Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Security Analyst Guide: AI Threat Monitoring

AI systems introduce new attack surfaces that require dedicated monitoring. As a security analyst, you need to detect prompt injection attacks, data exfiltration attempts, model abuse patterns, and anomalous AI usage. Keeptrusts provides the event stream, escalation workflows, and export capabilities to integrate AI threat monitoring into your existing security operations.

Use this page when

  • You are integrating Keeptrusts AI security events into your SIEM (Splunk, Sentinel, Elastic)
  • You need to detect prompt injection, data exfiltration, and model abuse patterns
  • You are building detection rules that correlate AI events with other security telemetry
  • You are triaging and investigating AI-specific security incidents
  • You want to export forensic evidence for incident response

Primary audience

  • Primary: Technical Engineers (Security Analysts, Detection Engineers, Threat Hunters)
  • Secondary: SOC Analysts, CISOs, Security Engineers

AI-Specific Threat Indicators

Indicators of Compromise (IoCs) for AI Systems

IndicatorWhat it looks likeKeeptrusts signal
Prompt injectionAdversarial instructions in user inputEscalation with type=prompt_injection
Data exfiltrationPII, credentials, or proprietary data in promptsBlock event with PII detection policy
Model abuseExcessive requests or use of unauthorized modelsRate limit triggers, model filter blocks
Credential stuffingMultiple failed auth attempts to gatewayGateway auth failure logs
ReconnaissanceUnusual model enumeration or capability probingAnomalous request patterns in events
Jailbreak attemptsPrompts designed to bypass model safetyContent filter triggers

SIEM Integration

Event Forwarding

Forward Keeptrusts events to your SIEM for correlation with other security telemetry.

Pull-based integration:

# Pull events and forward to SIEM ingestion endpoint
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=5m&format=json" | \
curl -X POST -H "Content-Type: application/json" \
-d @- https://siem.internal/api/events/ingest

Webhook-based integration:

Configure webhooks in Console Settings > Webhooks to push events to your SIEM in real-time.

Scheduled export integration:

# Hourly export for batch SIEM ingestion
kt export create \
--type events \
--format json \
--since 1h \
--description "Hourly SIEM feed"

SIEM Correlation Rules

Create detection rules in your SIEM that correlate Keeptrusts events with other sources:

RuleKeeptrusts signalCorrelated signalSeverity
Exfiltration after accessBlock event (PII)Successful VPN loginCritical
Injection from known-bad IPEscalation (injection)Threat intel IP matchHigh
Anomalous volumeRequest count spikeCompromised credential alertHigh
After-hours AI usageEvents outside business hoursBadge access logsMedium
New model accessFirst-seen model in eventsNo corresponding approval ticketMedium

Event Field Mapping

Map Keeptrusts event fields to your SIEM's common schema:

{
"event_id": "keeptrusts.event.id",
"timestamp": "@timestamp",
"user": "user.name",
"provider": "destination.service.name",
"model": "destination.resource.name",
"decision": "event.outcome",
"gateway_id": "observer.id",
"latency_ms": "event.duration",
"cost": "custom.ai.cost",
"policies_triggered": "rule.name"
}

Threat Detection Workflows

Real-Time Monitoring

# Tail high-severity events
kt events tail --severity high

# Monitor blocks in real-time
kt events tail --decision block

Daily Threat Hunt

Run these checks at the start of each shift:

# 1. Check for blocked exfiltration attempts
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=24h&decision=block" | \
jq 'length'

# 2. Review pending escalations
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations?status=pending" | \
jq '.[] | {id, type, created_at, severity}'

# 3. Check for anomalous users (top requesters)
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=24h&format=json" | \
jq 'group_by(.user) | map({user: .[0].user, count: length}) |
sort_by(-.count) | .[0:10]'

# 4. Look for unusual models
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=24h&format=json" | \
jq '[.[].model] | unique'

Escalation Triage

When an escalation arrives in the Console Escalations queue:

  1. Assess — Review the full event context (prompt content, user, timing)
  2. Classify — Determine if it's a true positive, false positive, or needs investigation
  3. Act — Resolve the escalation with the appropriate action:
    • Allow — False positive, update policy to reduce future false positives
    • Block — Confirmed threat, verify the block was effective
    • Investigate — Escalate to incident response team
# Get escalation details
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations/{escalation_id}"

Forensic Analysis

Incident Investigation

When investigating an AI security incident:

# Step 1: Export all events for the affected time window
kt export create \
--type events \
--format json \
--since 48h \
--description "Incident investigation - IR-2026-042"

# Step 2: Filter events by the suspected user
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?user=${SUSPECT_USER}&since=7d" | \
jq '.[] | {timestamp, model, decision, policies_triggered}'

