GPT-4o
⚙️ Technical
Advanced
Create Cybersecurity Audit Guide
Write a step-by-step cybersecurity audit guide covering scope, methodology, controls, and reporting.
The Prompt
# Create a Cybersecurity Audit Guide You are a certified cybersecurity auditor (CISA, CISSP) and information security consultant. Write a comprehensive cybersecurity audit guide. ## Audit Details - **Organization Type:** [ORG_TYPE] (e.g., small business, mid-market enterprise, healthcare organization, financial services firm, government agency) - **Audit Scope:** [SCOPE] (e.g., full IT environment, cloud infrastructure only, specific application, third-party vendor assessment) - **Audit Standard / Framework:** [FRAMEWORK] (e.g., NIST CSF, ISO 27001, SOC 2, HIPAA, PCI DSS, CIS Controls) - **Audit Team:** [TEAM] (internal audit team, external auditor, combined) - **Audit Duration:** [DURATION] - **Compliance Objective:** [OBJECTIVE] (e.g., first audit, annual compliance, incident follow-up, certification prep) ## Audit Guide ### Section 1: Audit Planning **Scope Definition** - Assets in scope: networks, systems, applications, data stores, physical locations - Assets explicitly out of scope (and why) - Regulatory and compliance requirements applicable to [ORG_TYPE] **Audit Team Roles & Responsibilities** - Lead auditor, technical tester, documentation specialist, business liaison - Rules of engagement document template **Documentation to Request Before Audit** Checklist of pre-audit documentation: - [ ] Network topology diagrams - [ ] Asset inventory (hardware and software) - [ ] Security policies and procedures - [ ] Previous audit reports and remediation tracking - [ ] Vendor and third-party contracts - [ ] Incident response plan - [ ] Business continuity / disaster recovery plan - [ ] [Additional items specific to [FRAMEWORK]] ### Section 2: Audit Methodology **Phase 1: Discovery (Days 1-X)** - Asset enumeration techniques - Network scanning approach (passive vs. active) - Interviews: who to interview and key questions **Phase 2: Technical Assessment (Days X-X)** - Vulnerability scanning: tools and configuration - Penetration testing scope (if included) - Configuration review: firewalls, servers, endpoints, cloud - Log review and SIEM analysis - Access control and identity review **Phase 3: Process & Control Review (Days X-X)** - Policy review against [FRAMEWORK] requirements - Interview-based control effectiveness testing - Evidence collection and documentation **Phase 4: Reporting (Days X-X)** - Finding classification: Critical / High / Medium / Low / Informational - Report drafting and review process - Remediation recommendations ### Section 3: Control Assessment Checklists For each major domain under [FRAMEWORK], provide a checklist: **Domain: Access Control** - [ ] Multi-factor authentication enforced for all privileged accounts - [ ] Principle of least privilege applied - [ ] Access reviews conducted at least annually - [ ] Privileged Access Management (PAM) solution in place - [ ] [Additional controls from [FRAMEWORK]] **Domain: Network Security** [Checklist items] **Domain: Data Protection** [Checklist items] **Domain: Incident Response** [Checklist items] **Domain: Vendor / Third-Party Risk** [Checklist items] ### Section 4: Findings Report Template **Executive Summary:** Non-technical overview, risk posture assessment, top 3 critical findings **Finding Template:** - Finding ID: [ID] - Title: [TITLE] - Severity: [CRITICAL/HIGH/MEDIUM/LOW] - Description: [WHAT_WAS_FOUND] - Evidence: [HOW_IT_WAS_FOUND] - Risk: [BUSINESS_IMPACT_IF_EXPLOITED] - Recommendation: [HOW_TO_FIX] - Remediation Timeline: [URGENCY] - Compensating Controls: [INTERIM_MITIGATIONS] **Risk Register Summary Table** | ID | Finding | Severity | System | Owner | Due Date | Status | |---|---|---|---|---|---|---| ### Section 5: Post-Audit Remediation Tracking - Remediation prioritization framework - Follow-up assessment schedule - Progress reporting template for management Deliver a complete audit guide ready for immediate use by an audit team.
📝 Fill in the blanks
Replace these placeholders with your own content:
[ORG_TYPE]
[SCOPE]
[FRAMEWORK]
[TEAM]
[DURATION]
[OBJECTIVE]
[ ]
[Additional items specific to [FRAMEWORK]
[Additional controls from [FRAMEWORK]
[Checklist items]
[ID]
[TITLE]
[CRITICAL/HIGH/MEDIUM/LOW]
[WHAT_WAS_FOUND]
[HOW_IT_WAS_FOUND]
[BUSINESS_IMPACT_IF_EXPLOITED]
[HOW_TO_FIX]
[URGENCY]
[INTERIM_MITIGATIONS]
How to use this prompt
1
Copy the prompt
Click "Copy Prompt" above to copy the full prompt text to your clipboard.
2
Replace the placeholders
Swap out anything in [BRACKETS] with your specific details.
3
Paste into GPT-4o
Open your preferred AI assistant and paste the prompt to get started.