AS-301h · Module 1
Playbook Architecture
4 min read
Good news, everyone! In AS-301a and AS-201c we covered the four-phase incident response structure: contain, investigate, remediate, communicate. That structure still applies. What changes at the 301 level is the specificity — each AI threat category requires its own playbook with category-specific containment actions, category-specific investigation steps, and category-specific indicators of compromise. A generic "security incident" playbook applied to a prompt injection attack produces a generic response. A prompt injection playbook produces a targeted response.
- Playbook Structure Every AI incident playbook contains: trigger conditions (what alerts activate this playbook), severity classification criteria, containment actions with execution sequence, investigation checklist with specific log queries, remediation steps, communication templates, and post-incident review requirements. Each section is pre-written, reviewed, and rehearsed.
- Threat Category Mapping Map each AI threat category to a dedicated playbook. Prompt injection: separate playbooks for direct, indirect, and stored injection. Data exfiltration: separate playbooks for output-based, tool-mediated, and conversation-leakage exfiltration. Model compromise: playbooks for behavior drift, system prompt extraction, and supply chain compromise. Specificity enables speed.
- Decision Trees Within each playbook, include decision trees for ambiguous situations. The alert shows an injection attempt — was it successful? Check the output log. The output contains sensitive data — was it sent to the user or intercepted by the guardrail? Check the guardrail log. Decision trees remove hesitation from a process where hesitation costs time.