AI Prompts Cheatsheet for Security Analysts

๐Ÿ›  Security Tool Cheatsheet

Alex Morgan — Senior Penetration Tester

Why AI Changes the Game for Security Analysts

AI tools like ChatGPT, Claude, and others can significantly enhance a security analyst’s capabilities. They can automate report generation, assist in log analysis, and even help craft incident response plans with precision. Effective use of AI can lead to quicker decision-making and improved security posture.

Before You Start: How to Set Context Properly

To get the most out of AI, it’s essential to set the context. This involves defining the scope of the task, clearly indicating what you’re looking to achieve, and sometimes even providing a specific format you prefer for the output.

Core Prompts Cheatsheet

“Analyze the security logs from my SIEM and identify potential anomalies or threats. Include timestamps and possible data leakage risks.”

This prompt directs the AI to pull insights from a variety of security logs, making it useful for monitoring activities or potential threats.

“Create an incident response plan for a SQL injection attack targeting a web application. Outline steps for identification, containment, eradication, and recovery.”

Use this prompt to generate a detailed incident response plan tailored to a specific type of attack, which is crucial for preparedness.

“Summarize the latest CVEs affecting web servers in the last month. Provide severity ratings and mitigation strategies.”

This helps keep you informed about the latest vulnerabilities, making it easier to prioritize security updates.

“Outline best practices for employee training on phishing techniques. Provide a list of doโ€™s and donโ€™ts.”

Use this to develop more effective security training programs, focusing on real-world scenarios that employees might face.

“Draft a phishing simulation email for training purposes, including telltale signs that employees should be on the lookout for.”

Aim at training employees to recognize phishing by providing them fake examples that mimic common tactics used in real phishing attacks.

“Generate a checklist for securing a cloud environment, covering key areas like IAM, network security, and data encryption.”

This serves as a useful guideline for ensuring that cloud resources are set up securely, highlighting critical areas to focus on.

“Explain the MITRE ATT&CK framework and how it can be applied to incident response planning.”

Provides a concise explanation of a widely-used framework that can bolster your incident response strategies significantly.

“List and explain the top 5 tools popular among security analysts for incident detection and response.”

Helps keep you up-to-date with tools that can improve your teamโ€™s efficiency and response times.

Weak vs Strong Prompt Examples

โŒ Weak: “Tell me about security.”
โœ… Strong: “Summarize the latest trends in cybersecurity threats and defense mechanisms in 2023.”
โŒ Weak: “Explain phishing.”
โœ… Strong: “Describe the different types of phishing techniques used in 2023 and how organizations can defend against them.”

Advanced Prompt Techniques

To further enhance AI interactions, consider techniques such as:

  • Role Prompting: Tell the AI to assume a specific role. E.g., “Act as a cybersecurity expert and explain why multi-factor authentication is crucial.”
  • Chain-of-Thought: Encourage reasoning by asking, “What steps would you take to resolve a ransomware attack?”
  • Few-Shot Examples: Provide examples within your prompt for context. E.g., “Here are some examples of good incident response plans. Model one after these.”
  • Output Formatting: Specify how you want the output. E.g., “List the steps in bullet points for clarity.”

Claude vs ChatGPT: Which Works Better For This

Both Claude and ChatGPT have strengths in security-related queries. While Claude tends to offer more straightforward explanations, ChatGPT can provide deeper context and details on complex subjects. Choose based on whether you need a quick answer or a nuanced discussion.

Tips for Getting Consistent Results

Success with AI requires practice and adaptability:

  • Context Setting: Always define the context clearly to help the AI focus on the core task.
  • Specificity: The more specific you are, the better the output will match your needs.
  • Iterative Refinement: If the first response isnโ€™t what you need, refine your prompt based on the AIโ€™s output.

Quick Reference: All Prompts in One Place

  1. “Analyze the security logs from my SIEM and identify potential anomalies or threats.”
  2. “Create an incident response plan for a SQL injection attack targeting a web application.”
  3. “Summarize the latest CVEs affecting web servers in the last month.”
  4. “Outline best practices for employee training on phishing techniques.”
  5. “Draft a phishing simulation email for training purposes.”
  6. “Generate a checklist for securing a cloud environment.”
  7. “Explain the MITRE ATT&CK framework and how it can be applied to incident response planning.”
  8. “List and explain the top 5 tools popular among security analysts.”