Prompts für den sicheren Entwicklungslebenszyklus
Was Sie erreichen werden
Generieren Sie Kontrollen, Verfahren und technische Implementierungen für den sicheren Entwicklungslebenszyklus (SDLC), die die Anforderungen von ISO 27001 Annex A.8 und A.14, SOC 2 CC8.1 sowie NIST SP 800-218 erfüllen. Diese Prompts helfen Ihnen dabei, Sicherheit in jede Phase der Softwareentwicklung zu integrieren.
Code-Review und Sicherheitstests
Prozess für sichere Code-Reviews
Design a secure code review process for a [language/framework] application using [Git/GitLab/GitHub/Bitbucket]. Include:
- Pre-commit hooks for secret detection and linting
- Mandatory peer review requirements with security checklist
- Automated SAST tool integration ([tool name] or recommend)
- Security-focused review criteria for common vulnerabilities (OWASP Top 10)
- Escalation process for critical findings
- Evidence collection for compliance audits (ISO 27001 A.14.2, SOC 2 CC8.1)
Output as a Markdown procedure document and tool configuration files. Sicherheitstest-Pipeline
Create a comprehensive security testing strategy for [application type] in [development environment]. Include:
- SAST tools and configuration for [language]
- DAST tools for runtime testing
- SCA (Software Composition Analysis) for dependency vulnerabilities
- Container image scanning (if applicable)
- Integration points in CI/CD pipeline
- Severity thresholds and build failure criteria
- Remediation SLAs by severity level
- Reporting for security and compliance teams
Map each control to ISO 27001 Annex A.8.8, A.14.2 and SOC 2 CC8.1. Anforderungen für Penetrationstests
Generate penetration testing requirements and scope documentation for [application/system] that meets [ISO 27001/SOC 2/PCI DSS] standards. Include:
- Testing scope (APIs, web app, mobile, infrastructure)
- Exclusions and safe harbor conditions
- Required credentials and access levels
- Testing methodology (OWASP, PTES, custom)
- Reporting format and timeline
- Remediation verification process
- Annual testing schedule
- Third-party tester qualification criteria
Align with ISO 27001 A.14.2.8 and SOC 2 CC7.1 requirements. Abhängigkeits- und Supply-Chain-Sicherheit
Richtlinie zum Management von Abhängigkeiten
Create a dependency management and software supply chain security policy for [tech stack]. Address:
- Approved package repositories and registries
- Dependency version pinning vs. range strategies
- Automated vulnerability scanning ([Snyk/Dependabot/other])
- Update cadence for different severity levels
- Process for evaluating new dependencies
- License compliance checks
- SBOM (Software Bill of Materials) generation
- Third-party component risk assessment
Map to ISO 27001 A.8.30, SOC 2 CC8.1, and NIST SSDF practices. Sicherheitsbewertung von Open-Source-Software
Design an open source component evaluation checklist for [organization type]. Include criteria for:
- Security track record and CVE history
- Maintenance activity and community health
- License compatibility
- Code quality and security practices
- Alternative options assessment
- Ongoing monitoring requirements
- Documentation of approval decision
- Deprecated package sunset process
Output as a form template and approval workflow. Verwaltung von Geheimnissen und Anmeldedaten
Implementierung des Secrets-Managements
Design a secrets management architecture for [application environment] using [HashiCorp Vault/AWS Secrets Manager/Azure Key Vault/GCP Secret Manager]. Include:
- Secret storage and rotation strategy
- Access control policies (RBAC)
- Integration with application code ([language/framework])
- Environment-specific secret handling (dev/staging/prod)
- Audit logging configuration
- Emergency access procedures
- Migration plan from hardcoded secrets
- Developer onboarding guide
Align with ISO 27001 A.8.24, A.9.4.3, SOC 2 CC6.7, and NIST SP 800-57. Erkennung und Behebung von exponierten Geheimnissen
Create a secret detection and remediation procedure for [version control system]. Include:
- Pre-commit hooks using [tool name or recommend]
- Repository scanning for historical leaks
- Automated alerting on secret detection
- Immediate response steps (rotation, revocation)
- Root cause analysis template
- Developer training requirements
- Metrics for tracking incidents
- Integration with incident management
Map to ISO 27001 A.17.1, SOC 2 CC7.4. Sichere Codierungsstandards
Richtlinien für sichere Programmierung
Generate secure coding guidelines for [language/framework] development that address:
- Input validation and sanitization
- Output encoding for XSS prevention
