Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Risk Manager Guide: Quantifying AI Risk

As a Risk Manager responsible for AI governance, you need to quantify AI-related risks, track mitigation effectiveness, and report exposure to stakeholders. Keeptrusts provides real-time risk signals through policy enforcement data, incident tracking, and compliance metrics that feed directly into your risk frameworks.

Use this page when

  • You are building an AI risk framework with quantifiable risk signals from policy enforcement data
  • You need to calculate inherent vs. residual risk using Keeptrusts event data
  • You are creating composite risk scores from PII detection, injection, content filter, and escalation metrics
  • You want to track risk mitigation effectiveness over time and report to stakeholders
  • You are categorizing AI risks (data leakage, content safety, security, compliance, financial, operational, third-party)

Primary audience

  • Primary: Technical Leaders (Risk Managers, ERM Directors, GRC Managers)
  • Secondary: CISOs, Compliance Officers, Chief AI Officers, Internal Audit

AI Risk Framework

Risk Taxonomy for AI Systems

Map your organization's AI risks to Keeptrusts monitoring capabilities:

Risk CategoryRisk ExamplesKeeptrusts Signal
Data leakagePII exposure, IP in promptspii-detector and dlp-filter trigger rates
Content safetyHarmful, biased, or inaccurate outputcontent-filter and quality-scorer metrics
SecurityPrompt injection, jailbreaksprompt-injection detection rates
ComplianceRegulatory violations, audit failuresPolicy enforcement rates, escalation volumes
FinancialUncontrolled AI spendingCost Center data, budget overruns
OperationalGateway downtime, provider outagesHealth checks, failover events
Third-partyVendor data handling, model driftProvider-scoped event analysis

Inherent vs. Residual Risk

Keeptrusts policies reduce inherent risk to residual risk. Measure the delta:

# Inherent risk signal: total requests with risk indicators
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=30d&action=block,escalate,redact"

# Residual risk signal: items that passed all policies
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=30d&action=allow"

Risk Scoring Model

Building a Composite Risk Score

Create a scoring model using Keeptrusts event data as input signals:

SignalWeightSourceScoring
PII detection rate25%pii-detector events>5% triggers = high risk
Prompt injection attempts20%prompt-injection eventsAny detection = elevated
Content filter blocks20%content-filter events>2% block rate = medium risk
Quality score average15%quality-scorer events<0.7 avg = high risk
Escalation volume10%Escalation count>10/week = elevated
Cost overruns10%Cost Center data>110% budget = medium risk

Automated Risk Signal Collection

# Export risk signals for the scoring model
kt export create \
--type events \
--format csv \
--since 30d \
--description "Monthly risk scoring input data"

# Pull escalation metrics
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations?since=30d&status=resolved"

Policy Configuration for Risk Detection

Deploy policies that generate the risk signals your framework needs:

policies:
- name: risk-pii-monitor
type: pii-detector
action: redact
entity_types: [name, email, phone, ssn, credit_card]
enabled: true

- name: risk-injection-monitor
type: prompt-injection
action: block
enabled: true

- name: risk-content-safety
type: content-filter
categories: [harmful, biased, discriminatory, violent]
action: block
enabled: true

- name: risk-quality-gate
type: quality-scorer
min_score: 0.6
action: escalate
enabled: true

- name: risk-dlp-protection
type: dlp-filter
patterns:
- name: sensitive-data
regex: "(CONFIDENTIAL|INTERNAL ONLY|SECRET)"
action: block
enabled: true

Mitigation Strategies

Risk Mitigation Through Policy Enforcement

Each Keeptrusts policy type maps to a mitigation strategy:

RiskMitigationPolicy TypeResidual Control
Data breachBlock PII in prompts/responsespii-detectorRedaction + logging
Prompt injectionDetect and block attack patternsprompt-injectionBlock + escalate
Harmful contentFilter unsafe outputscontent-filterBlock + human review
Quality failuresScore and gate responsesquality-scorerEscalate low quality
Cost overrunEnforce budget capscost_limitBlock at threshold
IP leakageDetect proprietary contentdlp-filterBlock + alert

Escalation as a Mitigation Control

Configure escalations so that high-risk events receive human review:

# Review current escalation queue
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations?status=pending"

In the Console, the Escalations page provides a workflow for reviewing, resolving, and documenting risk decisions.

