Security GPTs and Links

Created by Venkat Pothamsetty, Modified on Fri, 31 May at 2:10 PM by Venkat Pothamsetty


The following are the GPTs that Transilience made as part of our internal development efforts.  



Security AreaGPT
Description
Compliance

The compliance expert has in depth understanding of compliance regulations.  

Call this expert any time you have a compliance question, a configuration snippet or file you want to evaluate or compliance implications of an alert.


Compliance engineers are often asked to write policies that are in compliant with specific standards.  The structure, knowledge, and the nuances involved in writing a policy standard usually makes the engineer copy and paste from various places prone to errors.


We made compliance policy writing expert with the knowledge of how to write a policy along with the knowledge of compliance standards such as NIST and PCI.



CIS Standard expert

The CIS benchmark expert has in depth understanding of CIS benchmarks.  Call this expert any time you have a CIS question, a configuration snippet or file you want to evaluate or CIS implications of an alert.


The following CIS standards are supported

  1. AWS
  2. Azure
  3. GCP
  4. Linux of various flavors
  5. Windows

Threat Intelligence

Threat modeling tasks involve a lot of structured thinking , mapping each of application capabilities against threat modeling frameworks such as STRIDE or PASTA.    It would save a ton of time if we can have the structured threat modeling done so the security engineer can focus on advanced use cases.


Threat modeling expert does exactly that.  


The threat modeling expert has knowledge of 

  1.  Threat modeling frameworks such as STRIDE and PASTA
  2.  Application attack frameworks such as OWASP top 10
  3. Attack frameworks such as MITRE



Threat Intelligence expert does exactly that.  We collect threat intelligence and vendor advisories from multiple sources every hour and make it available to you at your finger tips.


The threat intelligence expert has knowledge of 

  1.  Threat intelligence from various sources
  2. Vendor advisories from various sources


The security engineer can ask questions on threat advisories related to your industry or region .  The security engineer can ask questions on a particular vendor or a port as well.




Any questions on the GPT, fee free to join our community and ask.


Features


The following vendors are supported

  1. SIEMs
    1. Splunk SPL detection rules
    2. IBM QRadar and AQL rules
  2. Firewalls
    1. Palo Alto Networks Firewall
    2. Cisco ASA
    3. Fortinet FortiOS

Vulnerability


Finding the right CPE for a CVE is the first step for finding the vulnerability, the GPT will go through the CVE description, all the links and frames the right CPE for the software mentioned in the CPE.



Vulnerability analyzer

Vulnerability analyzer has the following features


- What CVEs are against what sofware

- Rescore a vulnerability based on custom exploitability and impact and environmental metrics

- remediation of a CVE

Security Operations

Many a time security operations engineers wants to enhance the alert with items such as 


- Mitre attack techinques that can be used to exploit the alert

- Virus total verdict on IPs and hashes involved in the alers


Alert context enhancer can do that for you.


Vendor
This GPT has the user admin guides for all popular firewalls
Business Email CompromisePhish Detection GPT

Hyper personalized email generator



Other Tenable


Sales

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article