Docs
Security Posture
Overview

Security Posture - AI Security Posture

Secure your AI operations and maintain compliance with enterprise-grade security features.

What is AI Security Posture?

Security Posture for AI ensures your AI systems:

  • Protect sensitive data from leaks
  • Guard against harmful outputs
  • Comply with regulations (SOC2, GDPR, HIPAA)
  • Audit all activities for forensics
  • Control access with fine-grained permissions

Key Capabilities

1. PII Detection & Protection

Automatically identify and protect sensitive data:

// AgenticAnts automatically detects PII
const trace = await ants.trace.create({
  name: 'customer-query',
  input: 'My SSN is 123-45-6789 and email is john@example.com'
})
 
// Dashboard shows:
// - PII Types: SSN, Email
// - Action: Automatically redacted
// - Alert: Security team notified
// - Audit Log: Created
 
// Query PII detections
const pii = await ants.secops.getPIIDetections({
  period: 'last_24h'
})
 
console.log(`Total PII detected: ${pii.total}`)
console.log(`Types: ${pii.types.join(', ')}`)
console.log(`Redacted: ${pii.redacted}`)

2. Security Guardrails

Prevent policy violations:

# Configure guardrails
ants.secops.create_guardrail({
    'name': 'content-policy',
    'rules': [
        {
            'type': 'no_pii',
            'action': 'redact',
            'severity': 'high'
        },
        {
            'type': 'no_toxic_content',
            'action': 'block',
            'threshold': 0.8
        },
        {
            'type': 'no_financial_advice',
            'action': 'warn',
            'notify': ['compliance@company.com']
        }
    ]
})
 
# Guardrails automatically enforced
response = agent.run(query)  # Checked against all rules

3. Compliance Reporting

Generate compliance reports automatically:

// Generate SOC2 report
const soc2 = await ants.secops.generateReport({
  framework: 'SOC2',
  period: 'Q4-2025',
  controls: [
    'access-control',
    'data-encryption',
    'audit-logging',
    'incident-response',
    'change-management'
  ]
})
 
// Download report
await soc2.download('SOC2_Q4_2025.pdf')
 
// GDPR data export
const gdpr = await ants.secops.exportUserData({
  userId: 'user_123',
  format: 'json',
  includeTraces: true,
  includeLogs: true
})

4. RBAC & Access Control

Fine-grained permissions:

# Create role
ants.secops.create_role({
    'name': 'data-scientist',
    'permissions': [
        'traces.read',
        'metrics.read',
        'dashboards.read',
        'projects.list'
    ],
    'resources': ['project-123', 'project-456'],
    'restrictions': {
        'no_pii_access': True,
        'no_export': True
    }
})
 
# Assign to user
ants.secops.assign_role('user@company.com', 'data-scientist')

PII Protection

Supported PII Types

// Automatically detected
const piiTypes = [
  'ssn',              // Social Security Numbers
  'email',            // Email addresses
  'phone',            // Phone numbers
  'credit_card',      // Credit card numbers
  'ip_address',       // IP addresses
  'passport',         // Passport numbers
  'drivers_license',  // Driver's license
  'address',          // Physical addresses
  'date_of_birth',    // Dates of birth
  'medical_record'    // Medical record numbers
]

PII Redaction

# Configure redaction
ants.secops.configure_pii({
    'detection': {
        'enabled': True,
        'types': ['ssn', 'email', 'phone', 'credit_card']
    },
    'redaction': {
        'method': 'hash',  # or 'mask', 'remove'
        'preserve_format': True
    },
    'alerting': {
        'threshold': 1,
        'channels': ['security-team']
    }
})
 
# Example redaction
# Input:  "My SSN is 123-45-6789"
# Output: "My SSN is [SSN:a3f8b2c...]"

PII Analytics

// Analyze PII exposure
const piiAnalytics = await ants.secops.getPIIAnalytics({
  period: 'last_30_days'
})
 
console.log(`Total PII instances: ${piiAnalytics.total}`)
console.log(`By type:`)
piiAnalytics.byType.forEach(type => {
  console.log(`  ${type.name}: ${type.count}`)
})
console.log(`Redacted: ${piiAnalytics.redacted}`)
console.log(`Exposed: ${piiAnalytics.exposed}`)  // Should be 0!

Security Guardrails

Content Filtering

# Toxic content detection
ants.secops.create_guardrail({
    'name': 'toxic-content-filter',
    'type': 'toxicity',
    'threshold': 0.7,
    'action': 'block',
    'models': ['perspective-api']
})
 
# Prompt injection prevention
ants.secops.create_guardrail({
    'name': 'prompt-injection-guard',
    'type': 'injection',
    'action': 'sanitize',
    'notify': True
})

Output Validation

// Validate LLM outputs
await ants.secops.createGuardrail({
  name: 'output-validator',
  rules: [
    {
      type: 'no_code_execution',
      pattern: /<script>|eval\(|exec\(/,
      action: 'block'
    },
    {
      type: 'no_harmful_instructions',
      categories: ['violence', 'illegal', 'harmful'],
      action: 'block'
    }
  ]
})

Custom Rules

# Custom security rule
ants.secops.create_custom_guardrail({
    'name': 'company-policy',
    'validator': lambda text: validate_company_policy(text),
    'action': 'review',  # Send for manual review
    'priority': 'high'
})

Compliance Frameworks

SOC 2

// SOC 2 compliance
await ants.secops.enableCompliance('SOC2', {
  controls: {
    'CC6.1': 'logical-access-controls',
    'CC6.6': 'encryption-at-rest',
    'CC6.7': 'encryption-in-transit',
    'CC7.2': 'monitoring-activities'
  },
  auditLog: true,
  dataRetention: '7_years'
})

