term:json-web-token·TermJSON Web Token
  • term:sandbox·TermSandbox
  • term:session·TermSession
  • term:trust-chain·TermTrust Chain
  • term:trust-level·TermTrustLevel
applies_to_domain27
  • workflow:compliance-audit·WorkflowCompliance Audit
  • workflow:vendor-evaluation·WorkflowVendor Evaluation
  • workflow:vulnerability-management·Workflow
  • workflow:access-review·WorkflowAccess Review
  • workflow:security-audit·Workflow
  • workflow:penetration-testing-cycle·WorkflowPenetration Testing Cycle
  • workflow:pci-dss-scoping·WorkflowPCI DSS Scoping
  • workflow:access-control-audit·WorkflowAccess Control Audit
  • workflow:key-ceremony·WorkflowKey Ceremony
  • workflow:smart-contract-audit·WorkflowSmart Contract Audit
  • workflow:cryptographic-library-upgrade·WorkflowCryptographic Library Upgrade
  • workflow:security-incident-response·WorkflowSecurity Incident Response
  • workflow:cve-triage·WorkflowCVE Triage
  • workflow:penetration-testing·WorkflowPenetration Testing Engagement
  • workflow:hipaa-compliance-audit·WorkflowHIPAA Compliance Audit
  • workflow:phishing-simulation-exercise·WorkflowPhishing Simulation Exercise
  • workflow:fuzzing-campaign·WorkflowFuzzing Campaign
  • workflow:supply-chain-attack-simulation·WorkflowSupply Chain Attack Simulation
  • workflow:cve-response-coordination·WorkflowCVE Response Coordination
  • workflow:penetration-test-cycle·WorkflowPenetration Test Cycle
  • workflow:red-team-exercise·WorkflowRed Team Exercise
  • workflow:bug-bounty-triage·WorkflowBug Bounty Triage
  • workflow:security-review·WorkflowSecurity Review
  • workflow:vulnerability-management·Workflow
  • workflow:systems-memory-safety-audit·WorkflowSystems Memory Safety Audit
  • workflow:security-review·WorkflowSecurity Review
  • workflow:vulnerability-management·Workflow
belongs_to_domain2
  • topic:prompt-injection·TopicPrompt Injection
  • topic:autonomous-agents-safety·TopicAutonomous Agents Safety
deferred_for1
  • deferred:trust-tiers·DeferredNodeTrust Tiers
lib_applies_to_domain77
  • tool-server:mcp-splunk·ToolServerSplunk MCP Server
  • tool-server:mcp-trivy·ToolServerTrivy MCP Server
  • tool-server:mcp-owasp-zap·ToolServerOWASP ZAP MCP Server
  • tool-server:mcp-opa·ToolServerOPA MCP Server
  • tool-server:mcp-checkov·ToolServerCheckov Security Scanner MCP Server
  • tool-server:mcp-falco·ToolServerFalco MCP Server
  • tool-server:mcp-snyk·ToolServerSnyk MCP Server
  • tool-server:mcp-sonarqube·ToolServerSonarQube MCP Server
  • tool-server:mcp-1password·ToolServer1Password MCP Server
  • tool-server:mcp-vault·ToolServerHashiCorp Vault MCP Server
  • lib-agent:security-research--cloud-security-researcher·LibraryAgentcloud-security-researcher
  • lib-agent:security-research--ctf-creator·LibraryAgentCTF Challenge Creator Agent
  • lib-agent:security-research--exploit-developer·LibraryAgentExploit Developer Agent
  • lib-agent:security-research--fuzzing-engineer·LibraryAgentfuzzing-engineer
  • lib-agent:security-research--hardware-security-researcher·LibraryAgenthardware-security-researcher
  • lib-agent:security-research--malware-analyst·LibraryAgentMalware Analyst Agent
  • lib-agent:security-research--mobile-researcher·LibraryAgentMobile Security Researcher Agent
  • lib-agent:security-research--purple-team-coordinator·LibraryAgentPurple Team Coordinator Agent
  • lib-agent:security-research--red-team-operator·LibraryAgentRed Team Operator Agent
  • lib-agent:security-research--reverse-engineer·LibraryAgentReverse Engineer Agent
  • lib-agent:security-research--security-report-writer·LibraryAgentSecurity Report Writer Agent
  • lib-agent:security-research--smart-contract-auditor·LibraryAgentSmart Contract Auditor Agent
  • lib-agent:security-research--threat-intel-analyst·LibraryAgentThreat Intelligence Analyst Agent
  • lib-agent:security-research--vuln-researcher·LibraryAgentVulnerability Researcher Agent
  • lib-agent:security-research--web-security-researcher·LibraryAgentWeb Security Researcher Agent
  • lib-process:security-research--ai-ml-security-research·LibraryProcessai-ml-security-research
  • lib-process:security-research--api-security-research·LibraryProcessapi-security-research
  • lib-process:security-research--binary-reverse-engineering·LibraryProcessbinary-reverse-engineering
  • lib-process:security-research--bug-bounty-workflow·LibraryProcessbug-bounty-workflow
  • lib-process:security-research--capture-the-flag-challenges·LibraryProcesscapture-the-flag-challenges
  • lib-process:security-research--cloud-security-research·LibraryProcesscloud-security-research
  • lib-process:security-research--container-security-research·LibraryProcesscontainer-security-research
