Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

SOC Analyst Guide: AI Security Operations

As a SOC Analyst monitoring AI-related threats, you need to detect prompt injection attacks, data exfiltration attempts, and policy violations in real time. Keeptrusts provides the security telemetry, alert workflows, and investigation tools that integrate into your existing SOC operations.

Use this page when

  • You are triaging AI security alerts (prompt injection, data exfiltration, credential exposure)
  • You need incident response playbooks for AI-specific threats
  • You are monitoring real-time AI events during SOC shifts
  • You need to document findings and hand off AI incidents between shifts
  • You want to determine whether a policy trigger is malicious or a false positive

Primary audience

  • Primary: Technical Engineers (SOC Analysts, Tier 1/2 Analysts, Incident Responders)
  • Secondary: Security Analysts, Security Engineers, CISOs

AI Threat Landscape

Threat Categories Monitored by Keeptrusts

ThreatDescriptionDetection PolicySeverity
Prompt injectionMalicious inputs to manipulate AI behaviorprompt-injectionCritical
Data exfiltrationPII or IP leakage via AI promptspii-detector, dlp-filterHigh
Jailbreak attemptsBypassing model safety guardrailscontent-filterHigh
Credential exposureAPI keys or secrets in promptsdlp-filterCritical
Abuse patternsExcessive usage or automated attacksrate_limitMedium
Quality degradationModel producing unreliable outputsquality-scorerLow

Alert Triage Workflow

Priority Classification

When a Keeptrusts policy triggers, classify the alert by severity:

PriorityCriteriaResponse TimeAction
P1 — CriticalPrompt injection detected, credential exposureUnder 15 minutesInvestigate immediately, block source
P2 — HighPII exfiltration attempt, jailbreak patternUnder 1 hourInvestigate, escalate if confirmed
P3 — MediumContent filter block, rate limit triggerUnder 4 hoursLog and review in next triage cycle
P4 — LowQuality score below thresholdNext shiftReview during quiet period

Real-Time Alert Monitoring

# Tail live events for security-relevant policy triggers
kt events tail --policy prompt-injection,pii-detector,dlp-filter

# Check for critical blocks in the last hour
kt events list --since 1h --action block --limit 50

In the Console, the Events page provides filterable views. Apply filters for policy type, action, and time range to focus on security-relevant events.

Initial Triage Steps

For each alert:

  1. Identify the source — Check the user, gateway, and originating application
  2. Review the event — Examine the triggering policy and matched content
  3. Assess intent — Determine if the trigger is malicious or a false positive
  4. Classify severity — Assign a priority based on the table above
  5. Take action — Block, escalate, or document per your playbook
# Get details on a specific event
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=1h&policy=prompt-injection&limit=10"

Incident Response Playbooks

Playbook: Prompt Injection Detected

Trigger: prompt-injection policy fires with block action.

StepActionTool
1Confirm the detection in event logskt events list --policy prompt-injection --since 1h
2Identify the source user and applicationConsole Events → event details
3Check for repeated attempts from the same sourceFilter events by user
4Block the source if attack is sustainedRevoke gateway key in Console Settings > Gateway Keys
5Escalate to security engineering if novel techniqueConsole Escalations → create escalation
6Document findings in incident recordExport event evidence

Playbook: Data Exfiltration Attempt

Trigger: pii-detector or dlp-filter fires with sensitive data detected in outbound prompts.

StepActionTool
1Review the matched content type and patternConsole Events → event details
2Determine if the data is genuine PII or false positiveManual review
3If genuine, identify the scope of exposureCheck if data reached the LLM provider
4Notify the privacy team if confirmed PII exposureInternal escalation process
5Review the user's recent activity for patternskt events list --user <user_id> --since 24h
6Strengthen DLP patterns if a gap is identifiedUpdate dlp-filter policy configuration

Playbook: Credential Exposure

Trigger: dlp-filter detects API keys, tokens, or secrets in prompts.

# Immediately check for credential exposure events
kt events list --since 1h --policy dlp-filter --action block

# Export evidence for incident documentation
kt export create \
--type events \
--format csv \
--since 24h \
--policy dlp-filter \
--description "Credential exposure incident evidence"

Response: Rotate any exposed credentials immediately. The gateway blocked the request, but treat the credential as potentially compromised.

Escalation Procedures

When to Escalate

ConditionEscalate ToPriority
Novel prompt injection techniqueSecurity engineeringP1
Confirmed PII breachPrivacy officer + legalP1
Sustained attack from single sourceIncident commanderP1
Repeated false positives disrupting usersPolicy engineeringP3
Provider-side anomaliesVendor managementP2

Creating Escalations

In the Console, navigate to Escalations to create and manage escalation tickets. Each escalation links to the triggering events and tracks resolution status.

