AI Compliance & Risk Frameworks
Welcome to the end user guide for AI Compliance & Risk Frameworks. This document is designed for security leaders, CISOs, and non-technical stakeholders to understand how we assess AI systems against industry standards—no coding required.
What You’ll Find Here
- Frameworks Overview: High-level summaries of each supported standard
- Controls (Sections): Policy requirements grouped into named checks
- Plugins (Checks): The atomic tests behind each control, shown by name
- Risk Scores & Reporting: How results are presented and interpreted
Frameworks Overview
We support six major frameworks—each a recognized AI or API security standard. Every framework contains multiple Controls (sometimes called Sections), which are implemented via one or more Plugins (checks).
Framework | Description |
---|---|
NIST AI RMF | U.S. Government guidance for managing AI risk across its lifecycle (23 Measures). |
EU AI Act | European regulation defining prohibited AI practices (Art 5) and high‑risk use cases (Annex III). |
OWASP LLM Top 10 | Community‑driven list of the top ten vulnerabilities in large‑language‑model applications. |
OWASP API Top 10 | Classic OWASP API security risks, tailored for AI‑powered APIs and web services. |
OWASP Agentic v1.0 | Emerging standard focused on agent‑style AI threats (e.g., Memory Poisoning). |
MITRE ATLAS | Adversarial tactics for LLM systems, modeled on MITRE ATT&CK (6 tactics). |
Controls
Controls are the policy requirements you’ll see grouped under each framework. Each control maps to one or more plugins. Examples:
- Measure 2.1 (NIST AI RMF): Privacy protections (plugins:
information_hazard:personal_identification:api-db-leak
,information_hazard:private_information:unauthorized-share
). - Art 5: Remote Biometric ID (Live) (EU AI Act): Live surveillance ban (plugins:
information_hazard:private_information:session_leak
,information_hazard:personal_identification:direct-exposure
). - Prompt Injection (OWASP LLM Top 10): Guards against malicious prompts (plugins:
defense_bypass:security_evasion:ascii_smuggling
,defense_bypass:prompt_injection:prompt_extraction
).
Controls are where your chosen standard meets the technical tests.
Plugins (Checks)
Plugins are the individual checks executed for each control. Reports list plugin names alongside pass/fail outcomes.
information_hazard:personal_identification:api-db-leak
— Detects leaks of personal data from APIs/databasesrbac
— Tests role‑based access control bypassdefense_bypass:security_evasion:ascii_smuggling
— Verifies obfuscation attacksmalicious_use:excessive_agency:functionality
— Measures unauthorized actions taken by AIdefense_bypass:prompt_injection:prompt_extraction
— Looks for system‑prompt leakage
Each plugin is reusable across multiple controls and frameworks.
📊 Risk Scores & Reporting
Assessment results are presented at two levels:
- Framework Risk Score: An overall 0–100% rating per selected framework.
- Control Pass/Fail: Each control is marked PASS or FAIL based on its plugins’ outcomes.
Sample Report Snippet:
Framework: NIST AI RMF Overall Risk: 78%
• Measure 1.1 – PASS
• Measure 2.1 – FAIL
• Measure 2.4 – FAIL
…
This format helps you quickly identify high‑risk frameworks and drill into specific controls for remediation.
📚 Framework Overviews
NIST AI RMF
A voluntary risk management framework from the U.S. National Institute of Standards and Technology.
• Scope: 4 core functions (Govern, Map, Measure, Manage) broken into 23 Measures.
• Goal: Guide organizations in identifying, assessing, and managing AI risk across its lifecycle.
EU AI Act
Legislative proposal from the European Union classifying AI systems by risk.
• Scope:
- Article 5: “Prohibited practices” (subliminal manipulation, social scoring, etc.)
- Annex III: “High-risk use cases” (biometric ID, critical infra, education, etc.)
• Goal: Ban unacceptable AI, tightly regulate high-risk systems.
OWASP LLM Top 10
A community-driven “Top 10” list of the most common vulnerabilities in large-language-model deployments.
• Scope: 10 controls from “Prompt Injection” to “Unbounded Consumption.”
• Goal: Provide a concise red-teaming checklist for LLM‐based applications.
OWASP API Top 10
The classic OWASP API security risks adapted for modern AI-powered services.
• Scope: 10 controls including Broken Auth, SSRF, Security Misconfiguration, etc.
• Goal: Highlight where APIs (including those wrapping AI) most often fail.
OWASP Agentic v1.0
An emerging OWASP list focused on autonomous, agentic AI threats.
• Scope: Currently 1 threat: “T1: Memory Poisoning.”
• Goal: Surface risks where an AI’s own “memory” can be subverted.
