AI Red Teaming using Agent Report
Focus
Focus
Prisma AIRS

AI Red Teaming using Agent Report

Table of Contents


AI Red Teaming using Agent Report

Reports for Agent scans.
AI Red Teaming using Agent report is divided in to the following three sections that will give you the information for each scan:
  • Overview
    • AI Summary—Contains the scan configuration, key risks, and implications.
    • Overall Attack Success Rate—This chart will show the percentage of total attacks that were successful.
    • Risk Score—Similar to Red Teaming using Attack Library Reports, these reports also have an overall Risk Score pointing to the safety and security risk susceptibility of the AI system. The Risk Score is calculated based on the number of attack goals crafted by the agent which were successful and the number of techniques which had to be used to achieve them. The Agent always starts with simpler techniques to attack and progressively makes the attacks more sophisticated. The level of complexity that was needed for a goal to succeed is also accounted for in the risk score.
    • Goals and Attack Metrics—Next to the Risk Score you will be able to see the number of unique attack goals that the agent attempted to achieve and how many were successful. For each Goal, the agent will try multiple attack trees and the total attacks and successful number of attacks are shown as well.
  • Attack Details—In this section you will be able to see conversation that the agent has with the target in order to achieve the goal. All compromised responses are also marked in the conversation.
  • Recommendations—Suggestions for an Ideal Security Profile and Other Remediation Measures that can safeguard against future threats in your system. AI Red Teaming analyzes successfully exploited vulnerabilities in your environment and guides to:
    • Configure Appropriate Runtime Security Policies that provides the list of suggested runtime security policy configurations.
    • Adopt Other Recommended Measures provides prioritized remediation measures for the successfully compromised vulnerabilities. Displays top three recommendations. Select View all recommendations to review all the recommended measures.
After viewing (using View Report in the Scans page) a successfully completed scan report, you can do the following with the report:
  • Download as CSV—The CSV download format is best suited for practitioner and provides comprehensive scan data that includes all information visible in the strata cloud manager user interface. CSV format provides details of all attack iterations in addition to the overview data, making it ideal for security practitioners who need full data access for analysis, reporting, or remediation purposes.
  • Download as PDF—Exportable PDF reports help you share the AI Red Teaming assessment results with the executive stakeholders. The PDF report transforms the detailed technical findings from your AI Red Teaming scans into executive summaries that communicate key security insights and risk assessments without requiring deep technical expertise to interpret.
    • The AI Summary contains the scan configuration, key risks, and implications.
    • The Overview section (Overall Attack Success Rate, Risk Score, Total Attack Goals, Goals Achieved) presents all charts and metrics in their expanded state as they appear in the web interface, providing immediate visual context for security posture and risk levels.
    • The Attack Details section displays a comprehensive information of identified vulnerabilities and details of both successful and failed attacks.
    You can download reports only for the completed scans.
    To download the PDF reports for your AI Red Teaming assessments, navigate to your completed AI Red Teaming assessment, View Report, select
    and Download as PDF. When you access the download options, select the PDF format from the available export choices, which will include both the traditional CSV format and the new executive PDF option. Once a scan report is generated, you can download the PDF report directly to your local system for distribution to executive stakeholders or inclusion in security briefings and presentations.