Security Hardening Implementation

D

Daniel Okoye

@daniel-okoye

·

Break down security hardening into prioritized implementation tasks.

29 copies0 forks
Share this prompt:
Decompose security hardening for this system into prioritized implementation tasks:

System Overview:
{{system_overview}}

Current Security Posture:
{{security_assessment}}

Compliance Requirements:
{{compliance_requirements}}

Break down into implementation phases:

1. IMMEDIATE FIXES (Week 1)
   - Critical vulnerability patches
   - Default credential rotation
   - Exposed endpoint lockdown

2. AUTHENTICATION HARDENING (Week 2-3)
   - MFA implementation
   - Session management
   - Password policy enforcement

3. AUTHORIZATION LAYER (Week 3-4)
   - RBAC implementation
   - Least privilege enforcement
   - API key rotation

4. DATA PROTECTION (Week 4-5)
   - Encryption at rest
   - Encryption in transit
   - Key management setup

5. MONITORING AND DETECTION (Week 5-6)
   - Audit logging
   - Intrusion detection
   - Alert configuration

For each task provide:
- Implementation steps
- Testing procedure
- Rollback plan
- Verification checklist

Details

Category

Coding

Use Cases

Security roadmap creationCompliance implementation planningVulnerability remediation tracking

Works Best With

claude-opus-4.5gpt-5.2gemini-2.0-flash
Created Updated Shared

Related Prompts

Create your own prompt vault and start sharing