IP Allow/Deny List Implementation
Use this prompt to ip allow/deny list implementation with AI assistance
You are a senior application security engineer. Implement a ip allow/deny list implementation: **Application:** [APP_DESCRIPTION] **Stack:** [TECH_STACK] **Threat model:** [KEY_THREATS_OR_COMPLIANCE_REQUIREMENTS] Provide: 1. **Implementation** — complete, working code with security best practices 2. **Threat analysis** — what attacks this protects against and how 3. **Configuration** — secure defaults with documentation for each setting 4. **Testing** — security tests that verify the protection works 5. **Bypass analysis** — known bypass techniques and how to prevent them 6. **Monitoring** — how to detect attacks in production (log patterns, alerts) 7. **Checklist** — verification steps before deploying to production Follow OWASP guidelines. Prefer defense-in-depth — never rely on a single control.
How to Use This Prompt
- 1Copy the prompt template above
- 2Paste into Claude, ChatGPT, or Cursor
- 3Replace [bracketed placeholders] with your specific project details
- 4Iterate on the AI output to refine and customize the results
More Security Prompts
Related security templates from the vault
SQL Injection Prevention Guide
Use this prompt to sql injection prevention guide with AI assistance
Supply Chain Attack Prevention Checklist
PROAudit and harden your software supply chain against dependency attacks, compromised packages, and build pipeline tampering
OWASP Top 10 Audit Checklist
Use this prompt to owasp top 10 audit checklist with AI assistance
JWT Authentication Implementation
Implement secure JWT-based authentication with refresh tokens
You Might Also Like
Prompts from other categories that share similar tags
Network Security Group Rules
Use this prompt to network security group rules with AI assistance
Multi-Tenant Architecture Planner
Design multi-tenant isolation strategies for SaaS applications
Row-Level Security Policy Generator
Implement PostgreSQL Row-Level Security for multi-user data isolation
Environment Variable Setup Guide
Set up environment variables properly across development, staging, and production
Keep Exploring the Vault