Playbook: Prompt Injection Attack
Detection
- Unusual command patterns in logs
- Security control bypass attempts
- Unexpected file access or command execution
Containment
- Terminate affected session immediately
- Block source IP/user if applicable
- Preserve session logs and context
- Enable enhanced monitoring
Investigation
- Review session history for injection point
- Identify what actions were taken
- Determine scope of compromise
- Check for data exfiltration
Eradication
- Patch injection vector if found
- Update input validation rules
- Add detection signatures
Recovery
- Restore from clean state if needed
- Re-enable services with monitoring
- Verify controls are functioning
Playbook: Sandbox Escape
Detection
- File access outside sandbox boundaries
- Symlink following alerts
- Path traversal patterns
Containment
- CRITICAL: Terminate all sessions immediately
- Disable AI assistant service
- Isolate affected systems
- Preserve forensic evidence
Investigation
- Identify escape mechanism
- Determine all accessed files
- Check for persistence mechanisms
- Assess data exposure
Eradication
- Patch escape vulnerability
- Remove any persistence
- Reset compromised credentials
- Update sandbox rules
Recovery
- Redeploy from trusted image
- Rotate all credentials
- Re-enable with enhanced monitoring
Playbook: Credential Exposure
Detection
- Sensitive file access alerts
- Secret patterns in output logs
- Credential usage from unexpected location
Containment
- Immediately rotate exposed credentials
- Revoke active sessions using those credentials
- Block external access temporarily
Investigation
- Identify which credentials exposed
- Determine exposure method
- Check for credential usage
- Assess downstream impact
Eradication
- Remove credentials from accessible locations
- Update sensitive file patterns
- Enhance output redaction
Recovery
- Deploy new credentials
- Update dependent services
- Enable credential monitoring
Playbook: Malicious Plugin
Detection
- Unexpected network connections
- Plugin accessing unauthorized resources
- Anomalous plugin behavior
Containment
- Disable suspected plugin immediately
- Block plugin network access
- Isolate affected sessions
Investigation
- Analyze plugin code
- Review plugin permissions used
- Check for data exfiltration
- Identify installation source
Eradication
- Remove malicious plugin
- Block plugin source
- Update plugin allowlist
Recovery
- Restore clean plugin configuration
- Re-enable plugin verification
- Scan for other compromised plugins
Playbook: Data Exfiltration
Detection
- Large outbound data transfers
- Connections to unknown destinations
- Encoded data in requests
Containment
- Block egress to suspicious destinations
- Terminate affected sessions
- Enable full packet capture
Investigation
- Identify exfiltration destination
- Determine data exfiltrated
- Find exfiltration mechanism
- Assess data sensitivity
Eradication
- Block exfiltration vector
- Update egress rules
- Enhance DLP controls
Recovery
- Assess breach notification requirements
- Implement enhanced monitoring
- Review data access patterns