Files
claudetools/api/schemas/security_incident.py
Mike Swanson 390b10b32c Complete Phase 6: MSP Work Tracking with Context Recall System
Implements production-ready MSP platform with cross-machine persistent memory for Claude.

API Implementation:
- 130 REST API endpoints across 21 entities
- JWT authentication on all endpoints
- AES-256-GCM encryption for credentials
- Automatic audit logging
- Complete OpenAPI documentation

Database:
- 43 tables in MariaDB (172.16.3.20:3306)
- 42 SQLAlchemy models with modern 2.0 syntax
- Full Alembic migration system
- 99.1% CRUD test pass rate

Context Recall System (Phase 6):
- Cross-machine persistent memory via database
- Automatic context injection via Claude Code hooks
- Automatic context saving after task completion
- 90-95% token reduction with compression utilities
- Relevance scoring with time decay
- Tag-based semantic search
- One-command setup script

Security Features:
- JWT tokens with Argon2 password hashing
- AES-256-GCM encryption for all sensitive data
- Comprehensive audit trail for credentials
- HMAC tamper detection
- Secure configuration management

Test Results:
- Phase 3: 38/38 CRUD tests passing (100%)
- Phase 4: 34/35 core API tests passing (97.1%)
- Phase 5: 62/62 extended API tests passing (100%)
- Phase 6: 10/10 compression tests passing (100%)
- Overall: 144/145 tests passing (99.3%)

Documentation:
- Comprehensive architecture guides
- Setup automation scripts
- API documentation at /api/docs
- Complete test reports
- Troubleshooting guides

Project Status: 95% Complete (Production-Ready)
Phase 7 (optional work context APIs) remains for future enhancement.

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2026-01-17 06:00:26 -07:00

61 lines
3.2 KiB
Python

"""
Pydantic schemas for SecurityIncident model.
Request and response schemas for security incident tracking.
"""
from datetime import datetime
from typing import Optional
from uuid import UUID
from pydantic import BaseModel, Field
class SecurityIncidentBase(BaseModel):
"""Base schema with shared SecurityIncident fields."""
client_id: Optional[UUID] = Field(None, description="Reference to affected client")
service_id: Optional[UUID] = Field(None, description="Reference to affected service")
infrastructure_id: Optional[UUID] = Field(None, description="Reference to affected infrastructure")
incident_type: Optional[str] = Field(None, description="Type of incident: bec, backdoor, malware, unauthorized_access, data_breach, phishing, ransomware, brute_force")
incident_date: datetime = Field(..., description="When the incident occurred")
severity: Optional[str] = Field(None, description="Severity level: critical, high, medium, low")
description: str = Field(..., description="Detailed description of the incident")
findings: Optional[str] = Field(None, description="Investigation results and findings")
remediation_steps: Optional[str] = Field(None, description="Steps taken to remediate the incident")
status: str = Field("investigating", description="Status: investigating, contained, resolved, monitoring")
resolved_at: Optional[datetime] = Field(None, description="When the incident was resolved")
notes: Optional[str] = Field(None, description="Additional notes and context")
class SecurityIncidentCreate(SecurityIncidentBase):
"""Schema for creating a new SecurityIncident."""
pass
class SecurityIncidentUpdate(BaseModel):
"""Schema for updating an existing SecurityIncident. All fields are optional."""
client_id: Optional[UUID] = Field(None, description="Reference to affected client")
service_id: Optional[UUID] = Field(None, description="Reference to affected service")
infrastructure_id: Optional[UUID] = Field(None, description="Reference to affected infrastructure")
incident_type: Optional[str] = Field(None, description="Type of incident")
incident_date: Optional[datetime] = Field(None, description="When the incident occurred")
severity: Optional[str] = Field(None, description="Severity level")
description: Optional[str] = Field(None, description="Detailed description of the incident")
findings: Optional[str] = Field(None, description="Investigation results and findings")
remediation_steps: Optional[str] = Field(None, description="Steps taken to remediate the incident")
status: Optional[str] = Field(None, description="Status of incident handling")
resolved_at: Optional[datetime] = Field(None, description="When the incident was resolved")
notes: Optional[str] = Field(None, description="Additional notes and context")
class SecurityIncidentResponse(SecurityIncidentBase):
"""Schema for SecurityIncident responses with ID and timestamps."""
id: UUID = Field(..., description="Unique identifier for the security incident")
created_at: datetime = Field(..., description="Timestamp when the incident was created")
updated_at: datetime = Field(..., description="Timestamp when the incident was last updated")
model_config = {"from_attributes": True}