Decompose security hardening for this system into prioritized implementation tasks: System Overview: {{system_overview}} Current Security Posture: {{security_assessment}} Compliance Requirements: {{compliance_requirements}} Break down into implementation phases: 1. IMMEDIATE FIXES (Week 1) - Critical vulnerability patches - Default credential rotation - Exposed endpoint lockdown 2. AUTHENTICATION HARDENING (Week 2-3) - MFA implementation - Session management - Password policy enforcement 3. AUTHORIZATION LAYER (Week 3-4) - RBAC implementation - Least privilege enforcement - API key rotation 4. DATA PROTECTION (Week 4-5) - Encryption at rest - Encryption in transit - Key management setup 5. MONITORING AND DETECTION (Week 5-6) - Audit logging - Intrusion detection - Alert configuration For each task provide: - Implementation steps - Testing procedure - Rollback plan - Verification checklist
Security Hardening Implementation
Break down security hardening into prioritized implementation tasks.
29 copies0 forks
Share this prompt:
Details
Category
CodingUse Cases
Security roadmap creationCompliance implementation planningVulnerability remediation tracking
Works Best With
claude-opus-4.5gpt-5.2gemini-2.0-flash
Created Updated Shared