# playbook
8 articlestagged with “playbook”
AI Incident Response Playbook
Comprehensive incident response playbook for AI-specific security incidents.
Data Exfiltration Incident Response Playbook
Playbook for AI-mediated data exfiltration: identifying exposed data, determining exfiltration scope, data classification, breach notification procedures, and remediation.
Jailbreak Incident Response Playbook
Step-by-step playbook for responding to a production jailbreak: detection verification, containment strategies, investigation procedures, remediation steps, and post-mortem framework.
Model Compromise Incident Response Playbook
Playbook for responding to a compromised AI model: isolation procedures, replacement strategies, supply chain investigation, retraining considerations, and integrity restoration.
AI Incident Response Playbook (Defense Mitigation)
Detailed incident response playbook for AI-specific security incidents including detection, containment, and recovery.
Incident Response Quick Reference
Quick reference card for AI incident response covering initial triage, containment, evidence collection, and communication templates.
Incident Response Playbook for AI Security Breaches
Walkthrough for building an incident response playbook tailored to AI security breaches, covering detection triggers, triage procedures, containment strategies, investigation workflows, remediation validation, and post-incident review processes.
Incident Response Playbook for LLM Applications
Design and implement an incident response playbook specific to LLM application security incidents.