🔐 Cybersecurity Copilot Prompt Templates 🔐

Use these structured prompt templates to quickly customize and optimize your cybersecurity tasks. Fill in the placeholders to suit your specific needs. Click **Copy** for quick use!

🔴 Red Team (Offensive Security)

Template: "Simulate a [specific attack] against [target system] to evaluate [security aspect]. Include [tools, techniques, or constraints]."
Instructions: - **Specific attack:** Phishing, SQL Injection, Social Engineering - **Target system:** Web app, Network, Internal database - **Security aspect:** Response time, Vulnerability assessment - **Tools:** Metasploit, Burp Suite, Custom scripts

🔵 Blue Team (Defensive Security)

Template: "Develop a defense strategy for [specific threat] targeting [system or environment]. Focus on [detection methods, mitigation techniques]."
Instructions: - **Specific threat:** Ransomware, DDoS, Insider threat - **System or environment:** Cloud infrastructure, On-prem network - **Detection methods:** SIEM monitoring, Anomaly detection - **Mitigation techniques:** Network segmentation, MFA, Firewalls

⚙️ Automation & Scripting

Template: "Create a script to automate [security task] in [language]. Use [specific libraries or tools] and output [desired results]."
Instructions: - **Security task:** Log analysis, Vulnerability scanning - **Language:** Python, PowerShell, Bash - **Libraries or tools:** Requests, PyShark, Nmap - **Desired results:** Summary reports, Alerts, Visual data

🧩 Forensics & Incident Response

Template: "Design an incident response plan for [type of incident] involving [data type or system]. Address [containment, eradication, recovery]."
Instructions: - **Type of incident:** Data breach, Insider attack - **Data type or system:** Financial data, IoT devices - **Containment, eradication, recovery:** Quarantine hosts, Secure backups

☁️ Cloud Security

Template: "Create a secure configuration plan for [cloud service] addressing [vulnerabilities or misconfigurations]. Ensure compliance with [regulatory standards]."
Instructions: - **Cloud service:** AWS, Azure, GCP - **Vulnerabilities:** Open S3 buckets, Weak IAM policies - **Regulatory standards:** GDPR, HIPAA, ISO 27001

Fill in the placeholders for targeted and efficient cybersecurity workflows. Happy securing! 🔐