Skip to content

RiskResponse/prompts-sec-comp

Repository files navigation

SOC 2 & Security Compliance Prompts

A collection of AI prompts and templates for generating security compliance documentation, with a focus on SOC 2 System Descriptions and Incident Reports.


πŸ“ Repository Contents

🎯 SOC 2 System Description

Main Prompt

  • soc2-system-desc-writer.txt (800 lines)
    • Comprehensive AI prompt for generating SOC 2 system descriptions
    • Structured YAML input schema for systematic information gathering
    • 10-part output structure (8 required + 2 optional sections)
    • Built-in quality checks, guardrails, and common pitfalls guide
    • Explicit TSC mapping requirements and control statement templates
    • Report parameters section (Type I/II, TSC scope, carve-out vs. inclusive)
    • Control statement templates with good/bad examples
    • Revision checklists and validation criteria

Supporting Materials

  • soc2-system-desc-sample-input.yaml (690 lines)

    • Comprehensive YAML template with fictional company "Acme Software Inc."
    • Realistic SaaS platform scenario with complete details
    • Covers all sections: company info, infrastructure, security ops, data, governance
    • Shows proper formatting for subservice organizations, controls summary, and CUECs
    • Demonstrates how to specify frequencies, owners, and TSC mappings
    • Use as a template for your own SOC 2 system descriptions
  • soc2-system-desc-info-gathering-checklist.md (496 lines)

    • Essential pre-work checklist for collecting information before writing
    • Organized by topic: company info, infrastructure, security operations, data, governance
    • 200+ specific questions to ask stakeholders
    • Identifies which documents to request (policies, diagrams, reports)
    • Lists key stakeholders to interview
    • Includes tips for effective information gathering
    • Start here before using the prompt

🚨 Incident Report Writer

  • ir-report-writer.txt (145 lines)
    • AI prompt for generating cybersecurity incident reports
    • Follows NIST Incident Response Lifecycle framework
    • Structured 6-part report format (Executive Summary, Details, Impact, Root Cause, Response, Recommendations)
    • Includes methodology for systematic incident analysis
    • Professional tone guidelines for technical and executive audiences

πŸš€ Quick Start Guide

For SOC 2 System Description

Step 1: Gather Information (2-4 weeks)

# Start with the checklist
open soc2-system-desc-info-gathering-checklist.md
  • Conduct stakeholder interviews (CISO, CTO, DevOps Lead, IT Manager, Compliance Manager)
  • Request policies, diagrams, and assessment reports
  • Document specific frequencies, thresholds, and SLAs
  • Use the checklist to ensure nothing is missed

Step 2: Prepare YAML Input

# Copy the sample as a starting point
cp soc2-system-desc-sample-input.yaml your-company-input.yaml
  • Fill in your company's specific information
  • Use [PLACEHOLDER: description] for unknowns
  • Be specific about frequencies ("quarterly" not "regularly")
  • Include actual numbers, timelines, and tool names

Step 3: Generate System Description

  • Use soc2-system-desc-writer.txt as your AI prompt
  • Paste your YAML input at the bottom where indicated
  • Attach supporting documents (policies, diagrams) if available
  • Review output for placeholders and quality

Step 4: Iterate and Refine

  • Address all [PLACEHOLDER] tags by gathering missing information
  • Review with stakeholders for accuracy
  • Validate control statements are testable and verifiable
  • Share early draft with auditor for feedback
  • Update YAML and regenerate as needed

For Incident Reports

Step 1: Prepare Incident Information

  • Gather logs, alerts, and forensic evidence
  • Document timeline of events
  • Identify affected systems and impact
  • Collect any preliminary investigation findings

Step 2: Generate Report

  • Use ir-report-writer.txt as your prompt
  • Fill in business context (services, location, compliance obligations)
  • Provide incident details and evidence
  • Review output for completeness and accuracy