MITRE ATLAS
MITRE’s Adversarial Tactics for LLM Systems—modeled on the ATT&CK framework.
• Scope: 6 tactics (Exfiltration, Impact, Initial Access, ML Attack Staging, Reconnaissance, Resource Development).
• Goal: Map real-world red-team techniques to LLMs for structured threat emulation.
🗂 Detailed Controls & Plugin Mappings
Below are comprehensive tables mapping each control (section) in every framework to its underlying plugins. Use these as a reference to understand exactly which checks are executed under each requirement.
NIST AI RMF
Control ID | Control Title | Plugins |
---|---|---|
1.1 | Measure 1.1 | malicious_use:excessive_agency:functionality, harmful:misinformation-disinformation |
1.2 | Measure 1.2 | malicious_use:excessive_agency:functionality, harmful:misinformation-disinformation |
2.1 | Measure 2.1 | information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
2.2 | Measure 2.2 | information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
2.3 | Measure 2.3 | malicious_use:excessive_agency:functionality |
2.4 | Measure 2.4 | malicious_use:excessive_agency:functionality, harmful:misinformation-disinformation |
2.5 | Measure 2.5 | malicious_use:excessive_agency:functionality |
2.6 | Measure 2.6 | harmful:chemical-biological-weapons, harmful:indiscriminate-weapons, misinformation:unsafe_health_practices:unsafe-practices |
2.7 | Measure 2.7 | malicious_use:cybercrime:assistance, defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli |
2.8 | Measure 2.8 | defense_bypass:security_evasion:bfla, defense_bypass:security_evasion:bola, rbac |
2.9 | Measure 2.9 | malicious_use:excessive_agency:functionality |
2.10 | Measure 2.10 | information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
2.11 | Measure 2.11 | toxicity:hate_speech:harassment, toxicity:hate_speech:discrimination, toxicity:severe_toxicity:insults |
2.12 | Measure 2.12 | (no plugins) |
2.13 | Measure 2.13 | malicious_use:excessive_agency:functionality |
3.1 | Measure 3.1 | malicious_use:excessive_agency:functionality, harmful:misinformation-disinformation |
3.2 | Measure 3.2 | malicious_use:excessive_agency:functionality |
3.3 | Measure 3.3 | malicious_use:excessive_agency:functionality |
4.1 | Measure 4.1 | malicious_use:excessive_agency:functionality |
4.2 | Measure 4.2 | malicious_use:excessive_agency:functionality, harmful:misinformation-disinformation |
4.3 | Measure 4.3 | malicious_use:excessive_agency:functionality |
EU AI Act
Control ID | Control Title | Plugins |
---|---|---|
art5:subliminal-manipulation | Subliminal Manipulation (Art 5) | hijacking, intent, malicious_use:excessive_agency:functionality |
art5:exploitation-of-vulnerabilities | Exploitation of Vulnerabilities (Art 5) | hijacking, imitation, harmful:misinformation-disinformation |
art5:social-scoring | Social Scoring (Art 5) | harmful:misinformation-disinformation, human_computer_interaction:overreliance:interaction-harm |
art5:biometric-categorisation | Biometric Categorisation (Art 5) | information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, harmful:privacy |
art5:remote-biometric-id-live | Remote Biometric ID (Live) (Art 5) | information_hazard:private_information:session_leak, information_hazard:personal_identification:direct-exposure, harmful:privacy |
art5:remote-biometric-id-post | Remote Biometric ID (Post) (Art 5) | information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, harmful:privacy |
annex3:biometric-id | Biometric ID (Annex III) | information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, harmful:privacy |
annex3:critical-infrastructure | Critical Infrastructure (Annex III) | defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli, defense_bypass:hacking:ssrf, malicious_use:excessive_agency:functionality |
annex3:education | Education (Annex III) | harmful:misinformation-disinformation, misinformation:hallucination:knowledge-gaps, human_computer_interaction:overreliance:interaction-harm |
annex3:employment | Employment (Annex III) | imitation, information_hazard:personal_identification:direct-exposure, human_computer_interaction:overreliance:interaction-harm |
annex3:essential-services | Essential Services (Annex III) | information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, malicious_use:excessive_agency:functionality |
annex3:law-enforcement | Law Enforcement (Annex III) | information_hazard:personal_identification:direct-exposure, information_hazard:personal_identification:api-db-leak, harmful:privacy |
annex3:migration-border | Migration & Border (Annex III) | information_hazard:personal_identification:direct-exposure, harmful:privacy, toxicity:hate_speech:discrimination |
annex3:justice-democracy | Justice & Democracy (Annex III) | misinformation:hallucination:knowledge-gaps, harmful:misinformation-disinformation, information_hazard:personal_identification:direct-exposure |
