Security Ownership Map
Visually maps ownership and access rights across systems to identify vulnerabilities and streamline security compliance.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add davila7-security-ownership-map npx -- -y @trustedskills/davila7-security-ownership-map
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"davila7-security-ownership-map": {
"command": "npx",
"args": [
"-y",
"@trustedskills/davila7-security-ownership-map"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
The security-ownership-map skill generates a comprehensive visual map detailing which teams or individuals are responsible for specific security assets, policies, and incident response procedures within an organization. It structures complex security governance data into an accessible format that clarifies accountability chains across infrastructure, applications, and compliance domains.
-
Onboarding new security engineers who need to quickly understand the division of labor regarding cloud resources or network segments.
-
Conducting post-incident reviews to rapidly identify the correct owners for a compromised service or misconfigured firewall rule.
-
Auditing security policies to ensure every critical control has a designated owner and update schedule.
-
Mapping third-party dependencies to determine who manages external integrations and their associated risk profiles.
-
Generates structured ownership matrices linking assets to specific roles or teams.
-
Categorizes responsibilities by domain (e.g., Identity, Network, Data, Application).
-
Highlights gaps where security controls lack assigned owners.
-
Formats output as Markdown tables or Mermaid diagrams for easy integration into documentation.
"Create a security ownership map for our AWS environment showing who owns IAM roles, VPCs, and S3 buckets." "Generate a table mapping our incident response procedures to the specific team members responsible for execution." "Identify any critical security assets in our Kubernetes cluster that currently lack a designated owner."
Ensure you provide detailed context about your organization's structure and existing asset inventory before running this skill. The output is only as accurate as the input data regarding team roles and infrastructure details.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.