Atlas Graph Explorer
Wiki
Graph
Edges
Home
OrgUnit
org-unit:security-team
Security Team
org-unit:security-team
OrgUnit
role/org-units/security-team.yaml
·
Open in Graph →
overview
json
graph
Attributes
displayName
Security Team
kind
team
description
Security team — owns AppSec, infrastructure security, and incident response.
Outgoing edges
(3)
has_member
3
role:security-engineer
·
Role
Security Engineer
role:security-reviewer
·
Role
Security Reviewer
role:security-scanner-bot
·
Role
Security Scanner (Bot)
Incoming edges
(65)
performed_by_org_unit
65
workflow:ai-safety-guardrail-maintenance
·
Workflow
AI Safety Guardrail Maintenance
workflow:vehicle-cybersecurity-assessment
·
Workflow
Vehicle Cybersecurity Assessment
workflow:business-continuity-drill
·
Workflow
Business Continuity Drill
workflow:mcp-server-certification
·
Workflow
MCP Server Certification
workflow:gdpr-data-subject-request
·
Workflow
GDPR Data Subject Request
workflow:sox-controls-review
·
Workflow
SOX Controls Review
workflow:pci-dss-scoping
·
Workflow
PCI DSS Scoping
workflow:data-retention-review
·
Workflow
Data Retention Review
workflow:soc2-audit-preparation
·
Workflow
SOC 2 Audit Preparation
workflow:access-control-audit
·
Workflow
Access Control Audit
workflow:privacy-impact-assessment
·
Workflow
Privacy Impact Assessment
workflow:product-launch-readiness
·
Workflow
Product Launch Readiness
workflow:compliance-technology-stack-audit
·
Workflow
Compliance Technology Stack Audit
workflow:ai-powered-product-feature-review
·
Workflow
AI-Powered Product Feature Review
workflow:multi-cloud-migration-assessment
·
Workflow
Multi-Cloud Migration Assessment
workflow:organization-wide-toolchain-audit
·
Workflow
Organization-Wide Toolchain Audit
workflow:vendor-onboarding
·
Workflow
Vendor Onboarding
workflow:annual-compliance-review
·
Workflow
Annual Compliance Review
workflow:data-classification-audit
·
Workflow
Data Classification Audit
workflow:production-readiness-review
·
Workflow
Production Readiness Review
workflow:key-ceremony
·
Workflow
Key Ceremony
workflow:smart-contract-audit
·
Workflow
Smart Contract Audit
workflow:cryptographic-library-upgrade
·
Workflow
Cryptographic Library Upgrade
workflow:cyber-risk-scenario-modeling
·
Workflow
Cyber Risk Scenario Modeling
workflow:threat-intelligence-feed-review
·
Workflow
Threat Intelligence Feed Review
workflow:security-control-maturity-assessment
·
Workflow
Security Control Maturity Assessment
workflow:data-access-request-workflow
·
Workflow
Data Access Request Workflow
workflow:model-fairness-audit
·
Workflow
Model Fairness Audit
workflow:data-governance-review
·
Workflow
Data Governance Review
workflow:mobile-app-privacy-review
·
Workflow
Mobile App Privacy Review
workflow:network-topology-review
·
Workflow
Network Topology Review
workflow:open-source-security-disclosure
·
Workflow
Open Source Security Disclosure
workflow:bootloader-verification
·
Workflow
Bootloader Verification
workflow:employee-exit-process
·
Workflow
Employee Exit Process
workflow:anti-cheat-system-audit
·
Workflow
Anti-Cheat System Audit
workflow:vendor-evaluation
·
Workflow
Vendor Evaluation
workflow:grc-framework-assessment
·
Workflow
GRC Framework Assessment
workflow:cyber-risk-quantification
·
Workflow
Cyber Risk Quantification
workflow:certificate-rotation
·
Workflow
Certificate Rotation
workflow:ip-allowlist-management
·
Workflow
IP Allowlist Management
workflow:regulatory-change-assessment
·
Workflow
Regulatory Change Assessment
workflow:log-retention-policy
·
Workflow
Log Retention Policy
workflow:oss-contribution-review
·
Workflow
Open Source Contribution Review
workflow:third-party-risk-assessment
·
Workflow
Third-Party Risk Assessment
workflow:enterprise-procurement-navigation
·
Workflow
Enterprise Procurement Navigation
workflow:hipaa-compliance-audit
·
Workflow
HIPAA Compliance Audit
workflow:iac-security-scanning
·
Workflow
IaC Security Scanning
workflow:container-image-hardening
·
Workflow
Container Image Hardening
workflow:phishing-simulation-exercise
·
Workflow
Phishing Simulation Exercise
workflow:fuzzing-campaign
·
Workflow
Fuzzing Campaign
workflow:supply-chain-attack-simulation
·
Workflow
Supply Chain Attack Simulation
workflow:cve-response-coordination
·
Workflow
CVE Response Coordination
workflow:penetration-test-cycle
·
Workflow
Penetration Test Cycle
workflow:red-team-exercise
·
Workflow
Red Team Exercise
workflow:bug-bounty-triage
·
Workflow
Bug Bounty Triage
workflow:security-review
·
Workflow
Security Review
workflow:vulnerability-management
·
Workflow
Vulnerability Management
workflow:secret-rotation
·
Workflow
Secret Rotation
workflow:fraud-detection-model-review
·
Workflow
Fraud Detection Model Review
workflow:ai-safety-guardrail-maintenance
·
Workflow
AI Safety Guardrail Maintenance
workflow:data-governance-review
·
Workflow
Data Governance Review
workflow:vendor-evaluation
·
Workflow
Vendor Evaluation
workflow:security-review
·
Workflow
Security Review
workflow:vulnerability-management
·
Workflow
Vulnerability Management
workflow:secret-rotation
·
Workflow
Secret Rotation