# Check pending escalations at shift start
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations?status=pending"

Log Analysis

Key Event Fields for Investigation

When analyzing Keeptrusts events, focus on these fields:

FieldUse Case
policyWhich policy triggered
actionWhat enforcement action was taken (block, redact, escalate, allow)
userThe requesting user or application
gatewayWhich gateway processed the request
modelTarget LLM model
providerLLM provider
timestampCorrelation with other security events

Correlation with SIEM

Export Keeptrusts events to your SIEM for correlation with other security data sources:

# Scheduled export for SIEM ingestion
kt export create \
--type events \
--format csv \
--since 24h \
--description "Daily SIEM feed"

Threat Hunting

Hunting Queries

Look for patterns that standard policies might not catch:

# Unusual volume from a single user
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=24h&group_by=user"

# Model usage anomalies — users switching to unexpected models
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events?since=7d&group_by=model"

# After-hours activity
kt events list --since 24h --limit 100

Indicators of Compromise for AI Systems

IoCDetection Method
Repeated prompt injection patternsprompt-injection event clustering
Gradual data exfiltrationIncreasing PII detection volume per user
Credential stuffing via AIHigh-volume requests from new sources
Reconnaissance promptsUnusual model or capability probing

Shift Handoff Procedures

End-of-Shift Checklist

Before handing off to the next analyst:

  • Review all P1/P2 alerts and document status
  • Update open escalations with current findings
  • Note any anomalous patterns observed during shift
  • Verify gateway health across all environments
  • Export shift summary data
# Generate shift summary data
kt events list --since 8h --action block,escalate --limit 100

# Check current escalation queue depth
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/escalations?status=pending"

Shift Handoff Template

SectionContent
Active incidentsList any ongoing P1/P2 incidents
Escalation queueNumber of pending escalations and oldest item
Notable eventsUnusual patterns or new threat indicators
Policy changesAny policy modifications during shift
Action itemsTasks requiring follow-up on next shift

SOC Analyst Daily Workflow

TimeTaskTool
Shift startReview handoff notes and escalation queueConsole Escalations
ContinuousMonitor event stream for security alertskt events tail
HourlyTriage new P1/P2 alertsConsole Events
Mid-shiftThreat hunting sweepEvent queries + correlation
Shift endComplete handoff checklistExport + documentation

Success Metrics for SOC Operations

MetricTargetSource
Mean time to triageUnder 15 min for P1, under 1 hr for P2Escalation timestamps
False positive rateUnder 15%Triage review data
Prompt injection detection rate> 95%Policy effectiveness audit
Shift handoff completeness100% of shifts documentedHandoff records
Escalation resolution SLAMet for > 95% of escalationsConsole Escalations

For AI systems

  • Canonical terms: Keeptrusts, alert triage, incident response playbook, SOC operations, threat detection, real-time monitoring, shift handoff
  • Key surfaces: Console Events (filterable by policy, action, time), Console Escalations, Console Settings > Gateway Keys (revocation), Events API
  • Commands: kt events tail --policy prompt-injection,pii-detector,dlp-filter, kt events list --since 1h --action block, kt export create
  • Priority classification: P1 Critical (under 15 min), P2 High (under 1 hr), P3 Medium (under 4 hr), P4 Low (next shift)
  • Playbooks: Prompt Injection Detected, Data Exfiltration Attempt, Credential Exposure
  • Triage steps: Identify source → Review event → Assess intent → Classify severity → Take action
  • Best next pages: Security Analyst Guide, CISO Guide, Escalations Guide, Events Guide

For engineers

  • Real-time alert monitoring: kt events tail --policy prompt-injection,pii-detector,dlp-filter
  • Check critical blocks: kt events list --since 1h --action block --limit 50
  • Investigate specific events: GET /v1/events?since=1h&policy=prompt-injection&limit=10
  • Block sustained attacks: revoke gateway key in Console Settings > Gateway Keys
  • Export incident evidence: kt export create --type events --format json --since 48h --description "Incident IR-2026-XXX"
  • Console Events page supports filtering by policy type, action, time range, and user for focused investigation

For leaders

  • AI threats (prompt injection, data exfiltration, credential exposure) require dedicated SOC coverage with AI-specific triage workflows and response playbooks
  • Priority-based response times (P1 under 15 min, P2 under 1 hr, P3 under 4 hr) align AI incident response with existing SOC SLAs
  • Gateway key revocation provides immediate containment for sustained attacks without disrupting other users
  • Shift handoff procedures ensure no AI security incident is lost between SOC shift rotations
  • False positive rate target under 20% ensures analyst time is spent on genuine threats, not policy noise

Next steps