II.
LibraryProcess JSON
Structured · livelib-process:security-compliance--iac-security-review
iac-security-review json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "lib-process:security-compliance--iac-security-review",
"_kind": "LibraryProcess",
"_file": "generated-library/processes.yaml",
"_cluster": "generated-library",
"attributes": {
"displayName": "iac-security-review",
"description": "Infrastructure as Code Security Review - Comprehensive security analysis of IaC configurations including\nTerraform/CloudFormation scanning, policy as code validation (OPA, Sentinel), misconfiguration detection,\ncompliance checks, secrets detection, and automated remediation recommendations for secure infrastructure deployment.",
"libraryPath": "library/specializations/security-compliance/iac-security-review.js",
"specialization": "security-compliance",
"references": [
"- OWASP IaC Security: https://owasp.org/www-project-infrastructure-as-code-security/\n- CIS Benchmarks: https://www.cisecurity.org/cis-benchmarks/\n- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework\n- Terraform Security Best Practices: https://www.terraform.io/docs/cloud/guides/recommended-practices/\n- AWS Security Best Practices: https://docs.aws.amazon.com/securityhub/latest/userguide/what-is-securityhub.html\n- Open Policy Agent: https://www.openpolicyagent.org/\n- Checkov: https://www.checkov.io/"
],
"example": "const result = await orchestrate('specializations/security-compliance/iac-security-review', {\n projectName: 'Production Infrastructure',\n iacTool: 'terraform',\n iacPath: './infrastructure',\n cloudProvider: 'aws',\n complianceStandards: ['CIS', 'PCI-DSS', 'SOC2', 'HIPAA'],\n policyFramework: 'opa',\n scanDepth: 'comprehensive',\n autoRemediation: true,\n outputDir: 'security-review-output'\n});",
"usesAgents": [
"iac-inventory-agent",
"network-security-scanner",
"iam-security-scanner",
"sensitive-data-scanner",
"policy-validator",
"compliance-assessor",
"encryption-reviewer",
"data-protection-reviewer",
"runtime-security-reviewer",
"remediation-planner",
"auto-remediator",
"security-report-generator"
],
"usesSkills": [
"iac-security-scanner",
"secret-detection-scanner"
]
},
"outgoingEdges": [
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "domain:security",
"kind": "lib_applies_to_domain",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "role:security-engineer",
"kind": "lib_involves_role",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "specialization:security-compliance",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "lib-skill:security-compliance--iac-security-scanner",
"kind": "uses_skill",
"attributes": {
"weight": 0.8
}
},
{
"from": "lib-process:security-compliance--iac-security-review",
"to": "lib-skill:security-compliance--secret-detection-scanner",
"kind": "uses_skill",
"attributes": {
"weight": 0.8
}
}
],
"incomingEdges": []
}