Prisma AIRS
AI Red Teaming using Attack Library Report
Table of Contents
Expand All
|
Collapse All
Prisma AIRS Docs
AI Red Teaming using Attack Library Report
Reports for Attack Library scans.
AI Red Teaming using Attack Library report is divided in to the following three sections
that will give you the information for each scan:
- Overview
- AI Summary—Contains the scan configuration, key risks, and implications.
- Overall Attack Success Rate—This chart will show the percentage of total attacks that were successful.
- Risk Score—This is the overall risk score assigned to the AI system based on the findings of the attack library scan. It points to the safety and security risk susceptibility of the system. A higher risk score indicates that the AI system is more vulnerable to safety and security attacks. Risk Score ranges from 0-100, 0 being practically no risk and 100 being very high risk. The number of successful attacks and their severity determine the risk score.
- Attacks by Severity—This chart will show you the split of successful attack by severity. Each attack prompt is run multiple times to test for the probabilistic nature of LLMs. Even if the same attack is successful on multiple attempts, it will be counted only once for all metrics.
- Attacks by Category—This table and chart will show you the success rate of attacks across the categories you picked when starting the scan.
Following is the sample attack library report for Brand Reputation Risk scan category:
- Attack Details—All attack prompts that have one or more compromised responses will be shown in this table along with the severity and category. View Details to look at all the response for that attack and ones that got marked as a compromised response.
- Recommendations—Suggestions for an Ideal Security Profile and
Other Remediation Measures that can safeguard against future threats in your system.
AI Red Teaming analyzes successfully exploited vulnerabilities in your environment
and guides to:
- Configure Appropriate Runtime Security Policies that
provides the list of suggested runtime security policy configurations.
- Adopt Other Recommended Measures provides prioritized
remediation measures for the successfully compromised vulnerabilities.
Displays top three recommendations. Select View all
recommendations to review all the recommended measures.
- Configure Appropriate Runtime Security Policies that
provides the list of suggested runtime security policy configurations.
After viewing (using View
Report in the Scans page) a successfully
completed scan report, you can do the following with the report:
- Download as CSV—The CSV download format is best suited for practitioner and provides comprehensive scan data that includes all information visible in the strata cloud manager user interface. CSV format provides details of all attack iterations in addition to the overview data, making it ideal for security practitioners who need full data access for analysis, reporting, or remediation purposes.
- Download as PDF—Exportable PDF reports help you share the
AI Red Teaming assessment results with the executive stakeholders. The PDF
report transforms the detailed technical findings from your AI Red Teaming scans
into executive summaries that communicate key security insights and risk
assessments without requiring deep technical expertise to interpret.
- The AI Summary contains the scan configuration, key risks, and implications.
- The Overview section (Security Risk Overview, Safety Risk Overview, Brand Reputation Risk Overview, Compliance Risk Overview) presents all charts and metrics in their expanded state as they appear in the web interface, providing immediate visual context for security posture and risk levels.
- The Successful Attacks section displays a comprehensive information of identified vulnerabilities and successful attacks.
To download the PDF reports for your AI Red Teaming assessments, navigate to your completed AI Red Teaming assessment, View Report, selectYou can download reports only for the completed scans.and Download as PDF. When you access the download options, select the PDF format from the available export choices, which will include both the traditional CSV format and the new executive PDF option. Once a scan report is generated, you can download the PDF report directly to your local system for distribution to executive stakeholders or inclusion in security briefings and presentations.