PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
(gemini-3.1-pro)
Token size
267
Example input
[Threat Scenario]: Ransomware encryption detected on primary database [Affected Infrastructure]: Customer SQL Database Cluster [Compliance Framework]: NIST CSF
Example output
# Incident Response & Defense Plan ## 1. Threat Detection & Analysis The ransomware encryption indicates a severe breach of the Customer SQL Database Cluster. Initial analysis suggests unauthorized lateral movement culminating in payload execution. We must immediately isolate the cluster to prevent network-wide propagation and preserve volatile memory for forensic analysis. ## 2. Containment Strategy - Disconnect the SQL Database Cluster from the main corporate network and internet. - Disable all compromised user accounts associated with the anomalous database queries. - Reroute legitimate traffic to the read-only disaster recovery site to maintain partial business continuity. ## 3. Eradication & Recovery - Wipe the affected servers and rebuild the OS from known clean, golden images. - Restore database records from the most recent offline, immutable backup. - Deploy enhanced Endpoint Detection and Response (EDR) agents before reconnecting to the network. ## 4. Compliance Alignment & Hardening - **Protect (PR.AC-3):** Enforce strict network segmentation and Principle of Least Privilege for database access. - **Respond (RS.CO-2):** Report the incident to relevant stakeholders and legal teams as per the communication plan. - **Recover (RC.RP-1):** Update the disaster recovery plan based on lessons learned to reduce future recovery time.
♊️ Gemini

Blue Team Incident Response Simulators

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
GEMINI-3.1-PRO
Tested icon
Guide icon
4 examples icon
Free credits icon
Struggling to train your Blue Team or draft compliant Incident Response (IR) plans? This prompt acts as a Senior Cybersecurity Analyst, generating comprehensive, defense-focused mitigation strategies. It analyzes simulated threat scenarios, provides actionable containment steps, and ensures strict alignment with frameworks like NIST or ISO 27001. Strictly designed for defensive hardening, making it a safe and essential tool for enterprise security professionals and corporate training.
...more
Added over 1 month ago
Report
Browse Marketplace