Service Scan Rail
Use When
ComplianceAnalysis
Primary Outputs
- Threat model + control priorities + roadmap
Time to Run
15-30minutes
Quick turnaround service
Inputs Required
Minimum1 fields
Ideal1 fields
Input types: cyber, defensive, resilience
Dream Team
- P4Cyber Security Lead
- P3Digital Forensics Analyst
- P2IT Security Officer
Risk Level
Low
Routine execution
Compliance Gates
ARCS Module
ARCF Validation
Data Provenance
Ethics Review
Overall StatusReview Required
Expected Output
Threat model + control priorities + roadmap.
Required Inputs
SPStrategic Priority
The primary strategic objective or question to address
Quick Selector
Use this template to quickly invoke the service:
SERVICE: S182
SERVICE_NAME: Threat Modeling for Mission Systems (Non-Exploit)
REQUIRED_INPUTS: SP
RUN WITH:
SP: {{SP}}
RS: {{RS}}
DL: {{DL}} (optional)
OP: {{OP}} (optional)
RUNS181
Embassy Cyber Governance Charter (Defensive)
Create cyber governance: roles, reporting, risk acceptance, incident response, and training cadence.
S183
Critical Infrastructure Cyber Maturity Roadmap
Define maturity stages and prioritized controls; include governance and measurement.
S184
Incident Response Playbook (Embassy/Operator)
Draft IR playbook: detection, containment, comms, legal gates, recovery, AAR; no offensive content.