Security Operations Center Playbooks
Creates detailed SOC playbooks standardizing incident response procedures and investigation workflows.
Browse ready-to-use AI prompt templates for cybersecurity professionals. Covers threat assessment, incident response, vulnerability management, security audits, and compliance frameworks.
Creates detailed SOC playbooks standardizing incident response procedures and investigation workflows.
Assesses security architecture for compliance with Zero Trust and security best practices.
Plans application security testing including SAST, DAST, and penetration testing across development lifecycle.
Creates measurement frameworks tracking security awareness program effectiveness and behavioral change.
Creates implementation roadmaps for SOC2 Type I and II certification with control mapping and audit readiness.
Develops KPI dashboards for security operations measuring detection, response, and remediation effectiveness.
Designs insider threat detection and prevention programs protecting against malicious and negligent insiders.
Evaluates API security addressing authentication, rate limiting, injection attacks, and data exposure risks.
Develops response procedures for zero-day vulnerabilities ensuring rapid identification and containment.
Designs zero trust security models eliminating implicit trust with continuous authentication and authorization.
Quantifies financial and operational risk from third-party relationships guiding vendor management strategy.
Develops comprehensive ransomware defenses including detection, prevention, and recovery capabilities.
Plans endpoint security deployment covering antivirus, EDR, and device control across endpoints.
Plans and executes red team exercises simulating adversary tactics to identify security gaps and weaknesses.
Guides SIEM implementation including log source configuration, alert tuning, and security monitoring optimization.
Plans and facilitates ransomware response tabletop exercises testing incident response capabilities.
Develops threat intelligence capabilities including sources, analysis, and operational integration.
Develops quantitative risk scoring systems for vulnerabilities, threats, and security decisions prioritization.
Supports compliance audits by preparing documentation, evidence mapping, and audit readiness assessment.
Designs phishing awareness training and testing programs to reduce user susceptibility and security incidents.
Automates generation and management of compliance documentation reducing manual effort.
Establishes bug bounty or responsible disclosure programs to identify vulnerabilities from external researchers.
Creates processes for incident notification covering regulatory requirements, stakeholder communication, and public disclosure.
Creates incident recovery procedures ensuring rapid system restoration and business resumption after security incidents.
Establishes code review processes identifying security vulnerabilities before deployment.
Plans penetration testing engagements including scope, methodology, authorization, and result interpretation.
Creates security KPI dashboards tracking security program effectiveness and enabling data-driven decisions.
Designs comprehensive security training covering employee roles, compliance obligations, and security best practices.
Conducts security architecture reviews assessing design against security principles and emerging threats.
Develops vendor security assessment and monitoring programs ensuring third-party security compliance.
Clone any prompt, customize it with variables, and test across ChatGPT, Claude, and Gemini. Free forever on the starter plan.