II.
Responsibility JSON
Structured · liveresponsibility:threat-modeling
Threat modeling json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "responsibility:threat-modeling",
"_kind": "Responsibility",
"_file": "role/responsibilities/responsibilities-security.yaml",
"_cluster": "role",
"attributes": {
"displayName": "Threat modeling",
"cadence": "on-demand",
"description": "Lead structured threat-modeling sessions for new services and risky\nchanges.\n"
},
"outgoingEdges": [
{
"from": "responsibility:threat-modeling",
"to": "role:security-engineer",
"kind": "held_by",
"attributes": {}
},
{
"from": "responsibility:threat-modeling",
"to": "role:security-reviewer",
"kind": "held_by",
"attributes": {}
},
{
"from": "responsibility:threat-modeling",
"to": "skill-area:threat-modeling",
"kind": "requires_expertise",
"attributes": {}
}
],
"incomingEdges": [
{
"from": "role:security-architect",
"to": "responsibility:threat-modeling",
"kind": "holds_responsibility"
},
{
"from": "role:security-reviewer",
"to": "responsibility:threat-modeling",
"kind": "holds_responsibility"
},
{
"from": "workflow:vehicle-cybersecurity-assessment",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:hazop-safety-analysis",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:pci-dss-scoping",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:access-control-audit",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:cyber-risk-scenario-modeling",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:threat-intelligence-feed-review",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:mobile-app-privacy-review",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:anti-cheat-system-audit",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:grc-framework-assessment",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:cyber-risk-quantification",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:ip-allowlist-management",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:regulatory-change-assessment",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:enterprise-risk-register-review",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:phishing-simulation-exercise",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:supply-chain-attack-simulation",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:penetration-test-cycle",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:red-team-exercise",
"to": "responsibility:threat-modeling",
"kind": "triggers_responsibility",
"attributes": {}
}
]
}