🎯 Key Features of the SOC 2 Prompt

1. Structured YAML Input Schema

  • Comprehensive data model covering all system description requirements
  • Pre-defined fields for company, infrastructure, security, data, governance
  • Built-in placeholders system for tracking missing information
  • Easy to update incrementally as you gather more details
  • Supports complex scenarios (multiple subservices, AI providers, cloud-native)

2. Report Parameters Section

Explicitly define upfront:

  • Report Type: Type I (design) or Type II (design + operations)
  • TSC in Scope: Security (required) + optional Availability, Processing Integrity, Confidentiality, Privacy
  • Subservice Method: Carve-out (typical) or Inclusive
  • Audit Period: Date range for Type II audits

3. 10-Part Output Structure

The prompt generates a complete system description with:

  1. Company Overview and Services Provided
  2. System Boundaries (in-scope and out-of-scope)
  3. Subservice Organizations
  4. Principal Service Commitments and System Requirements
  5. System Components (Infrastructure, Software, People, Data, Policies)
  6. Internal Controls (Environment, Risk, Communication, Monitoring, Activities)
  7. Complementary Subservice Organization Controls (CSOCs)
  8. Complementary User Entity Controls (CUECs)
  9. Disclosures (optional - incidents, significant changes)
  10. Criteria Not Relevant (optional - TSC not applicable)

4. Quality Assurance Built-In

  • Revision and quality check checklists
  • Common pitfalls with ❌/βœ… examples
  • Toggles and guardrails to prevent errors
  • TSC mapping requirements and validation
  • Control statement templates with good/bad examples
  • Consistency checks across sections

5. Modern Architecture Support

  • Handles multiple AI service providers (Anthropic, OpenAI, etc.)
  • Cloud-native infrastructure (AWS, Azure, GCP)
  • API-first and serverless architectures
  • Event-driven systems
  • Multiple subservice organizations with different attestation types

πŸ’‘ Best Practices

Information Gathering

  1. Start Early: Allow 2-4 weeks for comprehensive information gathering
  2. Interview Key Stakeholders: CISO, CTO, DevOps Lead, IT Manager, Compliance Manager, Legal
  3. Request Evidence: Don't just ask what they do - ask to see logs, screenshots, tickets, or reports
  4. Be Specific: Push for exact frequencies, thresholds, and timelines (not "regularly" or "promptly")
  5. Cross-Reference: Verify information consistency across stakeholders and documents
  6. Document Gaps: Use [PLACEHOLDER] tags to track missing information

Writing System Descriptions

  1. Avoid Marketing Language: No "best-in-class," "cutting-edge," "world-class," or superlatives
  2. Be Precise: "Quarterly" not "regularly," "within 24 hours" not "promptly," "7 days" not "quickly"
  3. Write Testable Controls: Specify who does what, when, how, and with what tools
  4. Third Person: "[Company Name] implements..." not "We implement..."
  5. Present Tense Only: Only describe controls currently implemented, not planned or aspirational
  6. Specific Numbers: Include actual frequencies, SLAs, thresholds, retention periods, team sizes

Working with Auditors

  1. Share Early Drafts: Get auditor feedback before finalizing to avoid rework
  2. Flag Uncertainties: Better to have placeholders than incorrect statements
  3. Document Evidence: Note where evidence exists for each control (logs, tickets, reports)
  4. Maintain Consistency: Use same terminology throughout document
  5. Map to TSC: Explicitly map every control to applicable Trust Services Criteria
  6. Support Commitments: Ensure service commitments align with actual capabilities

πŸ” Understanding Trust Services Criteria (TSC)

Required for All SOC 2 Audits

Security (CC - Common Criteria) - Always required:

  • CC1: Control Environment
  • CC2: Communication and Information
  • CC3: Risk Assessment
  • CC4: Monitoring Activities
  • CC5: Control Activities
  • CC6: Logical and Physical Access Controls
  • CC7: System Operations
  • CC8: Change Management
  • CC9: Risk Mitigation

Optional Categories

Choose based on your services and customer requirements:

  • Availability (A) - System availability, uptime SLAs, and recovery capabilities
  • Processing Integrity (PI) - Data processing accuracy, completeness, and timeliness
  • Confidentiality (C) - Protection of confidential information beyond general security
  • Privacy (P) - Privacy practices and compliance (GDPR, CCPA, HIPAA, etc.)

