information-security-strategy

Information Security Strategy Skill

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "information-security-strategy" with this command: npx skills add hack23/homepage/hack23-homepage-information-security-strategy

Information Security Strategy Skill

Purpose

Define and maintain Hack23's information security strategy that aligns security objectives with business goals, ensuring all projects contribute to the organization's overall security posture.

Rules

Strategic Alignment

MUST:

  • Align security controls with business risk appetite

  • Consider security implications in all architectural decisions

  • Balance security investment with business value

  • Maintain security as a core differentiator (transparency, open-source ISMS)

MUST NOT:

  • Implement security theater (controls that look good but don't protect)

  • Sacrifice usability without corresponding risk reduction

  • Ignore business context when applying security requirements

Security Program Components

MUST maintain across all Hack23 projects:

  • Governance - Policies, roles, responsibilities

  • Risk Management - Assessment, treatment, monitoring

  • Compliance - ISO 27001, NIST CSF, CIS, GDPR, NIS2

  • Operations - Monitoring, incident response, continuity

  • Awareness - Documentation, training, culture

Security Architecture Requirements

Every Hack23 repository MUST maintain:

  • SECURITY_ARCHITECTURE.md

  • Current implemented security design

  • FUTURE_SECURITY_ARCHITECTURE.md

  • Planned security improvements

Defense-in-Depth Strategy

MUST implement layered security:

  • Perimeter: Network security, WAF, DDoS protection

  • Identity: Authentication, authorization, MFA

  • Application: Input validation, output encoding, secure development

  • Data: Encryption, classification, access control

  • Monitoring: Logging, alerting, incident detection

Transparency as Strategy

Hack23's unique differentiator:

  • Public ISMS documentation demonstrates security maturity

  • Open-source security tools build community trust

  • Transparent security architecture shows commitment to excellence

Hack23 ISMS Policy References

  • Information Security Strategy

  • Information Security Policy

  • Risk Assessment Methodology

  • Secure Development Policy

Compliance Mapping

  • ISO 27001:2022: Clause 5 (Leadership), Clause 6 (Planning)

  • NIST CSF 2.0: GV (Govern)

  • NIS2: Article 21 (Cybersecurity risk management measures)

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

threat-modeling

No summary provided by upstream source.

Repository SourceNeeds Review
General

secrets-management

No summary provided by upstream source.

Repository SourceNeeds Review
General

ai governance

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

github-agentic-workflows

No summary provided by upstream source.

Repository SourceNeeds Review