Prompt Library Hub
Discover expertly crafted prompts to boost productivity, creativity, and results with ChatGPT, Claude, and Gemini.
Advanced Multi-Platform Threat Hunting Query Generator
This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.
AI ISO 27001 Internal Audit Report Generator
This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.
AI Purple Team Scenario Creator
This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.
AI SOC2 Non-Conformity Report Generator
This prompt transforms scattered audit findings, system logs, and control test results into comprehensive SOC2 Non-Conformity Reports (NCRs) that meet auditor standards. It structures findings against Trust Services Criteria, assigns severity levels, and generates actionable remediation plans to accelerate your compliance journey.
AI-Powered ISO 20218 Security Gap Analysis Report Generator
This prompt engineers an expert security auditor persona to conduct exhaustive gap analyses between your current organizational state and ISO 20218 (or applicable ISO security standard) requirements. It generates executive-ready reports with quantitative compliance scoring, risk-weighted remediation roadmaps, and specific control implementation guidance tailored to your industry context.
ISO27001 Compliant Incident Response Plan Generator
This prompt creates a complete Information Security Incident Response Plan (IRP) that satisfies ISO27001 requirements for management of information security incidents and improvements. It generates role-specific procedures, communication matrices, evidence preservation protocols, and continuous improvement frameworks tailored to your organization's size, industry, and risk profile.
ISO 27017 Cloud Security Compliance Assessment & Checklist Generator
This prompt creates a detailed, actionable ISO 27017 compliance framework tailored to your cloud deployment model and organizational role (CSP or Customer). It maps specific cloud security controls to implementation tasks, gap analysis criteria, and evidence requirements for audit readiness.
ISO 27017 Cloud Service Agreement Security Review
This prompt enables security professionals and procurement teams to systematically evaluate Cloud Service Agreements (CSAs) against ISO 27017:2015 requirements. It identifies contractual gaps in cloud-specific security controls, assesses shared responsibility allocations, and generates actionable amendment recommendations to ensure your cloud arrangements meet international security standards.
ISO 27017 Cloud Vendor Security Assessment
This prompt generates a comprehensive vendor risk assessment aligned with ISO/IEC 27017:2015 standards, specifically architected for cloud service evaluations. It systematically analyzes cloud-specific security controls, data segregation mechanisms, and shared responsibility implementations to provide evidence-based risk ratings and prioritized remediation strategies. Use this to formalize cloud vendor due diligence, satisfy regulatory requirements, and ensure robust cloud supply chain security.
ISO 27018 Cloud PII Incident Response Plan Generator
This prompt helps security teams and compliance officers create a detailed ISO 27018 compliant incident response plan tailored for cloud environments processing PII. It generates role-specific procedures, notification workflows, breach assessment matrices, and documentation templates required for cloud service providers handling personal data.
AI ISO27001 Corrective Action Plan Generator
This prompt helps security professionals and compliance officers generate comprehensive corrective action plans (CAPs) that address ISO27001 non-conformities. It produces structured, auditable documentation with root cause analysis, remediation steps, timelines, and evidence requirements aligned with Annex A controls.
AI SOC2 Documentation Review
This prompt template enables security teams, compliance officers, and auditors to systematically evaluate SOC2 documentation against Trust Services Criteria. It identifies control gaps, suggests remediation strategies, and generates executive-ready findings reports to accelerate audit preparation and reduce compliance risk.
AI Web App Attack Strategist
This prompt transforms AI into a specialized web application penetration testing strategist, guiding users through comprehensive attack planning, vulnerability assessment, and exploitation roadmap development. It delivers actionable security intelligence tailored to specific target applications, helping security professionals, bug bounty hunters, and red team operators approach web app assessments with methodical precision.
AI SOC2 Access Control Policy Generator
This prompt transforms you into a compliance architect, generating comprehensive, legally defensible Access Control Policies that satisfy SOC 2, ISO 27001, and NIST requirements. It produces implementation-ready documentation including provisioning workflows, privilege matrices, and technical control specifications tailored to your specific environment.
AI ISO27001 Policy Draft
This prompt template enables security professionals, compliance officers, and IT leaders to rapidly produce detailed, regulation-compliant ISO27001 policy documents. It structures output to meet certification requirements while allowing customization for organizational context, risk appetite, and specific control implementations.
ISO 27017 Cloud Security Compliance Guide Generator
This prompt transforms AI into an expert ISO 27017 consultant and cloud security architect, producing comprehensive compliance guides that map international standards to specific cloud environments. It delivers actionable gap analyses, control implementation playbooks, and audit-ready documentation tailored to your organization's service model, provider, and regulatory context.
AI SOC2 Monitoring and Logging Compliance Guide
This prompt helps security engineers, CISOs, and compliance officers create comprehensive monitoring and logging documentation aligned with SOC2 requirements. It generates actionable frameworks for audit trail management, security event detection, and continuous evidence collection across all five Trust Services Criteria.
ISO 27001:2022 Access Control Policy Generator
This prompt helps information security professionals and compliance officers create detailed Access Control Policies that satisfy ISO 27001:2022 requirements. It generates structured documentation covering user provisioning, privileged access, authentication standards, and review cycles tailored to your organization's specific context and risk profile.
AI Network Pivot Planner
This prompt helps security professionals and red team operators map efficient network traversal routes from compromised entry points to high-value targets. It generates comprehensive pivot plans that consider network topology, protocol vulnerabilities, operational security requirements, and detection avoidance while suggesting appropriate tools and techniques for each movement phase.
AI User Access Reviewer
This prompt transforms your AI into a specialized security analyst that systematically reviews user access rights, identifies privilege escalations, detects dormant accounts, and flags violations against your organization's security policies. It generates actionable remediation reports with risk scoring and compliance mapping to streamline your access certification campaigns.
ISO27001 Security Awareness Training Generator
This prompt helps security managers, compliance officers, and HR teams generate tailored ISO27001:2022 awareness training materials for any organizational level. It produces interactive content including real-world scenarios, knowledge assessments, and Annex A control mappings that ensure staff understand their information security responsibilities while satisfying certification audit requirements.
AI Forensic Analysis Planner
This prompt transforms AI into a senior digital forensic investigator that creates structured, phase-by-phase analysis plans. It ensures proper evidence handling, chain of custody protocols, and methodology selection while accounting for legal requirements and system constraints.
AI-Powered Network Security Monitor & Threat Analyzer
This prompt configures an AI to function as an advanced Security Operations Center (SOC) analyst, capable of parsing complex network traffic data, identifying sophisticated cyber threats, and providing prioritized remediation strategies. It helps security teams reduce mean time to detection (MTTD) and respond faster to potential breaches while maintaining compliance standards.
Enterprise Backup Verification & Recovery Testing Planner
This prompt generates a comprehensive backup verification strategy tailored to your infrastructure, compliance requirements, and recovery objectives. It creates actionable test schedules, integrity validation procedures, and failure escalation protocols to eliminate silent backup failures and ensure business continuity.