  • lib-process:security-research--dynamic-analysis-runtime-testing·LibraryProcessdynamic-analysis-runtime-testing
  • lib-process:security-research--exploit-development·LibraryProcessexploit-development
  • lib-process:security-research--firmware-analysis·LibraryProcessfirmware-analysis
  • lib-process:security-research--fuzzing-campaign·LibraryProcessfuzzing-campaign
  • lib-process:security-research--hardware-security-research·LibraryProcesshardware-security-research
  • lib-process:security-research--malware-analysis·LibraryProcessmalware-analysis
  • lib-process:security-research--mobile-app-security-research·LibraryProcessmobile-app-security-research
  • lib-process:security-research--network-penetration-testing·LibraryProcessnetwork-penetration-testing
  • lib-process:security-research--protocol-reverse-engineering·LibraryProcessprotocol-reverse-engineering
  • lib-process:security-research--purple-team-exercise·LibraryProcesspurple-team-exercise
  • lib-process:security-research--red-team-operations·LibraryProcessred-team-operations
  • lib-process:security-research--responsible-disclosure·LibraryProcessresponsible-disclosure
  • lib-process:security-research--security-advisory-writing·LibraryProcesssecurity-advisory-writing
  • lib-process:security-research--security-research-lab-setup·LibraryProcesssecurity-research-lab-setup
  • lib-process:security-research--security-research-publication·LibraryProcesssecurity-research-publication
  • lib-process:security-research--security-tool-development·LibraryProcesssecurity-tool-development
  • lib-process:security-research--shellcode-development·LibraryProcessshellcode-development
  • lib-process:security-research--smart-contract-auditing·LibraryProcesssmart-contract-auditing
  • lib-process:security-research--static-code-analysis·LibraryProcessstatic-code-analysis
  • lib-process:security-research--supply-chain-security·LibraryProcesssupply-chain-security
  • lib-process:security-research--threat-intelligence-research·LibraryProcessthreat-intelligence-research
  • lib-process:security-research--variant-analysis·LibraryProcessvariant-analysis
  • lib-process:security-research--vulnerability-research-workflow·LibraryProcessvulnerability-research-workflow
  • lib-process:security-research--vulnerability-root-cause-analysis·LibraryProcessvulnerability-root-cause-analysis
  • lib-process:security-research--web-app-vuln-research·LibraryProcessweb-app-vuln-research
  • lib-skill:security-research--aiml-security·LibrarySkillaiml-security
  • lib-skill:security-research--binary-exploitation·LibrarySkillBinary Exploitation Skill
  • lib-skill:security-research--burp-websec·LibrarySkillBurp Suite/Web Security Skill
  • lib-skill:security-research--cloud-security-testing·LibrarySkillcloud-security-testing
  • lib-skill:security-research--cve-cwe-db·LibrarySkillCVE/CWE Database Skill
  • lib-skill:security-research--debugger-integration·LibrarySkillDebugger Integration Skill
  • lib-skill:security-research--fuzzing-ops·LibrarySkillFuzzing Operations Skill
  • lib-skill:security-research--ghidra-ida-re·LibrarySkillGhidra/IDA Reverse Engineering Skill
  • lib-skill:security-research--hardware-security·LibrarySkillhardware-security
  • lib-skill:security-research--incident-forensics·LibrarySkillincident-forensics
  • lib-skill:security-research--mitre-attack·LibrarySkillMITRE ATT&CK Skill
  • lib-skill:security-research--mobile-security·LibrarySkillMobile Security Testing Skill
  • lib-skill:security-research--offensive-security·LibrarySkillOffensive Security Skill
  • lib-skill:security-research--protocol-analysis·LibrarySkillNetwork Protocol Analysis Skill
  • lib-skill:security-research--pwntools-exploit·LibrarySkillPwntools Exploitation Skill
  • lib-skill:security-research--security-sandbox·LibrarySkillsecurity-sandbox
  • lib-skill:security-research--smart-contract-analysis·LibrarySkillSmart Contract Analysis Skill
  • lib-skill:security-research--static-analysis-tools·LibrarySkillStatic Analysis Tools Skill
  • lib-skill:security-research--stix-taxii·LibrarySkillSTIX/TAXII Intelligence Skill
  • lib-skill:security-research--yara-rules·LibrarySkillYARA Rules Skill
requires_skill5
  • role:compliance-engineer·RoleCompliance Engineer
  • role:compliance-officer·RoleCompliance Officer
  • role:privacy-engineer·RolePrivacy Engineer
  • role:audit-analyst·RoleAudit Analyst
  • role:security-engineer·RoleSecurity Engineer
specializes1
  • specialization:security-compliance·Specialization

Related pages

No related wiki pages for this record.

Shortcuts

Open in graph
Browse node kind