AI-powered prompts for creating comprehensive security test scenarios
Generate security test scenarios for: [System/Feature]: [Brief description] Security Requirements: - Authentication: [Requirements] - Authorization: [Requirements] - Data Protection: [Requirements] - Compliance: [Standards] Test Types: 1. [Test Type 1] 2. [Test Type 2] ... Please include: - Test Scenarios - Test Data - Security Tools - Success Criteria - Risk Assessment
Generate security test scenarios for: User Authentication System: Login and session management Security Requirements: - Authentication: Multi-factor authentication required - Authorization: Role-based access control - Data Protection: Encryption at rest and in transit - Compliance: OWASP Top 10, GDPR Test Types: 1. Authentication Testing 2. Authorization Testing 3. Session Management 4. Input Validation 5. Security Headers Please include: - Test Scenarios - Test Data - Security Tools - Success Criteria - Risk Assessment
Generate penetration test scenarios for: [System/Feature]: [Description] Focus Areas: 1. Network Security 2. Application Security 3. Data Security 4. Access Control 5. Compliance Include: - Test Scenarios - Tools Required - Success Criteria - Risk Levels - Remediation Steps
Generate vulnerability assessment scenarios for: [System/Feature]: [Description] Assessment Areas: 1. OWASP Top 10 2. Common Vulnerabilities 3. Security Misconfigurations 4. Data Exposure 5. Access Control Issues Include: - Test Cases - Scanning Tools - Analysis Methods - Risk Assessment - Mitigation Steps
Security Test Plan: User Authentication Version: 1.0 Date: [Current Date] 1. Security Requirements - Authentication - Authorization - Data Protection - Compliance 2. Test Scenarios - Authentication Tests - Authorization Tests - Session Management - Input Validation - Security Headers 3. Test Environment - Security Tools - Test Data - Monitoring Setup - Access Requirements 4. Test Execution - Test Steps - Tools Used - Data Requirements - Success Criteria 5. Results Analysis - Vulnerabilities - Risk Assessment - Impact Analysis - Recommendations 6. Remediation - Fixes Required - Priority Levels - Implementation Steps - Verification