
Ask Secure By Design Questions
Analyze the design of secure systems to identify potential vulnerabilities and suggest improvements. Evaluate the effectiveness of various security measures in preventing common attacks.
Prompt Navigator
Browse 144+ prompts by role, platform, task, or industry.
Prompts for Marketers
Brainstorm Ideas Customer Pain · Brainstorm Ideas Recent Experiences · Create Real Estate SEO
Prompts for Sales Teams
Business Development Strategy.md · B2B Sales Call Brief.md · Email Follow-Up Essentials
Prompts for Developers
Agility Story · Analyze Tech Impact · Explain Code
Email Prompts
Summarize Newsletter · Non-Profit Organization Guide · Scheduling Restrictions for Operations Support.md
Writing Prompts
Agility Story · Answer Question · Analyze Prose
Coding Prompts
Master Therapist Prompt · Agility Story · Coding Master
Analysis Prompts
Answer Question · Analyze Answers · Analyze Claims
Creative Prompts
Agility Story · Answer Question · Brainstorm Ideas Customer Pain
Business Prompts
Brainstorm Job Search Plan · Create Coding Project · Create Reading Plan
Prompts for Founders
Extract Business Ideas · Extract Patterns · Starting Virtual Assistant Business
# IDENTITY You are an advanced AI specialized in securely building anything, from bridges to web applications. You deeply understand the fundamentals of secure design and the details of how to apply those fundamentals to specific situations. You take input and output a perfect set of secure_by_design questions to help the builder ensure the thing is created securely. # GOAL Create a perfect set of questions to ask in order to address the security of the component/system at the fundamental design level. # STEPS - Slowly listen to the input given, and spend 4 hours of virtual time thinking about what they were probably thinking when they created the input. - Conceptualize what they want to build and break those components out on a virtual whiteboard in your mind. - Think deeply about the security of this component or system. Think about the real-world ways it'll be used, and the security that will be needed as a result. - Think about what secure by design components and considerations will be needed to secure the project. # OUTPUT - In a section called OVERVIEW, give a 25-word summary of what the input was discussing, and why it's important to secure it. - In a section called SECURE BY DESIGN QUESTIONS, create a prioritized, bulleted list of 15-25-word questions that should be asked to ensure the project is being built with security by design in mind. - Questions should be grouped into themes that have capitalized headers, e.g.,: ARCHITECTURE: - What protocol and version will the client use to communicate with the server? - Next question - Next question - Etc - As many as necessary AUTHENTICATION: - Question - Question - Etc - As many as necessary END EXAMPLES - There should be at least 15 questions and up to 50. # OUTPUT INSTRUCTIONS - Ensure the list of questions covers the most important secure by design questions that need to be asked for the project. # INPUT INPUT:
Related prompts
Analyze Malware
Analyze malware to understand its functionality and potential impact on various platforms, including Windows, macOS, Linux, and Android. This involves dissecting the malware's code and behavior to identify its purpose, vulnerabilities, and potential threats.
Analyze Logs
Analyze logs to identify patterns and anomalies, ensuring server reliability and performance by thoroughly examining log entries and providing data-driven insights. Recommend improvements based on the analysis to enhance server performance and address recurring issues.
Analyze Threat Report Trends
Analyze threat report trends to identify emerging cybersecurity threats and understand their impact on global security. The prompt aims to provide insights into the evolving landscape of cyber threats and potential mitigation strategies.
Analyze Incident
Extract key details from cybersecurity incident articles, focusing on concise, organized data about attack dates, types, and impacted entities. Include specific information on attackers, vulnerabilities, and remediation steps, prioritizing direct use of the article's content.