AIOpenLibraryAIOpenLibrary
Back to Cybersecurity

Security Policy Generator

Generate comprehensive information security policies compliant with SOC 2, ISO 27001, or NIST frameworks.

Updated Mar 11, 2026

ShareLinkedIn

Customize Your Prompt

0/5 filled

Prompt

You are an information security policy consultant. Generate a comprehensive security policy document.

Organization type: [ORG_TYPE]
Industry: [INDUSTRY]
Compliance requirements: [COMPLIANCE_FRAMEWORKS] (SOC 2, ISO 27001, NIST, HIPAA, GDPR)
Company size: [COMPANY_SIZE]
Existing policies: [EXISTING_POLICIES]

Generate a policy covering:

1. **Information Security Policy** (master policy)
2. **Acceptable Use Policy**
3. **Access Control Policy**
4. **Data Classification & Handling**
5. **Incident Response Policy**
6. **Password & Authentication Policy**
7. **Remote Work Security Policy**
8. **Vendor/Third-Party Risk Management**
9. **Data Retention & Destruction**
10. **Employee Security Awareness**

For each policy include:
- Purpose & scope
- Roles & responsibilities
- Policy statements (specific, enforceable)
- Exceptions process
- Enforcement & consequences
- Review schedule
- Compliance mapping (which control it satisfies)

Use clear, enforceable language. Avoid vague statements like "should" — use "must" or "shall".

Powered by Hugging Face Inference API

Pro Tips

  • Maps directly to compliance framework controls, making audit preparation straightforward.

References

Comments

Log in to leave a comment

More Cybersecurity Prompts

🔒CybersecurityNEW

Threat Model Generator

Generate comprehensive threat models using STRIDE methodology for any application or system.

You are a senior security architect with expertise in threat modeling. Perform a...

Claude
AdvancedView prompt
🔒CybersecurityNEW

Penetration Test Report Writer

Convert raw penetration testing findings into professional, client-ready vulnerability reports.

You are a senior penetration tester writing a professional report. Convert my ra...

🔒CybersecurityNEW

Secure Code Review Checklist

Review code for security vulnerabilities using OWASP Top 10 and secure coding best practices.

You are a senior application security engineer performing a secure code review. ...

Claude
AdvancedView prompt

You Might Also Like

✍️Writing & Content✦ Premium

Blog Post Architect

Create SEO-optimized, engaging blog posts with structured outlines, compelling hooks, and strategic keyword placement.

You are an expert content strategist and SEO specialist. Create a comprehensive ...

Claude Opus 4
IntermediateView prompt
📚Education✦ Premium

Socratic Method Tutor

Learn any concept through guided questioning that builds deep understanding instead of memorization.

You are a Socratic tutor. Your role is to help me deeply understand a concept th...

Claude Opus 4
BeginnerView prompt
📦Product Management✦ Premium

Product Requirements Document (PRD)

Generate comprehensive PRDs with user stories, acceptance criteria, technical requirements, and success metrics.

You are a senior product manager at a top tech company. Write a comprehensive PR...

Claude Opus 4
IntermediateView prompt