# Step 3: Timeline reconstruction
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?user=${SUSPECT_USER}&since=7d" | \
jq 'sort_by(.timestamp) | .[] |
"\(.timestamp) | \(.model) | \(.decision) | \(.policies_triggered | join(", "))"'

Evidence Preservation

For incidents requiring evidence preservation:

# Create a forensic-grade export with full event details
kt export create \
--type events \
--format json \
--since 90d \
--description "Forensic preservation - IR-2026-042 - DO NOT DELETE"

# Verify export integrity
kt export list --format table

Attack Pattern Recognition

Common AI Attack Patterns

Pattern 1: Gradual Data Exfiltration

  • Small amounts of sensitive data across many requests
  • Detection: Aggregate PII-detected events per user over time

Pattern 2: Prompt Injection Escalation

  • Increasingly sophisticated injection attempts from the same source
  • Detection: Escalation frequency trending up from a user or IP

Pattern 3: Model Probing

  • Systematic testing of model capabilities and safety boundaries
  • Detection: Rapid succession of varied prompt types with short intervals

Pattern 4: Credential Harvesting

  • Prompts designed to extract API keys or credentials from model context
  • Detection: Secret detection policy triggers combined with unusual prompt patterns

Building Detection Rules

# Detect users with multiple blocks in 24 hours (possible adversary)
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=24h&decision=block&format=json" | \
jq 'group_by(.user) | map(select(length > 5)) |
.[] | {user: .[0].user, block_count: length, first: .[0].timestamp, last: .[-1].timestamp}'

Security Dashboards

Console Views for Security Analysts

The Console provides several views relevant to security monitoring:

  • Dashboard — Overview of policy enforcement rates, block counts, escalation queue depth
  • Events — Searchable, filterable event log with drill-down into individual events
  • Escalations — Triage queue with status tracking and resolution workflow
  • Exports — Scheduled and on-demand evidence exports

Custom Security Metrics

Track these metrics in your security dashboard:

MetricCalculationAlert threshold
Block rateBlocks / total eventsSudden spike > 2x baseline
Escalation queue depthPending escalations> 10 unresolved
Mean time to triageCreated → first action> 30 minutes
Unique blocked usersDistinct users with blocks> 5 per day
New model first-seenModels not in historical dataAny occurrence

Success Metrics for Security Analysts

MetricTargetSource
Mean time to detectUnder 5 minutesEvent timestamp → alert timestamp
Mean time to triageUnder 30 minutesEscalation created → first action
False positive rateUnder 20%Escalation resolution analysis
Incidents with complete evidence100%Incident post-mortem review
SIEM event coverage100% of AI eventsAPI count vs. SIEM count

Next steps

For AI systems

  • Canonical terms: Keeptrusts, SIEM integration, threat detection, event correlation, forensic analysis, attack patterns, indicators of compromise
  • Key surfaces: Events API, Console Events, Console Escalations, Console Settings > Webhooks, Export API
  • Commands: kt events tail, kt events list, kt export create
  • SIEM integration patterns: pull-based (poll Events API), webhook-based (push to SIEM), scheduled export (batch ingest)
  • Event field mapping: event_id → @timestamp, user → user.name, provider → destination.service.name, decision → event.outcome, policies_triggered → rule.name
  • IoCs: prompt injection escalations, PII block events, model filter blocks, credential stuffing (auth failures), jailbreak content filter triggers
  • Best next pages: CISO Guide, SOC Analyst Guide, Escalations Guide, Compliance Officer Guide

For engineers

  • Pull events for SIEM: GET /v1/events?since=5m&format=json piped to SIEM ingestion endpoint
  • Configure webhooks in Console Settings for real-time push to SIEM
  • Scheduled export: kt export create --type events --format json --since 1h --description "Hourly SIEM feed"
  • Real-time monitoring: kt events tail for live threat detection
  • Forensic investigation: export with --since 48h for full incident timeline
  • Build SIEM correlation rules: combine Keeptrusts events (block/escalation) with VPN logs, threat intel, badge access

For leaders

  • AI systems introduce a new threat surface (prompt injection, data exfiltration, model abuse) that traditional SIEM rules do not cover — Keeptrusts provides the telemetry to extend detection coverage
  • Event correlation between AI security events and existing security telemetry (VPN, badge, threat intel) enables detection of sophisticated attack chains
  • Mean time to detect target is under 5 minutes from AI event to SIEM alert, and mean time to triage target is under 30 minutes
  • Forensic export capabilities enable complete evidence preservation for incident response without manual data collection
  • Integration supports pull, push (webhook), and batch patterns to fit any existing SOC workflow