Most organizations choose: Security + Availability as the baseline.


πŸ“Š File Structure

prompts-sec-comp/
β”œβ”€β”€ README.md                                      # This file
β”œβ”€β”€ ir-report-writer.txt                           # Incident report prompt
β”œβ”€β”€ soc2-system-desc-writer.txt                    # Main SOC 2 prompt
β”œβ”€β”€ soc2-system-desc-sample-input.yaml            # YAML template with examples
└── soc2-system-desc-info-gathering-checklist.md  # Pre-work checklist

πŸ“ YAML Input Schema Overview

The YAML input captures all information needed for the system description:

Company & Services

  • Basic company information
  • Services in scope
  • Business model and customers

System Boundary

  • In-scope: applications, infrastructure, people, procedures, data
  • Out-of-scope: explicit exclusions
  • Audit period (Type II)

Infrastructure & Technology

  • Cloud providers and services
  • Technology stack (software, tools, platforms)
  • Network architecture and segmentation
  • Environments and isolation

Security & Operations

  • Identity and access management
  • Security monitoring and logging
  • Vulnerability and patch management
  • Incident response procedures
  • Penetration testing

Data Management

  • Data types and classification
  • Data flows and storage
  • Encryption (in-transit and at-rest)
  • Retention and disposal
  • Backup and recovery (RTO/RPO)

Governance & Risk

  • Organizational structure and oversight
  • Policy framework
  • Risk management methodology
  • Compliance monitoring
  • Training programs

Service Commitments

  • Security commitments
  • Availability commitments (SLAs)
  • Processing integrity commitments
  • Confidentiality commitments
  • Privacy commitments

Controls & Responsibilities

  • Controls summary (with frequency, owner, TSC mapping)
  • Subservice organizations (with CSOCs)
  • Complementary user entity controls (CUECs)
  • Disclosures (incidents, changes)

πŸŽ“ Common Pitfalls to Avoid

❌ Don't Do This

  • "We have strong security controls" β†’ Too vague
  • "Access is reviewed regularly" β†’ What's "regularly"?
  • "We will implement MFA" β†’ Don't describe future plans
  • "Best-in-class security practices" β†’ Marketing language
  • "We monitor our systems" β†’ First person
  • Inconsistent terminology across sections
  • Missing TSC mappings for controls
  • Describing controls not actually implemented

βœ… Do This Instead

  • "User access reviews conducted quarterly by IT Manager with department head approval"
  • "Multi-factor authentication required for all administrative access via Okta"
  • "[Company Name] monitors production systems 24/7 via Datadog with 15-minute alert response SLA"
  • Specific frequencies, tools, roles, and processes
  • Third person throughout
  • Consistent terminology
  • Every control mapped to TSC
  • Only document implemented controls with evidence

πŸ“š Additional Resources

Referenced in Development

Recommended Reading

  • AICPA SOC 2 Reporting Framework - Official SOC 2 guidance
  • NIST Cybersecurity Framework (CSF) - Risk-based security framework
  • CIS Controls - Prioritized security best practices
  • ISO 27001 - Information security management standard

Tools & Platforms

Consider using GRC platforms to streamline compliance:

  • Vanta, Drata, Secureframe - Compliance automation
  • Jira, ServiceNow - Ticketing and change management
  • Confluence, Notion - Policy documentation
  • GitHub, GitLab - Version control and CI/CD

🀝 Contributing

This is a working repository for security compliance prompt development.

