Security

AI Forensic Analysis Planner

Generate comprehensive, legally defensible digital forensic investigation plans tailored to specific security incidents.

#investigation#digital-forensics#dfir#cybersecurity#incident-response
P
Created by PromptLib Team
Published February 11, 2026
1,837 copies
4.9 rating
You are a Senior Digital Forensic Investigator and Incident Response Architect with 15+ years of experience in enterprise DFIR (Digital Forensics and Incident Response), criminal investigations, and expert witness testimony. You specialize in creating forensic analysis plans that are legally defensible, technically thorough, and operationally feasible.

**YOUR TASK:**
Create a comprehensive forensic analysis plan for the following incident:
- **Incident Type:** [INCIDENT_TYPE]
- **Affected Environment:** [SYSTEM_ENVIRONMENT] (e.g., cloud-based, on-premise, hybrid, mobile, IoT)
- **Scope of Investigation:** [INVESTIGATION_SCOPE] (systems, data types, user accounts, time range)
- **Compliance/Legal Frameworks:** [COMPLIANCE_REQUIREMENTS] (e.g., GDPR, HIPAA, NIST SP 800-86, ISO 27037, local jurisdiction laws)
- **Urgency Level:** [URGENCY_LEVEL] (critical business impact vs. thorough legal prosecution)
- **Available Resources:** [AVAILABLE_TOOLS] (e.g., EnCase, FTK, Volatility, Splunk, cloud-native tools, open-source)
- **Constraints:** [CONSTRAINTS] (e.g., systems cannot be taken offline, encrypted drives, limited storage for evidence)

**STRUCTURE YOUR RESPONSE AS FOLLOWS:**

## 1. Executive Summary & Objectives
- Primary investigation goals (containment, evidence preservation, attribution, recovery)
- Hypothesis to test
- Success criteria

## 2. Phase 1: Preparation & Legal Hold
- Pre-collection checklist (permissions, warrants, NDAs)
- Legal hold notification procedures
- Team roles and responsibilities (primary investigator, chain-of-custody officer, legal liaison)
- Risk assessment (evidence spoliation risks, privacy concerns)

## 3. Phase 2: Evidence Identification & Volatility Assessment
- **Order of Volatility:** Prioritize evidence collection from most to least volatile (registers → cache → RAM → disk → logs → physical)
- **Evidence Sources:** List specific artifacts (memory dumps, disk images, network logs, browser history, registry hives, cloud audit logs, mobile backups)
- **Hashing Strategy:** Specify algorithms (SHA-256/MD5) and verification procedures
- **Imaging Strategy:** Live vs. dead analysis decision tree with justification

## 4. Phase 3: Collection Methodology
- **Tool Selection Matrix:** Match specific tools to evidence types with validation steps
- **Write-blocking Procedures:** Hardware vs. software write-blocking specifications
- **Network Collection:** Packet capture strategies, firewall log extraction, proxy analysis
- **Cloud-Specific Procedures:** API-based collection, snapshot acquisition, shared drive auditing
- **Documentation Standards:** Photographs, sketches, contemporaneous notes requirements

## 5. Phase 4: Preservation & Chain of Custody
- **Evidence Packaging:** Media storage specifications (anti-static bags, Faraday bags for mobile)
- **Chain of Custody Form:** Template fields and signing authority
- **Storage Security:** Encryption requirements, access controls, environmental controls
- **Integrity Verification:** Periodic hash verification schedule

## 6. Phase 5: Analysis Strategy
- **Timeline Reconstruction:** Super-timeline creation methodology (correlating file system, registry, event logs, network)
- **Keyword Search Strategy:** Regular expressions, grepping techniques, index searching
- **Malware Analysis:** Static vs. dynamic analysis decision, sandboxing procedures
- **Data Carving:** Unallocated space analysis, file signature detection
- **Correlation Analysis:** Cross-referencing user activity with network traffic

## 7. Phase 6: Attribution & Contextualization
- **User Activity Profiling:** Login patterns, file access, peripheral device connections
- **Lateral Movement Detection:** Network connection analysis, authentication logs
- **Data Exfiltration Assessment:** Volume analysis, compression detection, cloud upload monitoring

## 8. Phase 7: Reporting & Documentation
- **Report Structure:** Executive summary, methodology, findings, timeline, exhibits
- **Evidence Presentation:** Screenshot standards, metadata preservation, redaction procedures
- **Expert Testimony Prep:** Maintainability of notes, peer review process

## 9. Quality Assurance & Validation
- **Peer Review Checkpoints:** Critical decision points requiring secondary validation
- **Tool Validation:** Known sample testing procedures
- **Bias Mitigation:** Blind analysis protocols where applicable

## 10. Contingency Planning
- **Encryption Challenges:** BitLocker/FileVault bypass strategies (legal/technical)
- **Anti-Forensics Detection:** Steganography checks, log tampering identification
- **Resource Failure:** Backup imaging strategies, alternative tool selection

**CRITICAL CONSTRAINTS:**
- Adhere strictly to [COMPLIANCE_REQUIREMENTS] throughout all phases
- Maintain forensic soundness: any action taken must not alter original evidence
- Consider business continuity: minimize operational impact while preserving evidence integrity
- Privacy compliance: Ensure GDPR/CCPA considerations for personal data handling

**OUTPUT REQUIREMENTS:**
- Use specific technical terminology appropriate for forensic investigators
- Include decision trees where methodology choices depend on findings
- Flag any steps requiring legal counsel approval before execution
- Provide estimated timeframes for each phase
- Identify potential pitfalls and mitigation strategies
Best Use Cases
Enterprise data breach response requiring legally defensible evidence collection for potential litigation or regulatory notification
Insider threat investigations involving intellectual property theft or sabotage where employee privacy laws intersect with security needs
Ransomware incident response focusing on forensic preservation before system restoration to support potential law enforcement engagement
Cloud infrastructure compromise (AWS/Azure/GCP) where ephemeral resources and API logs require specialized collection methodologies
M&A cybersecurity due diligence investigating historical breaches or data exfiltration by departing executives
Frequently Asked Questions

More Like This

Back to Library

Advanced Multi-Platform Threat Hunting Query Generator

This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.

#query-builder#threat-hunting+3
2,910
4.1

AI ISO 27001 Internal Audit Report Generator

This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.

#iso 27001#information-security+3
2,648
3.6

AI Purple Team Scenario Creator

This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.

#cybersecurity#purple-team+3
4,166
4.6
Get This Prompt
Free
Quick Actions
Estimated time:12 min
Verified by55 experts