Reporting Dashboards

Executive Risk Summary

Pull data from Keeptrusts to populate your risk reporting dashboards:

Report ElementData SourceFrequency
Risk score trendComposite score from event signalsWeekly
Incident countBlocked and escalated eventsDaily
Policy coverageActive policies across gatewaysMonthly
Compliance statusAudit log + policy enforcement ratesQuarterly
Cost exposureCost Center spend vs. budgetWeekly

Generating Risk Reports

# Weekly risk data export
kt export create \
--type events \
--format csv \
--since 7d \
--description "Weekly risk report data"

# Pull cost data for financial risk reporting
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=30d&group_by=provider"

Console Dashboard for Real-Time Monitoring

The Console Dashboard provides at-a-glance visibility into:

  • Total events processed and policy trigger rates
  • Blocked vs. allowed request ratios
  • Escalation queue depth and response times
  • Cost trends across providers and teams

Third-Party Risk Management

Assessing LLM Provider Risk

Each LLM provider carries distinct risk profiles. Use Keeptrusts to monitor provider behavior:

# Compare policy trigger rates across providers
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=30d&group_by=provider&action=block"

Provider Risk Monitoring Checklist

  • All providers routed through governed gateways
  • Per-provider content filtering active
  • Provider-specific cost caps configured
  • Failover policies defined for provider outages
  • Data residency controls verified per provider
  • Provider contract terms reviewed against policy configuration

Model Risk Management

Model-Level Risk Tracking

Track risk signals at the model level to identify which models generate the most risk:

# Model-level risk analysis
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=30d&group_by=model&action=block,escalate"

Model Approval Workflow

Use Keeptrusts policy configurations to enforce model allow-lists:

pack:
name: risk-manager-providers-2
version: 1.0.0
enabled: true
providers:
targets:
- id: openai
provider:
secret_key_ref:
env: OPENAI_API_KEY
- id: anthropic
provider:
secret_key_ref:
env: ANTHROPIC_API_KEY
policies:
chain:
- audit-logger
policy:
audit-logger:
immutable: true
retention_days: 365
log_all_access: true

Unapproved models are automatically blocked at the gateway, and the block event is logged for risk reporting.

Risk Manager Workflow with Keeptrusts

TaskFrequencyTool
Review risk dashboardDailyConsole Dashboard
Triage escalationsDailyConsole Escalations
Calculate risk scoresWeeklyEvent exports + scoring model
Generate risk reportsWeeklykt export create
Review third-party riskMonthlyProvider-scoped event analysis
Update risk frameworkQuarterlyPolicy configuration review
Board risk reportingQuarterlyAggregated risk metrics

Success Metrics for Risk Management

MetricTargetSource
Mean time to detect risk events< 5 minutesEvent pipeline latency
Risk mitigation coverage100% of identified risksPolicy mapping audit
Escalation resolution time< 2 hours for high severityConsole Escalations
False positive rate< 10% of policy triggersEscalation review data
Third-party risk assessmentsAll providers assessed quarterlyProvider risk reviews
Risk score trendDeclining or stableComposite risk model

For AI systems

  • Canonical terms: Keeptrusts, AI risk framework, risk scoring, risk taxonomy, inherent risk, residual risk, mitigation tracking, risk reporting
  • Key surfaces: Console Dashboard, Console Escalations, Console Usage, Events API, Export API
  • Commands: kt export create, kt events list
  • Risk signals: pii-detector trigger rate, prompt-injection detection count, content-filter block rate, quality-scorer average, escalation volume, cost overruns
  • Scoring model: weighted composite (PII 25%, injection 20%, content filter 20%, quality 15%, escalations 10%, cost 10%)
  • Policy types for risk detection: pii-detector, prompt-injection, content-filter, quality-scorer, dlp-filter, cost_limit
  • Best next pages: CISO Guide, Compliance Officer Guide, Exports Guide, Escalations Guide

For engineers

  • Inherent risk signal: GET /v1/events?since=30d&action=block,escalate,redact (total requests with risk indicators)
  • Residual risk signal: GET /v1/events?since=30d&action=allow (items that passed all policies)
  • Export risk data: kt export create --type events --format csv --since 30d --description "Monthly risk scoring input"
  • Pull escalation metrics: GET /v1/escalations?since=30d&status=resolved
  • Deploy risk-detection policies: pii-detector, prompt-injection, content-filter, quality-scorer, cost_limit
  • Validate policy config: kt policy lint --file risk-detection-policy.yaml

For leaders

  • Keeptrusts policies directly reduce inherent risk to measurable residual risk — the delta quantifies governance ROI
  • The composite risk scoring model (weighted signals from PII detection, injection attempts, content blocks, quality scores, escalations, and cost) provides a single risk number for executive dashboards
  • Risk trend reporting (weekly/monthly) demonstrates mitigation effectiveness over time — decreasing risk scores prove governance investment is working
  • Risk appetite thresholds (e.g., >5% PII trigger rate = high risk) translate directly into policy configuration changes
  • Third-party risk from LLM vendors is tracked through provider-scoped event analysis, feeding vendor risk assessments with operational data

Next steps