pasta-objectives

PASTA Stage 1: Define Business Objectives

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pasta-objectives" with this command: npx skills add florianbuetow/claude-code/florianbuetow-claude-code-pasta-objectives

PASTA Stage 1: Define Business Objectives

Establish what the application protects, why it matters, and what business impact a compromise would have. This stage anchors the entire PASTA threat model to real business value so that subsequent stages prioritize by actual organizational impact.

Supported Flags

Read ../../shared/schemas/flags.md for the full flag specification. Key behaviors:

Flag Stage 1 Behavior

--scope

Default changed . Scans configs, docs, schemas, and API contracts to infer business purpose.

--depth quick

Business purpose from project metadata only.

--depth standard

Full analysis of configs, schemas, and code to infer objectives, compliance, and risk thresholds.

--depth deep

Standard + trace payment flows, PII handling, and regulatory indicators across the codebase.

--depth expert

Deep + formal risk tolerance matrix with quantified impact categories.

--severity

Not applicable at this stage (no vulnerability findings produced).

Framework Context

Read ../../shared/frameworks/pasta.md , Stage 1 section. PASTA is SEQUENTIAL. Stage 1 output feeds Stage 2. Do not skip this stage.

Prerequisites

None. This is the first stage. The analyst needs access to the application source code, configuration files, and any available documentation.

Workflow

Step 1: Determine Scope

  • Parse --scope flag (default: changed ).

  • Resolve to a concrete file list.

  • Prioritize: README , package.json , pom.xml , .env.example , database migrations, API routes, OpenAPI specs, Terraform/CloudFormation, docs/ .

Step 2: Identify Business Purpose

  • Core function: What does this application do? (e-commerce, SaaS, API, etc.)

  • Users: Who uses it? Customers, employees, partners, public?

  • Data handled: PII, financial, health, credentials, intellectual property?

  • Revenue impact: Directly revenue-generating or supporting?

Step 3: Identify Compliance Requirements

Scan for indicators: PCI-DSS (payment processing, Stripe), HIPAA (health data, FHIR), GDPR/CCPA (EU data, consent, deletion endpoints), SOX (audit trails), SOC 2 (multi-tenant SaaS, data isolation).

Step 4: Define Risk Appetite

  • Acceptable downtime: SLA requirements.

  • Data sensitivity: Classify as public, internal, confidential, restricted.

  • Blast radius: Systems and users affected if compromised.

  • Recovery cost: Data loss vs. data exposure trade-offs.

Step 5: Document Business Context

Produce the Stage 1 output document that feeds Stage 2.

Analysis Checklist

  • What is the worst business outcome if this application is fully compromised?

  • What data, if exposed, would trigger regulatory notification requirements?

  • What is the acceptable downtime for this service?

  • Which business processes depend on this application's integrity?

  • Who are the stakeholders impacted by a breach?

  • Does the application handle payments, PII, health data, or other regulated data?

  • Is this application internet-facing, internal, or both?

  • What is the risk appetite -- startup-aggressive or enterprise-conservative?

Output Format

Stage 1 produces a Business Context Document. ID prefix: PASTA (e.g., PASTA-S1-001 ).

PASTA Stage 1: Business Objectives

Application Purpose

[1-2 sentence summary of what the application does and why it matters]

Business-Critical Assets

AssetTypeSensitivityImpact if Compromised
...Data / Process / SystemPublic / Internal / Confidential / Restricted...

Compliance Requirements

RegulationApplicableEvidenceKey Requirements
PCI-DSSYes/No/Unknown[files/patterns][controls]
HIPAA / GDPR / SOX.........

Risk Tolerance

CategoryToleranceJustification
Downtime[hours/minutes][SLA evidence]
Data exposure[severity][data classification]
Financial loss[threshold][revenue model]

Assumptions

[List assumptions made when business context was ambiguous]

Findings follow ../../shared/schemas/findings.md with:

  • metadata.tool : "pasta-objectives" , metadata.framework : "pasta" , metadata.category : "Stage-1"

Next Stage

Stage 2: Define Technical Scope (pasta-scope ). Pass the Business Context Document. Stage 2 maps the attack surface and builds DFDs focused on the assets and processes identified here.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Web3

crypto

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

spec-writer

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

spoofing

No summary provided by upstream source.

Repository SourceNeeds Review