Atlas Graph Explorer
Wiki
Graph
Edges
Home
Domain
domain:security
Security
domain:security
Domain
domain/domains/security.yaml
·
Open in Graph →
overview
json
graph
Attributes
displayName
Security
description
The Security domain.
Outgoing edges
(0)
None.
Incoming edges
(82)
applies_to
11
skill-area:ml-governance-compliance
·
SkillArea
ML Governance and Compliance
skill-area:mobile-security-testing
·
SkillArea
Mobile Security Testing
skill-area:authentication-authorization
·
SkillArea
Authentication and Authorization
skill-area:data-validation-sanitization
·
SkillArea
Data Validation and Sanitization
skill-area:encryption-decryption
·
SkillArea
Encryption and Decryption
skill-area:backend-security
·
SkillArea
Backend Security
skill-area:security-testing
·
SkillArea
Security Testing
skill-area:safety-redteaming
·
SkillArea
Safety Red-Teaming
blueprint:basic-security
·
Blueprint
basic-security
skill:security-review
·
Skill
Security Review
role:security-reviewer
·
Role
Security Reviewer
applies_to_domain
69
workflow:ad-fraud-detection-setup
·
Workflow
Ad Fraud Detection Setup
workflow:ai-content-moderation-review
·
Workflow
AI Content Moderation Review
workflow:ai-safety-guardrail-maintenance
·
Workflow
AI Safety Guardrail Maintenance
workflow:ai-pair-programming-governance
·
Workflow
AI Pair-Programming Governance
workflow:ai-model-license-compliance
·
Workflow
AI Model License Compliance
workflow:business-continuity-drill
·
Workflow
Business Continuity Drill
workflow:mcp-server-certification
·
Workflow
MCP Server Certification
workflow:plugin-marketplace-review
·
Workflow
Plugin Marketplace Review
workflow:gdpr-data-subject-request
·
Workflow
GDPR Data Subject Request
workflow:sox-controls-review
·
Workflow
SOX Controls Review
workflow:pci-dss-scoping
·
Workflow
PCI DSS Scoping
workflow:data-retention-review
·
Workflow
Data Retention Review
workflow:soc2-audit-preparation
·
Workflow
SOC 2 Audit Preparation
workflow:access-control-audit
·
Workflow
Access Control Audit
workflow:privacy-impact-assessment
·
Workflow
Privacy Impact Assessment
workflow:product-launch-readiness
·
Workflow
Product Launch Readiness
workflow:compliance-technology-stack-audit
·
Workflow
Compliance Technology Stack Audit
workflow:ai-powered-product-feature-review
·
Workflow
AI-Powered Product Feature Review
workflow:multi-cloud-migration-assessment
·
Workflow
Multi-Cloud Migration Assessment
workflow:organization-wide-toolchain-audit
·
Workflow
Organization-Wide Toolchain Audit
workflow:production-readiness-review
·
Workflow
Production Readiness Review
workflow:key-ceremony
·
Workflow
Key Ceremony
workflow:cryptographic-library-upgrade
·
Workflow
Cryptographic Library Upgrade
workflow:cyber-risk-scenario-modeling
·
Workflow
Cyber Risk Scenario Modeling
workflow:threat-intelligence-feed-review
·
Workflow
Threat Intelligence Feed Review
workflow:security-control-maturity-assessment
·
Workflow
Security Control Maturity Assessment
workflow:data-access-request-workflow
·
Workflow
Data Access Request Workflow
workflow:data-governance-review
·
Workflow
Data Governance Review
workflow:mobile-app-privacy-review
·
Workflow
Mobile App Privacy Review
workflow:embedded-ota-rollback-testing
·
Workflow
Embedded OTA Rollback Testing
workflow:network-topology-review
·
Workflow
Network Topology Review
workflow:open-source-security-disclosure
·
Workflow
Open Source Security Disclosure
workflow:dependency-upgrade
·
Workflow
Dependency Upgrade
workflow:bootloader-verification
·
Workflow
Bootloader Verification
workflow:employee-exit-process
·
Workflow
Employee Exit Process
workflow:anti-cheat-system-audit
·
Workflow
Anti-Cheat System Audit
workflow:vendor-evaluation
·
Workflow
Vendor Evaluation
workflow:cyber-risk-quantification
·
Workflow
Cyber Risk Quantification
workflow:patient-safety-event-review
·
Workflow
Patient Safety Event Review
workflow:certificate-rotation
·
Workflow
Certificate Rotation
workflow:ip-allowlist-management
·
Workflow
IP Allowlist Management
workflow:log-retention-policy
·
Workflow
Log Retention Policy
workflow:oss-contribution-review
·
Workflow
Open Source Contribution Review
workflow:license-compliance-audit
·
Workflow
License Compliance Audit
workflow:artifact-signing-and-provenance
·
Workflow
Artifact Signing and Provenance
workflow:pos-system-upgrade
·
Workflow
POS System Upgrade
workflow:third-party-risk-assessment
·
Workflow
Third-Party Risk Assessment
workflow:hipaa-compliance-audit
·
Workflow
HIPAA Compliance Audit
workflow:iac-security-scanning
·
Workflow
IaC Security Scanning
workflow:container-image-hardening
·
Workflow
Container Image Hardening
workflow:phishing-simulation-exercise
·
Workflow
Phishing Simulation Exercise
workflow:supply-chain-attack-simulation
·
Workflow
Supply Chain Attack Simulation
workflow:cve-response-coordination
·
Workflow
CVE Response Coordination
workflow:penetration-test-cycle
·
Workflow
Penetration Test Cycle
workflow:red-team-exercise
·
Workflow
Red Team Exercise
workflow:bug-bounty-triage
·
Workflow
Bug Bounty Triage
workflow:security-review
·
Workflow
Security Review
workflow:vulnerability-management
·
Workflow
Vulnerability Management
workflow:secret-rotation
·
Workflow
Secret Rotation
workflow:kernel-module-review
·
Workflow
Kernel Module Review
workflow:fraud-detection-model-review
·
Workflow
Fraud Detection Model Review
workflow:csp-header-audit
·
Workflow
CSP Header Audit
workflow:ai-safety-guardrail-maintenance
·
Workflow
AI Safety Guardrail Maintenance
workflow:data-governance-review
·
Workflow
Data Governance Review
workflow:dependency-upgrade
·
Workflow
Dependency Upgrade
workflow:vendor-evaluation
·
Workflow
Vendor Evaluation
workflow:security-review
·
Workflow
Security Review
workflow:vulnerability-management
·
Workflow
Vulnerability Management
workflow:secret-rotation
·
Workflow
Secret Rotation
specializes
2
specialization:cryptography-blockchain
·
Specialization
Cryptography & Blockchain
specialization:security-research
·
Specialization
Security Research