Skip to content

AI Strategy Implementation

5 automated security scanners


Purpose: The AI Interaction Security Training Scanner is designed to assess user awareness, risk understanding, and adherence to best practices within an organization by evaluating its internal security documentation, public policy pages, trust center information, and compliance certifications. This tool helps organizations identify gaps in their security posture and ensure they are compliant with industry standards and regulations.

What It Detects:

  • Policy Indicators: The scanner identifies the presence of key security policies such as “security policy,” “incident response,” “data protection,” and “access control.”
  • Maturity Indicators: It detects mentions of industry standards and practices like SOC 2, ISO 27001, penetration testing, and vulnerability scanning.
  • Documentation Accessibility: The scanner checks if the company’s security documentation is easily accessible on their website or public platforms.
  • Policy Compliance: It evaluates whether the organization adheres to recognized compliance certifications and standards.
  • Trust Center Information: The scanner assesses the availability and quality of trust center information, ensuring transparency and comprehensive security practices are communicated.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps organizations maintain a robust security posture by identifying and addressing gaps in their policies, practices, and compliance certifications. It ensures that the organization is compliant with industry standards and regulations, which is essential for maintaining trust and credibility with stakeholders.

Risk Levels:

  • Critical: The scanner flags conditions where there are significant vulnerabilities or non-compliance with critical security standards.
  • High: The scanner identifies areas of high risk such as missing or inadequate policies and practices that could lead to severe breaches.
  • Medium: The scanner detects potential risks in compliance with industry standards and the completeness of trust center information.
  • Low: The scanner flags informational findings about accessibility and availability of documentation, which are important but not immediately critical.
  • Info: Informational findings regarding general security practices that enhance transparency and user awareness without directly impacting risk levels.

Example Findings:

  1. A company lacks a comprehensive “security policy” document on its website, posing a high risk for potential cyber threats.
  2. The organization’s trust center provides minimal information about data protection policies, indicating a medium risk in terms of transparency and user understanding.

Purpose: The Public AI Interface Limitations Scanner is designed to identify potential security vulnerabilities and compliance issues related to how a domain is exposed to the public. It achieves this by probing public interfaces using DNS, HTTP, TLS, ports, and APIs to detect usage restrictions, information barriers, and access controls.

What It Detects:

  • Security Headers Analysis: Checks for the presence and correctness of critical security headers such as Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options.
  • TLS/SSL Configuration Issues: Identifies outdated or insecure TLS versions (e.g., TLSv1.0, TLSv1.1) and weak cipher suites (e.g., RC4, DES, MD5).
  • DNS Record Analysis: Examines TXT, MX, NS, CAA, and DMARC records for proper configuration, including SPF policies, DMARC settings, and DKIM presence.
  • HTTP Redirections and Content: Analyzes HTTP redirects to ensure they do not lead to insecure or unauthorized endpoints, and checks for sensitive information in the content of HTTP responses.
  • Port Scanning and Service Fingerprinting: Scans common ports (e.g., 80, 443) to identify open services and attempts to fingerprint services running on these ports to detect potential vulnerabilities or misconfigurations.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com).

Business Impact: This scanner is crucial for ensuring that public interfaces are securely configured, which directly impacts the overall security posture of an organization by preventing unauthorized access and potential data breaches.

Risk Levels:

  • Critical: Conditions where critical vulnerabilities or compliance issues are identified in the public interface, such as missing or incorrectly configured security headers, use of weak cipher suites, or misconfigured DNS records that could lead to significant security risks.
  • High: Conditions where high-severity vulnerabilities or non-compliance with recommended practices are detected, potentially affecting data confidentiality and integrity but not posing an immediate threat.
  • Medium: Conditions where medium-severity issues are identified, which may require attention for improvement in security posture without being critical to overall system functionality.
  • Low: Informational findings that do not directly impact security or compliance but can be useful for continuous improvement and monitoring of public interfaces.
  • Info: Findings that provide additional context about the configuration and usage of the domain’s public interface, which are informative rather than actionable from a risk management perspective.

Example Findings:

  1. A domain has an outdated TLS version (TLSv1.0) in use, which is considered insecure for modern cryptographic standards.
  2. The X-Frame-Options header is missing or incorrectly configured, allowing clickjacking attacks.

Purpose: The Corporate Model Customization Scanner is designed to identify potential security risks associated with internal AI strategy implementation by detecting private model development, custom instance deployment, and controlled training activities through analysis of public records, OSINT sources, and job board disclosures.

What It Detects:

  • Private Model Development Indicators: The scanner searches for mentions of in-house model creation or proprietary algorithms, identifies references to custom data sets used for training models, and looks for descriptions of internal research teams focused on AI development.
  • Custom Instance Deployment Patterns: It detects deployments of custom cloud instances (AWS, Azure, GCP), identifies use of containerization technologies like Docker and Kubernetes, and checks for mentions of infrastructure as code tools such as Terraform or Ansible.
  • Controlled Training Activities: The scanner searches for references to controlled training environments, identifies mentions of data labeling processes or synthetic data generation, and looks for descriptions of model validation and testing procedures.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner helps organizations identify potential security risks associated with internal AI strategy implementation, enabling proactive measures to mitigate risks and protect sensitive information.

