IT & Security Prompts to Build or Create Something
Create repeatable playbooks for common alerts with roles, data collection, investigation checks, escalation triggers.
Assess and design network segmentation to limit lateral movement. Map flows, classify assets, define inter-zone rules.
Harden cloud infrastructure against misconfigurations. Review IAM, compute security, storage encryption, networking, logging.
Define and implement encryption standards for data in transit and at rest to meet regulatory and security needs.
Develop security policies that establish governance and control requirements. Define scope, requirements, roles, consequences.
Design vendor risk assessment framework with tiers, questionnaires, risk evaluation, onboarding, monitoring, offboarding.
Develop incident response plan with roles, escalation path, response phases, communications, forensics, testing.
Design security training and awareness program segmented by role, testing learning, measuring behavior change.
Establish governance structure for security decisions: approval authority, escalation paths, review cadence, documentation.
Design secure password reset with identity verification, complexity enforcement, session invalidation, logging.
Create talking script for educating users about social engineering attacks and red flags.
Create training on acceptable use of IT systems and consequences of policy violations.
Design access request workflow: self-service portal, auto-approval rules, manager/app owner approvals, security review.
Design role-based access control with roles aligned to job functions, permissions mapping, governance, least privilege.
Implement privileged access management with credential vault, rotation, session recording, approval, JIT access, MFA.
Implement multi-factor authentication with phased rollout, user enrollment, recovery procedures, backup codes.
Establish secure code review: checklist, reviewer training, peer review, security review, automated scanning, feedback.
Integrate static analysis into CI/CD: tool selection, configuration, pipeline integration, quality gates, reporting.
Showing 18 of 34