iiRecord
Agentic AI Atlas · iac-security-review
lib-process:security-compliance--iac-security-reviewa5c.ai
II.
LibraryProcess JSON

lib-process:security-compliance--iac-security-review

Structured · live

iac-security-review json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · generated-library/processes.yamlCluster · generated-library
Record JSON
{
  "id": "lib-process:security-compliance--iac-security-review",
  "_kind": "LibraryProcess",
  "_file": "generated-library/processes.yaml",
  "_cluster": "generated-library",
  "attributes": {
    "displayName": "iac-security-review",
    "description": "Infrastructure as Code Security Review - Comprehensive security analysis of IaC configurations including\nTerraform/CloudFormation scanning, policy as code validation (OPA, Sentinel), misconfiguration detection,\ncompliance checks, secrets detection, and automated remediation recommendations for secure infrastructure deployment.",
    "libraryPath": "library/specializations/security-compliance/iac-security-review.js",
    "specialization": "security-compliance",
    "references": [
      "- OWASP IaC Security: https://owasp.org/www-project-infrastructure-as-code-security/\n- CIS Benchmarks: https://www.cisecurity.org/cis-benchmarks/\n- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework\n- Terraform Security Best Practices: https://www.terraform.io/docs/cloud/guides/recommended-practices/\n- AWS Security Best Practices: https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html\n- Open Policy Agent: https://www.openpolicyagent.org/\n- Checkov: https://www.checkov.io/"
    ],
    "example": "const result = await orchestrate('specializations/security-compliance/iac-security-review', {\n  projectName: 'Production Infrastructure',\n  iacTool: 'terraform',\n  iacPath: './infrastructure',\n  cloudProvider: 'aws',\n  complianceStandards: ['CIS', 'PCI-DSS', 'SOC2', 'HIPAA'],\n  policyFramework: 'opa',\n  scanDepth: 'comprehensive',\n  autoRemediation: true,\n  outputDir: 'security-review-output'\n});",
    "usesAgents": [
      "iac-inventory-agent",
      "network-security-scanner",
      "iam-security-scanner",
      "sensitive-data-scanner",
      "policy-validator",
      "compliance-assessor",
      "encryption-reviewer",
      "data-protection-reviewer",
      "runtime-security-reviewer",
      "remediation-planner",
      "auto-remediator",
      "security-report-generator"
    ],
    "usesSkills": [
      "iac-security-scanner",
      "secret-detection-scanner"
    ]
  },
  "outgoingEdges": [
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "domain:security",
      "kind": "lib_applies_to_domain",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "role:security-engineer",
      "kind": "lib_involves_role",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "specialization:security-compliance",
      "kind": "lib_belongs_to_specialization",
      "attributes": {
        "weight": 0.9
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "lib-skill:security-compliance--iac-security-scanner",
      "kind": "uses_skill",
      "attributes": {
        "weight": 0.8
      }
    },
    {
      "from": "lib-process:security-compliance--iac-security-review",
      "to": "lib-skill:security-compliance--secret-detection-scanner",
      "kind": "uses_skill",
      "attributes": {
        "weight": 0.8
      }
    }
  ],
  "incomingEdges": []
}