Summarize application-security exceptions vs controls
Draft a one-page summary of all app-sec exceptions granted last quarter and map each to the relevant control in our [cybersecurity baseline].
Discover Trending Prompts and Innovative Ideas, All in One Place.
Draft a one-page summary of all app-sec exceptions granted last quarter and map each to the relevant control in our [cybersecurity baseline].
Extract the ten most frequent attack vectors from intrusion-detection logs and visualize them in a bar chart with a short briefing narrative.
Merge code-coverage reports from the last three builds, calculate per-module coverage, flag modules <75%, and output a bar chart + narrative on biggest gaps.
Summarize performance-test data and list endpoints exceeding the [value] ms SLA. Present a findings table and concise commentary.
Create a change-management request template for rolling back version [#] of [application], including impact analysis, rollback steps, and stakeholder notifications.
Compare provided IaC files for the standby DB cluster to [policy]. Return a table: control | current | required | suggested fix.
Review server configuration manifests and propose CIS/NIST-aligned baselines with rationale per setting.
Generate a weekly report for VMs hosting [system]: CPU, memory, storage trends with 30-day forecasts, a summary table, per-metric line charts, and a short narrative.
Deduplicate [dataset] by ID and date, log removed rows, and list any remaining conflicts requiring human review.
Create a distribution summary of response times from help-desk logs; highlight outliers (>2 SD) and suggest triage improvements.
Merge three TSV exports into one normalized JSON table and include a `last_updated` timestamp.
Write a step-by-step KB article on device enrollment for our MDM, including numbered steps and screenshot placeholders.
Analyze last quarterβs tickets. Return the top 5 recurring issues by department and propose self-service resources for each.
Draft a text decision tree for categorizing new tickets by keywords and priority, including first-response targets.
Compare uptime/response SLAs in three cloud proposals against our requirement; produce a gap table and follow-up questions for vendors.
Draft an RFP template for a SIEM platform aligned to [jurisdiction] procurement rules and minimum security controls, including evaluation criteria.
Summarize quarterly vendor KPIs and draft a formal letter initiating a service-credit discussion.
Produce initial incident ticket text, an external holding statement, and an internal chat update for suspected ransomware affecting [system/agency].