Agent skill
security-management
Manage security policies and access controls for Protect surveillance. Monitor access to recordings and system settings to ensure only authorized personnel have appropriate access.
Stars
163
Forks
31
Install this agent skill to your Project
npx add-skill https://github.com/majiayu000/claude-skill-registry/tree/main/skills/devops/security-management-majiayu000-claude-skill-regist
SKILL.md
Security Management Skill
Manage access controls and security policies for your Protect surveillance system.
What this skill does
This skill enables you to:
- Review system access controls and user permissions
- Monitor surveillance system security configuration
- Verify access to sensitive recordings and events
- Manage secure remote access to cameras
- Audit system access logs
- Implement least-privilege access models
When to use this skill
Use this skill when you need to:
- Review who has access to the Protect system
- Audit surveillance recordings access
- Verify authentication and authorization settings
- Plan access control policies
- Troubleshoot access-related issues
- Generate access audit reports
Available Tools
get_protect_info- Get system security informationget_protect_devices- Verify device security status
Typical Workflows
Access Audit
- Use
get_protect_infoto review system configuration - Check who has system access
- Verify recording access controls
- Review authentication methods
- Generate audit report
Security Configuration Review
- Check system security settings
- Verify encrypted connections
- Review user permissions
- Assess physical security controls
- Document findings
Incident Investigation
- Review event logs for unauthorized access
- Check authentication failures
- Verify recording integrity
- Document timeline
- Provide recommendations
Example Questions
- "Who has access to the Protect system?"
- "Audit surveillance system access"
- "Verify recording access controls"
- "Check system authentication settings"
- "Generate a security configuration report"
Response Format
When using this skill, I provide:
- Access control configuration details
- User permission summary
- Authentication method details
- Recording access restrictions
- Security assessment findings
- Compliance status
- Specific recommendations for improvements
Best Practices
- Regularly audit system access
- Implement principle of least privilege
- Use strong authentication
- Monitor access logs
- Document access policies
- Review permissions quarterly
- Archive audit logs
- Implement role-based access control
Didn't find tool you were looking for?