OWASP LLM Top 10
Control ID | Control Title | Plugins |
---|---|---|
01 | Prompt Injection | defense_bypass:security_evasion:ascii_smuggling, defense_bypass:prompt_injection:indirect_injection, defense_bypass:prompt_injection:prompt_extraction |
02 | Sensitive Info Disclosure | information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering, harmful:privacy, defense_bypass:cybercrime:session_leak, defense_bypass:prompt_injection:prompt_extraction |
03 | Supply Chain | (no plugins) |
04 | Data & Model Poisoning | harmful:misinformation-disinformation, toxicity:hate_speech:discrimination, bias:age, bias:disability, bias:gender, bias:race, toxicity:discrimination:radicalization, misinformation:unreliable_experts:specialized |
05 | Improper Output Handling | defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli, defense_bypass:hacking:ssrf, debug-access |
06 | Excessive Agency | malicious_use:excessive_agency:functionality, rbac, defense_bypass:security_evasion:bfla, defense_bypass:security_evasion:bola, defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli, defense_bypass:hacking:ssrf |
07 | System Prompt Leakage | defense_bypass:prompt_injection:prompt_extraction, rbac, harmful:privacy, information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
08 | Vector & Embedding Weakness | defense_bypass:cybercrime:session_leak, harmful:privacy, information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
09 | Misinformation | misinformation:hallucination:knowledge-gaps, human_computer_interaction:overreliance:interaction-harm, harmful:misinformation-disinformation, misinformation:unreliable_experts:specialized |
10 | Unbounded Consumption | reasoning-dos, divergent-repetition |
OWASP API Top 10
Control ID | Control Title | Plugins |
---|---|---|
01 | Broken Object Level Authorization | defense_bypass:security_evasion:bola, rbac |
02 | Broken Authentication | defense_bypass:security_evasion:bfla, rbac |
03 | Broken Object Property Level Authorization | malicious_use:excessive_agency:functionality, human_computer_interaction:overreliance:interaction-harm |
04 | Unrestricted Resource Consumption | harmful:privacy, information_hazard:personal_identification:api-db-leak, information_hazard:private_information:session_leak |
05 | Broken Function Level Authorization | defense_bypass:security_evasion:bfla, defense_bypass:security_evasion:bola, rbac |
06 | Unrestricted Access to Sensitive Business Flows | harmful:misinformation-disinformation, human_computer_interaction:overreliance:interaction-harm |
07 | Server Side Request Forgery | defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli |
08 | Security Misconfiguration | harmful:privacy, information_hazard:personal_identification:api-db-leak, information_hazard:private_information:session_leak |
09 | Improper Inventory Management | misinformation:unreliable_experts:specialized, human_computer_interaction:overreliance:interaction-harm |
10 | Unsafe Consumption of APIs | debug-access, harmful:privacy |
OWASP Agentic v1.0
Control ID | Control Title | Plugins |
---|---|---|
T1 | Memory Poisoning | MEMORY_POISONING_PLUGIN_ID |
MITRE ATLAS
Control ID | Control Title | Plugins |
---|---|---|
exfiltration | Exfiltration | defense_bypass:security_evasion:ascii_smuggling, harmful:privacy, defense_bypass:prompt_injection:indirect_injection, information_hazard:personal_identification:api-db-leak, information_hazard:personal_identification:direct-exposure, information_hazard:private_information:session_leak, information_hazard:personal_identification:social-engineering |
impact | Impact | malicious_use:excessive_agency:functionality, hijacking, imitation |
initial-access | Initial Access | debug-access, malicious_use:cybercrime:assistance, defense_bypass:hacking:shell_injection, defense_bypass:hacking:sqli, defense_bypass:hacking:ssrf |
ml-attack-staging | ML Attack Staging | defense_bypass:security_evasion:ascii_smuggling, malicious_use:excessive_agency:functionality, misinformation:hallucination:knowledge-gaps, defense_bypass:prompt_injection:indirect_injection |
reconnaissance | Reconnaissance | competitors, policy, defense_bypass:prompt_injection:prompt_extraction, rbac |
resource-development | Resource Development | malicious_use:cybercrime:assistance, malicious_use:illegal_activities:illegal_drugs, harmful:indiscriminate-weapons |
🚀 Getting Started
- Select a Framework: Choose from NIST, EU AI Act, OWASP LLM, OWASP API, OWASP Agentic, or MITRE ATLAS.
- Run an Assessment: Use the intuitive UI—controls and plugins will auto‑select based on your choice.
- Review Scores: View overall framework scores and individual control results.
- Prioritize Remediation: Focus on failed controls and their underlying plugins.