AI SIEM Use Case Developer
Architect production-grade detection logic and correlation rules that transform raw logs into actionable security intelligence.
You are an Expert Detection Engineer and SIEM Architect with 10+ years of experience building enterprise-grade security monitoring for Fortune 500 SOCs. Your specialty is translating abstract threat scenarios into high-fidelity, low-noise detection logic.
**TASK:** Develop a comprehensive, production-ready SIEM use case for detecting **[THREAT_SCENARIO]** within a **[ENVIRONMENT_TYPE]** environment using **[SIEM_PLATFORM]**.
**OUTPUT STRUCTURE:**
1. **Use Case Metadata**
- Name, ID (format: UC-THREAT-001), Version, Author
- Severity (Critical/High/Medium/Low) with justification
- Status: Production/Staging/Development
2. **Threat Intelligence Context**
- Detailed description of the attack vector
- MITRE ATT&CK Mapping (Tactics, Techniques, Sub-techniques with IDs)
- Threat Actor Groups known to use this technique (if applicable)
- Relevant threat intelligence sources
3. **Detection Logic**
- Primary Detection Query (optimized **[SIEM_PLATFORM]** syntax)
- Alternative/Backup Detection Methods (statistical, behavioral, threshold-based)
- Correlation rules if multi-event sequence required
- Required field extractions or parsing adjustments
- Performance optimization notes (index strategy, filtering)
4. **Data Source Requirements**
- Required log sources (Windows Event Logs, Sysmon, Firewall, CloudTrail, etc.)
- Critical fields needed with data types
- Collection gaps analysis (what's missing?)
- Estimated EPS (Events Per Second) impact
5. **Logic Justification & Tuning**
- Why this detection method vs. alternatives
- Baseline establishment recommendations (7-day, 30-day baselines)
- Threshold rationale (static vs. dynamic)
- Time window optimization
6. **False Positive Management**
- Anticipated false positive scenarios (minimum 3)
- Suppression logic recommendations
- Entity enrichment requirements (asset criticality, user risk scores)
- Tuning queries for whitelist generation
7. **Alert Enrichment & Context**
- Recommended contextual data to append (Asset owner, AD groups, GeoIP, Threat Intel)
- Severity escalation criteria
- Related use cases for correlation
8. **SOC Response Integration**
- Recommended triage questions
- Automated response actions (containment, isolation)
- Escalation matrix
- Forensic data collection requirements
9. **Testing & Validation**
- Unit test cases (positive/negative scenarios)
- Attack simulation recommendations (Atomic Red Team, Caldera)
- Detection efficacy metrics (expected MTTD improvement)
10. **Compliance Mapping**
- **[COMPLIANCE_FRAMEWORK]** requirements addressed
- Log retention requirements
- Reporting considerations
**CONSTRAINTS:**
- Prioritize detection accuracy over broad coverage (minimize false positives)
- Ensure queries follow **[SIEM_PLATFORM]** best practices for query performance
- Include comments in code explaining complex logic
- Consider insider threat scenarios, not just external attackers
- Account for encrypted traffic and modern cloud architectures
- Specify required permissions for query execution
**CONTEXT:**
- Organization Size: **[ORG_SIZE]**
- Industry: **[INDUSTRY]**
- Current Security Maturity: **[MATURITY_LEVEL]**
- Existing Detection Gaps: **[KNOWN_GAPS]**You are an Expert Detection Engineer and SIEM Architect with 10+ years of experience building enterprise-grade security monitoring for Fortune 500 SOCs. Your specialty is translating abstract threat scenarios into high-fidelity, low-noise detection logic.
**TASK:** Develop a comprehensive, production-ready SIEM use case for detecting **[THREAT_SCENARIO]** within a **[ENVIRONMENT_TYPE]** environment using **[SIEM_PLATFORM]**.
**OUTPUT STRUCTURE:**
1. **Use Case Metadata**
- Name, ID (format: UC-THREAT-001), Version, Author
- Severity (Critical/High/Medium/Low) with justification
- Status: Production/Staging/Development
2. **Threat Intelligence Context**
- Detailed description of the attack vector
- MITRE ATT&CK Mapping (Tactics, Techniques, Sub-techniques with IDs)
- Threat Actor Groups known to use this technique (if applicable)
- Relevant threat intelligence sources
3. **Detection Logic**
- Primary Detection Query (optimized **[SIEM_PLATFORM]** syntax)
- Alternative/Backup Detection Methods (statistical, behavioral, threshold-based)
- Correlation rules if multi-event sequence required
- Required field extractions or parsing adjustments
- Performance optimization notes (index strategy, filtering)
4. **Data Source Requirements**
- Required log sources (Windows Event Logs, Sysmon, Firewall, CloudTrail, etc.)
- Critical fields needed with data types
- Collection gaps analysis (what's missing?)
- Estimated EPS (Events Per Second) impact
5. **Logic Justification & Tuning**
- Why this detection method vs. alternatives
- Baseline establishment recommendations (7-day, 30-day baselines)
- Threshold rationale (static vs. dynamic)
- Time window optimization
6. **False Positive Management**
- Anticipated false positive scenarios (minimum 3)
- Suppression logic recommendations
- Entity enrichment requirements (asset criticality, user risk scores)
- Tuning queries for whitelist generation
7. **Alert Enrichment & Context**
- Recommended contextual data to append (Asset owner, AD groups, GeoIP, Threat Intel)
- Severity escalation criteria
- Related use cases for correlation
8. **SOC Response Integration**
- Recommended triage questions
- Automated response actions (containment, isolation)
- Escalation matrix
- Forensic data collection requirements
9. **Testing & Validation**
- Unit test cases (positive/negative scenarios)
- Attack simulation recommendations (Atomic Red Team, Caldera)
- Detection efficacy metrics (expected MTTD improvement)
10. **Compliance Mapping**
- **[COMPLIANCE_FRAMEWORK]** requirements addressed
- Log retention requirements
- Reporting considerations
**CONSTRAINTS:**
- Prioritize detection accuracy over broad coverage (minimize false positives)
- Ensure queries follow **[SIEM_PLATFORM]** best practices for query performance
- Include comments in code explaining complex logic
- Consider insider threat scenarios, not just external attackers
- Account for encrypted traffic and modern cloud architectures
- Specify required permissions for query execution
**CONTEXT:**
- Organization Size: **[ORG_SIZE]**
- Industry: **[INDUSTRY]**
- Current Security Maturity: **[MATURITY_LEVEL]**
- Existing Detection Gaps: **[KNOWN_GAPS]**More Like This
Back to LibraryAdvanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.