Prompt Details
Model
(gemini-3.1-pro)
Token size
267
Example input
[Threat Scenario]: Ransomware encryption detected on primary database
[Affected Infrastructure]: Customer SQL Database Cluster
[Compliance Framework]: NIST CSF
Example output
# Incident Response & Defense Plan
## 1. Threat Detection & Analysis
The ransomware encryption indicates a severe breach of the Customer SQL Database Cluster. Initial analysis suggests unauthorized lateral movement culminating in payload execution. We must immediately isolate the cluster to prevent network-wide propagation and preserve volatile memory for forensic analysis.
## 2. Containment Strategy
- Disconnect the SQL Database Cluster from the main corporate network and internet.
- Disable all compromised user accounts associated with the anomalous database queries.
- Reroute legitimate traffic to the read-only disaster recovery site to maintain partial business continuity.
## 3. Eradication & Recovery
- Wipe the affected servers and rebuild the OS from known clean, golden images.
- Restore database records from the most recent offline, immutable backup.
- Deploy enhanced Endpoint Detection and Response (EDR) agents before reconnecting to the network.
## 4. Compliance Alignment & Hardening
- **Protect (PR.AC-3):** Enforce strict network segmentation and Principle of Least Privilege for database access.
- **Respond (RS.CO-2):** Report the incident to relevant stakeholders and legal teams as per the communication plan.
- **Recover (RC.RP-1):** Update the disaster recovery plan based on lessons learned to reduce future recovery time.
By purchasing this prompt, you agree to our terms of service
GEMINI-3.1-PRO
Struggling to train your Blue Team or draft compliant Incident Response (IR) plans? This prompt acts as a Senior Cybersecurity Analyst, generating comprehensive, defense-focused mitigation strategies. It analyzes simulated threat scenarios, provides actionable containment steps, and ensures strict alignment with frameworks like NIST or ISO 27001. Strictly designed for defensive hardening, making it a safe and essential tool for enterprise security professionals and corporate training.
...more
Added over 1 month ago
