Prisma AIRS
AI Red Teaming using Agent Report
Table of Contents
Expand All
|
Collapse All
Prisma AIRS Docs
AI Red Teaming using Agent Report
Reports for Agent scans.
AI Red Teaming using Agent report is divided in to the following three sections that will
give you the information for each scan:
- Overview
- AI Summary—Contains the scan configuration, key risks, and implications.
- Overall Attack Success Rate—This chart will show the percentage of total attacks that were successful.
- Risk Score—Similar to Red Teaming using Attack Library Reports, these reports also have an overall Risk Score pointing to the safety and security risk susceptibility of the AI system. The Risk Score is calculated based on the number of attack goals crafted by the agent which were successful and the number of techniques which had to be used to achieve them. The Agent always starts with simpler techniques to attack and progressively makes the attacks more sophisticated. The level of complexity that was needed for a goal to succeed is also accounted for in the risk score.
- Goals and Attack Metrics—Next to the Risk Score you will be able to see the number of unique attack goals that the agent attempted to achieve and how many were successful. For each Goal, the agent will try multiple attack trees and the total attacks and successful number of attacks are shown as well.
- Attack Details—In this section you will be able to see conversation that the agent has with the target in order to achieve the goal. All compromised responses are also marked in the conversation.
- Recommendations—Suggestions for an Ideal Security Profile
and Other Remediation Measures that can safeguard against future threats in your
system. AI Red Teaming analyzes successfully exploited vulnerabilities in your
environment and guides to:
- Configure Appropriate Runtime Security Policies
that provides the list of suggested runtime security policy
configurations.
- Adopt Other Recommended Measures provides
prioritized remediation measures for the successfully compromised
vulnerabilities. Displays top three recommendations. Select
View all recommendations to review all the
recommended measures.
- Configure Appropriate Runtime Security Policies
that provides the list of suggested runtime security policy
configurations.
After viewing (using View
Report in the Scans page) a successfully
completed scan report, you can do the following with the report:
- Download as CSV—The CSV download format is best suited for practitioner and provides comprehensive scan data that includes all information visible in the strata cloud manager user interface. CSV format provides details of all attack iterations in addition to the overview data, making it ideal for security practitioners who need full data access for analysis, reporting, or remediation purposes.
- Download as PDF—Exportable PDF reports help you share the
AI Red Teaming assessment results with the executive stakeholders. The PDF
report transforms the detailed technical findings from your AI Red Teaming scans
into executive summaries that communicate key security insights and risk
assessments without requiring deep technical expertise to interpret.
- The AI Summary contains the scan configuration, key risks, and implications.
- The Overview section (Overall Attack Success Rate, Risk Score, Total Attack Goals, Goals Achieved) presents all charts and metrics in their expanded state as they appear in the web interface, providing immediate visual context for security posture and risk levels.
- The Attack Details section displays a comprehensive information of identified vulnerabilities and details of both successful and failed attacks.
To download the PDF reports for your AI Red Teaming assessments, navigate to your completed AI Red Teaming assessment, View Report, selectYou can download reports only for the completed scans.and Download as PDF. When you access the download options, select the PDF format from the available export choices, which will include both the traditional CSV format and the new executive PDF option. Once a scan report is generated, you can download the PDF report directly to your local system for distribution to executive stakeholders or inclusion in security briefings and presentations.