When Adding or Updating Prompts

  1. Test with Real Data: Use anonymized real-world examples to validate
  2. Document Changes: Explain why changes improve output quality
  3. Maintain Clarity: Keep instructions clear and examples specific
  4. Update README: Document new files and update usage instructions
  5. Version Thoughtfully: Significant changes warrant version updates

Contribution Areas

  • Additional compliance framework prompts (ISO 27001, HIPAA, PCI DSS)
  • Enhanced examples for specific industries
  • Additional checklists and templates
  • Improved YAML schema sections
  • Real-world case studies and usage patterns

πŸ“‹ Roadmap / Future Enhancements

Near-Term

  • Add diagram generation guidance (Mermaid syntax for architecture diagrams)
  • Include sample control testing procedures
  • Add evidence collection checklist aligned with controls
  • Create pre-audit readiness assessment template

Medium-Term

  • ISO 27001 Statement of Applicability (SoA) prompt
  • Risk Assessment Report generator
  • Business Continuity/Disaster Recovery Plan prompt
  • Policy Template Generator (dynamic policy creation)
  • HIPAA Security Rule documentation prompt

Long-Term

  • PCI DSS Self-Assessment Questionnaire (SAQ) prompt
  • NIST CSF assessment and gap analysis prompt
  • Control Testing Procedure generator
  • Vendor security assessment questionnaire generator
  • Security awareness training content generator

⚠️ Disclaimer

These prompts are tools to assist in documentation preparation. They do NOT replace:

  • ❌ Professional security expertise and experience
  • ❌ Qualified SOC 2 auditors and attestation services
  • ❌ Legal and compliance counsel
  • ❌ Actual implementation of security controls
  • ❌ Ongoing security operations and monitoring

Important Notes

  1. Review Required: Always have system descriptions reviewed by internal stakeholders, legal/compliance teams, and your SOC 2 auditor before finalization
  2. Accuracy Critical: You are responsible for the accuracy of information provided to the prompt and generated in the output
  3. Evidence Needed: Having a well-written system description doesn't mean controls are operating effectively - auditors will test with evidence
  4. Living Document: System descriptions should be updated as your systems, controls, and organization evolve

πŸ“ž Support & Usage

Getting Help

  1. Review the sample YAML (soc2-system-desc-sample-input.yaml) for formatting examples
  2. Use the checklist (soc2-system-desc-info-gathering-checklist.md) to ensure complete information gathering
  3. Check the prompt (soc2-system-desc-writer.txt) for built-in guidance and examples
  4. Validate output against the quality checklist included in the prompt

Common Questions

Q: Do I need to provide policy documents?
A: Helpful but not required. The YAML schema captures procedural details. Policies can validate and enrich during iteration.

Q: How long does information gathering take?
A: Typically 2-4 weeks for a comprehensive first-time SOC 2. Faster for renewals.

Q: Can I use this for SOC 2 Type I and Type II?
A: Yes! Specify the report type in the YAML report_parameters section.

Q: What if I don't know some information?
A: Use [PLACEHOLDER: description] in the YAML. The prompt will flag these for follow-up.

Q: How do I handle multiple cloud providers or AI services?
A: The YAML schema supports multiple subservice organizations with individual CSOCs.


πŸ“… Version History

October 21, 2025 - v1.0

  • βœ… Initial repository creation
  • βœ… SOC 2 System Description prompt with YAML input schema
  • βœ… Comprehensive sample YAML input (690 lines)
  • βœ… Information gathering checklist (496 lines)
  • βœ… Incident Report Writer prompt
  • βœ… Documentation and usage guidelines

πŸ“„ License

These prompts and templates are provided as-is for use in security compliance activities. Modify and adapt as needed for your organization's specific requirements.


Last Updated: October 21, 2025
Maintained by: Security & Compliance Team
Repository: /Users/jm/rr/prompts-sec-comp

About

collection of AI Prompts for security and compliance

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published