Prompt engineering

Prompt Engineering Overview

What is Prompt Engineering?

Prompt engineering is the practice of crafting clear, specific queries to get accurate, actionable responses from ISMS Copilot. In compliance and security work, well-structured prompts ensure you receive framework-specific guidance, audit-ready documentation, and reliable risk assessments without hallucinations.

Unlike general AI tools, ISMS Copilot is trained on real-world consulting experience across ISO 27001, SOC 2, NIST, GDPR, DORA, NIS2, and other frameworks. Effective prompts help you leverage this specialized knowledge for high-stakes compliance tasks.

When to Use Prompt Engineering

Apply these techniques when you need:

  • Framework-specific answers – Control implementations, audit evidence, or gap analysis for exact standards

  • Customized documentation – Policies, procedures, or risk assessments tailored to your organization's context

  • Multi-step workflows – Complex tasks like full SOC 2 readiness or ISO 27001 certification roadmaps

  • File analysis – Gap assessments or compliance reviews of uploaded documents

Good prompts save time. A specific query like "ISO 27001:2022 control A.8.1 implementation for 50-person SaaS company" returns targeted guidance in seconds versus back-and-forth clarifications.

Core Prompt Engineering Techniques

Master these techniques to get the most from ISMS Copilot:

1. Be Clear and Specific

Reference exact frameworks, controls, and organizational context. Vague queries produce generic answers.

Example: Instead of "How do I handle access control?" ask "What evidence do I need for SOC 2 CC6.1 user access reviews in a 30-person startup with Google Workspace?"

Learn more about being clear and specific →

2. Provide Organizational Context

Include your industry, company size, tech stack, and maturity level. This tailors recommendations to your reality.

Example: "We're a healthcare SaaS with 75 employees using AWS and Salesforce, currently implementing ISO 27001 for the first time."

Learn more about providing organizational context →

3. Use Custom Instructions

Set workspace-level instructions to avoid repeating context in every query. Perfect for client work or specific projects.

Example instruction: "Focus on ISO 27001:2022 for a financial services company with 200 employees. Emphasize GDPR alignment and prioritize quick wins for upcoming audit."

Learn about Workspaces

4. Leverage Personas

Select the right persona to shape response style and depth:

  • Default – Balanced, general guidance

  • Implementer – Practical, step-by-step actions

  • Auditor – Evidence-focused, gap identification

  • Consultant – Strategic, business-aligned advice

Using Personas to Customize AI Responses

5. Break Down Complex Requests

Split multi-part questions into sequential queries. This improves accuracy and lets you refine direction.

Instead of: "Help me prepare for SOC 2 audit including policies, evidence, and vendor reviews"

Try:

  1. "What SOC 2 Type II policies do I need for a SaaS company?"

  2. "Generate an access control policy for SOC 2 CC6.1-6.3"

  3. "What vendor assessment evidence satisfies CC9.2?"

Learn more about breaking down complex requests →

6. Use Examples and Patterns

Reference the prompt libraries for proven query patterns across frameworks. These show effective phrasing for controls, risk assessments, and documentation.

ISO 27001 Prompt Library Overview

7. Request Specific Output Formats

Specify if you need tables, checklists, policy drafts, or step-by-step procedures.

Example: "Create a table mapping our HR processes to ISO 27001 Annex A.6 controls, identifying gaps"

Learn more about requesting specific output formats →

8. Upload Files for Context

Attach existing policies, risk registers, or audit reports (PDF, DOCX, XLS) for gap analysis or improvement suggestions.

Example query with upload: "Review this access control policy against SOC 2 CC6 criteria and suggest improvements"

Learn more about uploading files for context and analysis →

9. Iterate and Refine

Use multi-turn conversations within a workspace to build on previous responses. Each follow-up maintains context.

Example flow:

  1. "What are the ISO 27001 A.5 controls?"

  2. "Expand on A.5.1 for our Azure environment"

  3. "Draft an information security policy addressing A.5.1"

Learn more about iterating and refining with multi-turn conversations →

Compliance-Specific Best Practices

Always verify AI-generated content against official standards. ISMS Copilot provides expert guidance, but you should cross-check control requirements and customize outputs for your organization's tools, roles, and evidence.

  • Reference exact versions – Specify "ISO 27001:2022" not just "ISO 27001" to ensure current guidance

  • Ask "why" for understanding – "Why does SOC 2 require segregation of duties?" helps you explain to stakeholders

  • Request evidence lists – "What evidence do I need for NIST CSF PR.AC-4?" surfaces audit requirements early

  • Combine frameworks – "How does GDPR Article 32 map to ISO 27001 A.8 controls?" for efficiency

  • Use workspaces for clients – Isolate each project with custom instructions to prevent cross-contamination

Common Pitfalls to Avoid

  • Being too vague – "Tell me about risk management" wastes time on generic info

  • Overloading one query – Asking for 15 policies at once reduces quality per item

  • Ignoring context – Omitting your tech stack means generic recommendations

  • Skipping verification – Treating output as final without review risks audit failures

  • Not using features – Custom instructions and personas exist to save you repetition

Answer Styles and Settings

Adjust response length using the answer style dropdown:

  • Concise – Brief, direct answers for quick lookups

  • Normal – Balanced detail for most queries

  • Detailed – Comprehensive explanations for complex topics

Enable PII reduction if discussing sensitive data in examples.

Next Steps

Start applying these techniques in your queries today. The more context and specificity you provide, the more valuable ISMS Copilot becomes for your compliance work.

Ready to dive deeper? Explore the ISO 27001 and SOC 2 prompt libraries for dozens of ready-to-use query examples, or set up a workspace with custom instructions for your next project.

How to Use ISMS Copilot Responsibly

Was this helpful?