GDPR

# GDPR compliance
ants.secops.enable_compliance('GDPR', {
    'data_portability': True,
    'right_to_erasure': True,
    'data_minimization': True,
    'consent_management': True
})
 
# Handle data subject requests
ants.secops.handle_dsr({
    'type': 'erasure',  # Right to be forgotten
    'user_id': 'user_123',
    'verify_identity': True
})

HIPAA

// HIPAA for healthcare
await ants.secops.enableCompliance('HIPAA', {
  phi_protection: true,
  encryption: 'AES-256',
  auditLog: true,
  accessControl: 'strict',
  minimumNecessary: true
})

Audit Logging

Comprehensive Logs

# Query audit logs
logs = ants.secops.get_audit_logs({
    'start_date': '2025-10-01',
    'end_date': '2025-10-31',
    'actions': ['data.access', 'data.export', 'user.login'],
    'users': ['user_123']
})
 
for log in logs:
    print(f"{log.timestamp}: {log.user} {log.action}")
    print(f"  Resource: {log.resource}")
    print(f"  IP: {log.ip_address}")
    print(f"  Status: {log.status}")
    print(f"  Details: {log.details}")

Tamper-Proof Logs

// Blockchain-backed audit logs
await ants.secops.configureAuditLog({
  storage: 'blockchain',
  provider: 'ethereum',
  immutable: true,
  retention: 'permanent'
})

Access Control

Role-Based Access Control (RBAC)

# Define roles hierarchy
roles = {
    'viewer': ['traces.read', 'metrics.read'],
    'developer': ['viewer', 'traces.write', 'projects.read'],
    'admin': ['developer', 'users.manage', 'settings.write'],
    'security': ['admin', 'audit.read', 'compliance.manage']
}
 
for role_name, permissions in roles.items():
    ants.secops.create_role(role_name, permissions)

Attribute-Based Access Control (ABAC)

// Advanced access control
await ants.secops.createPolicy({
  name: 'pii-access-policy',
  effect: 'deny',
  conditions: {
    user: { role: { notIn: ['security', 'compliance'] } },
    resource: { contains_pii: true }
  }
})

Service Accounts

# Create service account
service_account = ants.secops.create_service_account({
    'name': 'ci-cd-pipeline',
    'permissions': ['traces.write', 'metrics.write'],
    'ip_whitelist': ['192.168.1.0/24'],
    'rate_limit': 1000  # per hour
})
 
api_key = service_account.api_key

Data Privacy

Data Encryption

// Encryption at rest
await ants.secops.configureEncryption({
  atRest: {
    algorithm: 'AES-256-GCM',
    keyRotation: '90_days'
  },
  inTransit: {
    protocol: 'TLS 1.3',
    certificateAuthority: 'LetsEncrypt'
  }
})

Data Residency

# Configure data residency
ants.secops.configure_residency({
    'region': 'eu-west-1',
    'compliance': ['GDPR'],
    'no_cross_border': True
})

Data Retention

// Automatic data deletion
await ants.secops.configureRetention({
  traces: '90_days',
  logs: '7_years',  // For compliance
  pii: '30_days',
  backups: '1_year'
})

Incident Response

Security Incidents

# Create security incident
incident = ants.secops.create_incident({
    'type': 'data_breach',
    'severity': 'critical',
    'description': 'Potential PII exposure',
    'affected_users': ['user_123', 'user_456']
})
 
# Automated response
ants.secops.respond_to_incident(incident.id, {
    'actions': [
        'notify_users',
        'revoke_access',
        'rotate_keys',
        'enable_additional_monitoring'
    ]
})

Breach Notification

// GDPR requires notification within 72 hours
await ants.secops.notifyBreach({
  incidentId: 'inc_123',
  affectedUsers: ['user_123'],
  dataTypes: ['email', 'name'],
  mitigationSteps: [
    'Immediate access revocation',
    'Password reset required',
    'Additional monitoring enabled'
  ],
  notifyAuthority: true  // Notify data protection authority
})

Security Monitoring

Threat Detection

# Enable threat detection
ants.secops.enable_threat_detection({
    'anomaly_detection': True,
    'brute_force_protection': True,
    'unusual_access_patterns': True,
    'sensitivity': 'high'
})
 
# Get security alerts
alerts = ants.secops.get_security_alerts(status='open')
for alert in alerts:
    print(f"{alert.type}: {alert.description}")
    print(f"  Severity: {alert.severity}")
    print(f"  Time: {alert.timestamp}")

Penetration Testing

// Request pen test
await ants.secops.requestPenTest({
  scope: ['api', 'dashboard', 'data-layer'],
  frequency: 'quarterly',
  provider: 'HackerOne'
})

Best Practices

1. Zero Trust Architecture

# Assume breach, verify everything
ants.secops.enable_zero_trust({
    'verify_every_request': True,
    'least_privilege': True,
    'microsegmentation': True
})

2. Defense in Depth

// Multiple layers of security
await ants.secops.configureLayers([
  'network_security',
  'application_security',
  'data_security',
  'endpoint_security'
])

3. Regular Audits

# Schedule security audits
ants.secops.schedule_audit({
    'frequency': 'quarterly',
    'scope': 'full',
    'auditor': 'external'
})

4. Security Training

// Track security training
await ants.secops.trackTraining({
  required: ['data-privacy', 'incident-response'],
  frequency: 'annual',
  certification: true
})

Next Steps