Risk Levels:

  • Critical: High-severity findings include unauthorized access to sensitive data used in training, security breaches related to AI models or deployments, and vulnerabilities discovered in custom models.
  • High: Significant risks involve the deployment of unregulated cloud instances, use of proprietary algorithms without proper authorization, and uncontrolled environments for model development and testing.
  • Medium: Medium-severity findings include mentions of data labeling processes that may not comply with regulatory standards or ethical guidelines, as well as inadequate descriptions of controlled training activities.
  • Low: Lower-level risks pertain to the use of specific containerization tools and infrastructure as code practices without clear documentation or compliance checks.
  • Info: Informational findings include mentions of experience with specific cloud providers in job postings, which may indicate a strong technical capability but does not directly impact security unless misused.

Example Findings:

  1. “We discovered a significant data breach involving unauthorized access to customer payment information during model training.”
  2. “The company is using proprietary algorithms that are not documented or reviewed for compliance with internal policies and external regulations.”


Purpose: The Pre-training Data Screening Scanner is designed to ensure that AI models are trained on clean, compliant datasets by detecting and evaluating training data review processes, content filtering mechanisms, and the removal of sensitive information. This helps maintain ethical standards and prevents biases or sensitive data from being propagated in AI systems.

What It Detects:

  • Training Data Review Processes: Identifies documentation or policies related to the review and validation of training datasets, ensuring data quality and compliance with organizational standards.
  • Content Filtering Mechanisms: Detects mentions of content filtering tools, techniques, or processes used to sanitize training data, indicating automated or manual filtering systems.
  • Sensitive Information Removal: Identifies policies or procedures aimed at removing sensitive information from datasets through methods such as anonymization or redaction.
  • Compliance Certifications: Searches for mentions of compliance certifications related to data handling and security, verifying adherence to recognized standards for data protection and management.
  • Policy Review and Manual Evaluation: Evaluates internal policies and procedures for training data screening, including manual evaluation processes or audits conducted by human reviewers.

Inputs Required:

  • domain (string): Primary domain to analyze, e.g., acme.com. This helps in identifying relevant security documentation on the company’s website.
  • company_name (string): Company name for statement searching, e.g., “Acme Corporation”. This is used to search within policy statements and documents related to the organization.

Business Impact: Maintaining clean training datasets is crucial for building AI models that are unbiased and compliant with data handling regulations. Ethical standards in AI development can significantly impact a company’s reputation, legal compliance, and operational integrity.

Risk Levels:

  • Critical: Conditions where there is no documented security policy or critical sensitive information remains unredacted. This poses a high risk of ethical breaches and potential legal consequences.
  • High: Inadequate content filtering mechanisms that could lead to the inclusion of sensitive data in training datasets, which may result in model bias or non-compliance with regulatory standards.
  • Medium: Missing compliance certifications or incomplete manual evaluation processes, indicating potential gaps in data handling practices but not posing immediate critical risks.
  • Low: Minimal presence of redaction tools or basic compliance statements, showing a lower risk profile but still requiring improvement for enhanced ethical AI development.
  • Info: Informal policies and minimal screening mechanisms that do not significantly impact the core business operations but are indicative of potential future issues without proactive intervention.

Example Findings:

  • A company may have an incomplete or non-existent security policy, which could lead to critical findings indicating a lack of comprehensive data handling practices.
  • Inadequate content filtering processes might be flagged as high risk if the company does not use any tools for sanitizing training datasets, potentially leading to regulatory fines and reputational damage.

Purpose: The Model Query Hygiene Practices Scanner is designed to ensure that organizations adhere to strict guidelines and standards regarding prompt security policies, information sharing practices, and interaction safeguards. This tool analyzes company documentation and public policy pages to identify potential vulnerabilities in how queries and interactions are handled, thereby enhancing overall security posture.

What It Detects:

  • Security Policy Indicators: The scanner identifies the presence of “security policy” language, checks for “incident response” procedures, verifies “data protection” measures, and ensures “access control” protocols are mentioned.
  • Maturity Indicators: It looks for SOC 2 compliance certifications, searches for ISO 27001 standards adherence, detects mentions of penetration testing activities, and identifies vulnerability scanning or assessment processes.
  • Information Sharing Policies: The scanner evaluates the transparency and clarity of information shared in security disclosures, checks for guidelines on how to handle sensitive queries, and ensures there are protocols for sharing data securely.
  • Interaction Safeguards: It identifies measures to protect against unauthorized access through query channels, verifies safeguards in place for handling user interactions, and detects policies related to incident reporting and response.
  • Compliance Certifications: The scanner searches for references to compliance certifications like SOC 2, ISO 27001, etc., ensures that the company adheres to recognized security standards, and validates that necessary security assessments are conducted regularly.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps organizations maintain a robust security framework that not only protects sensitive information but also ensures transparency and accountability in handling user queries and interactions, thereby mitigating potential risks associated with data breaches or unauthorized access.

Risk Levels:

  • Critical: The risk level is critical when there are significant vulnerabilities in the security policy, lack of compliance certifications, or inadequate interaction safeguards that could lead to severe consequences such as substantial data loss or exposure.
  • High: High risk levels are indicated by incomplete or poorly defined security policies, absence of necessary assessments like penetration testing, and unclear information sharing guidelines.
  • Medium: Medium risks pertain to partial adherence to security practices or when some aspects of interaction safeguards need improvement.
  • Low: Low risks are associated with well-defined policies that align with industry standards but may require continuous monitoring for any emerging threats.
  • Info: Informational findings involve minor deviations from best practices that do not pose immediate risk but could be improved for enhanced security posture.

Example Findings:

  1. The scanner might flag a company with no mention of a security policy, indicating a critical risk as it lacks the foundational element of protection against cyber threats.
  2. A medium-risk finding would be detected in an organization that has outdated compliance certifications or does not conduct regular vulnerability assessments, which could lead to potential exposure and vulnerabilities being exploited.