π Security Tool Cheatsheet
Alex Morgan — Senior Penetration Tester
Why AI Changes the Game for Cybersecurity
The use of Artificial Intelligence (AI) in cybersecurity has revolutionized how analysts approach threats, automate tasks, and enhance overall security posture. AI tools like ChatGPT, Claude, and others can assist in everything from threat intelligence gathering to incident response. This makes proficiency with AI prompts essential for security professionals.
Before You Start: How to Set Context Properly
Setting a context is crucial for receiving tailored, relevant responses from AI tools. Here are a few tips:
- Define the Role: Specify the type of assistant you want the AI to role-play (e.g., a cybersecurity expert).
- Specify the Task: Clearly articulate what you want assistance with (e.g., “help me analyze a security breach”).
- Provide Background Information: Include any relevant data or context that can help the AI generate a precise response.
Core Prompts Cheatsheet
What it does: This prompt generates a comprehensive plan outlining steps for incident response.
When to use it: When faced with a phishing incident and needing a structured response.
How to customize it: Add specific organization details or compliance requirements.
What it does: Generates a list of common vulnerabilities and their mitigative measures.
When to use it: During application security assessments.
How to customize it: Modify the request to focus on a specific environment (e.g., mobile apps, APIs).
What it does: Creates a formal policy document for MFA implementation.
When to use it: When updating or enforcing security policies.
How to customize it: Add executive summaries or specific scenarios that necessitate MFA.
What it does: Provides a curated list of tools and their functionalities.
When to use it: When selecting or reviewing tools for insider threat detection.
How to customize it: Specify industry or organization size to get tailored recommendations.
What it does: Generates a risk assessment of a third-party service’s security.
When to use it: Before onboarding a new external service provider.
How to customize it: Include specific security protocols or compliance needs.
What it does: Crafts a communication piece to educate staff on password security.
When to use it: During training cycles or security awareness campaigns.
How to customize it: Tailor the message to include company-specific policies or recent breaches.
What it does: Lists applicable frameworks, like NIST or CIS.
When to use it: When consulting small businesses for security enhancements.
How to customize it: Add constraints like budget or industry type.
What it does: Identifies and explains prevalent cloud security issues.
When to use it: In cloud security audits.
How to customize it: Specify cloud provider for tailored recommendations.
What it does: Outlines a simple pentest methodology.
When to use it: Preparing for a pentesting engagement.
How to customize it: Specify the tools you prefer or the application’s framework.
What it does: Creates a template for responding to ransomware incidents.
When to use it: When updating or creating incident response protocols.
How to customize it: Tailor based on organizational structure and specific incidents.
Weak vs Strong Prompt Examples
Advanced Prompt Techniques
These techniques can greatly enhance the quality of your AI interactions:
- Role Prompting: Define a specific role (e.g., “You are a cybersecurity strategist…”).
- Chain-of-Thought: Break down complex problems into a series of logical steps.
- Few-Shot Examples: Provide examples of what youβre looking for to guide the AI’s output.
- Output Formatting: Specify how you want the output to be structured (e.g., bullet points for clarity).
Claude vs ChatGPT: Which Works Better For This
Both Claude and ChatGPT have strengths:
- ChatGPT: Better for conversational dynamism and detail.
- Claude: Stronger at providing structured outputs and concise information.
Tips for Getting Consistent Results
To consistently receive high-quality responses:
- Be Specific: More detail leads to better, actionable outputs.
- Iterative Refinement: Use initial responses to refine further queries.
- Contextual Relevance: Always tie prompts back to ongoing projects or tasks for relevance.
Quick Reference: All Prompts in One Place
- Generate detailed incident response plan for phishing attack.
- List top ten OWASP vulnerabilities and mitigation strategies.
- Draft internal security policy for multi-factor authentication.
- Best tools for detecting insider threats.
- Analyze security implications of a new service.
- Draft security awareness email on passwords.
- List applicable cybersecurity frameworks for small businesses.
- Outline common cloud security misconfigurations.
- Show how to do a basic penetration test.
- Draft ransomware attack response plan template.