- SQL injection prevention
- Authentication and session management
- Cryptographic operations and key handling
- Error handling and logging (avoid sensitive data exposure)
- File upload security
- API security (rate limiting, authentication)
- Security headers configuration
- OWASP Top 10 mitigations specific to [framework]
Include code examples for each guideline. Map to ISO 27001 A.14.2 and SOC 2 CC8.1. Standards für API-Sicherheit
Design API security standards for [REST/GraphQL/gRPC] APIs in [language/framework]. Cover:
- Authentication mechanisms (OAuth 2.0, JWT, API keys)
- Authorization and scope management
- Rate limiting and throttling
- Input validation and schema enforcement
- Output filtering (prevent data over-exposure)
- CORS and content security policies
- Versioning strategy with security implications
- Logging and monitoring requirements
- Security testing approach (fuzzing, auth bypass tests)
Align with ISO 27001 A.14.1, OWASP API Security Top 10, and SOC 2 CC6.1-CC6.2. Sicherheit der Entwicklungsumgebung
Einrichtung einer sicheren Entwicklungsumgebung
Create a secure development environment configuration guide for [team size] developers working on [application type]. Include:
- Workstation hardening requirements (OS, disk encryption, firewall)
- Required security tools (antivirus, EDR, VPN)
- Access controls for development resources
- Separation of environments (local, dev, staging, prod)
- Data handling for production data in non-prod environments
- VPN/network access requirements
- Software installation and update policies
- Incident reporting procedures
Map to ISO 27001 A.6.2.2, A.8.9, SOC 2 CC6.4. Anonymisierung von Produktionsdaten
Design a production data anonymization process for [data type] used in [development/testing] environments. Include:
- Data classification and sensitivity assessment
- Anonymization techniques (masking, tokenization, synthetic data)
- Tool recommendations for [database type]
- Automated pipeline for data refresh
- Validation that anonymization is irreversible
- Access controls for anonymized datasets
- Documentation for audit evidence
- GDPR Article 25 and ISO 27001 A.8.11 compliance mapping Release- und Deployment-Sicherheit
Sichere Deployment-Pipeline
Design a secure deployment pipeline for [application] to [cloud platform/on-premises]. Include:
- Code signing and artifact verification
- Automated security checks before deployment
- Approval gates and RBAC for production deployments
- Rollback procedures and version control
- Configuration management and drift detection
- Secrets injection (no hardcoded credentials)
- Post-deployment validation tests
- Audit logging of all deployments
- Change management integration
Align with ISO 27001 A.12.1.2, A.14.2.9, SOC 2 CC8.1. Change Management für Sicherheitsupdates
Create an emergency change procedure for critical security patches in [environment]. Address:
- Severity assessment and escalation criteria
- Expedited approval process
- Testing requirements (minimum viable vs. full regression)
- Communication plan (stakeholders, users, auditors)
- Deployment window and rollback plan
- Post-deployment monitoring
- Documentation requirements for compliance
- Lessons learned and process improvement
Map to ISO 27001 A.12.1.2, SOC 2 CC8.1, and incident management requirements. Laden Sie Ihre aktuellen Entwicklungsstandards oder Architekturdateien hoch, um maßgeschneiderte Prompts zu erhalten, die auf Ihre bestehenden Praktiken abgestimmt sind.
Compliance-Dokumentation
SDLC-Sicherheitsnachweispaket
Generate an SDLC security evidence collection guide for [ISO 27001/SOC 2/both] audits. Include:
- Code review records and approval trails
- SAST/DAST/SCA scan reports with remediation tracking
- Penetration test reports and remediation evidence
- Security training completion records for developers
- Change management logs for security-relevant changes
- Incident postmortems related to vulnerabilities
- Dependency update logs and vulnerability assessments
- Policy acknowledgment records
Create a spreadsheet template mapping each evidence type to specific controls. Generierter Code und Konfigurationen müssen in Nicht-Produktionsumgebungen getestet und vor dem Deployment anhand Ihres spezifischen Bedrohungsmodells validiert werden.
Verwandte Prompts
Siehe Prompts für Infrastruktur- und Cloudsicherheit zur Härtung der CI/CD-Infrastruktur
Siehe Prompts für DevSecOps und Automatisierung für automatisierte Sicherheitstest-Workflows
Siehe Prompts für Zugriffskontrolle und Identitätsmanagement für Entwickler-Zugriffskontrollen