AI Incident Response Runbook
This runbook covers AI-specific incidents: data exfiltration through an AI interface, prompt injection attacks, vendor breaches affecting AI services, and model misbehaviour with material consequences. Adapt general incident types to your existing IR process rather than running a parallel workflow. Bracketed fields are required customisation points.Owner: [Security / CISO name] Applies to: All AI tools in use at [Company] Escalation contact: [24/7 security contact or on-call rotation] Last reviewed: [Date]
Incident Types Covered
| Type | Description | Example |
|------|-------------|---------|
| Data exfiltration | Confidential or restricted data sent to an AI tool in violation of policy | Employee pastes a customer contract into a public AI interface |
| Prompt injection | Malicious input redirects AI behaviour to disclose data or perform unintended actions | Attacker embeds instructions in an uploaded document processed by an AI agent |
| Vendor breach | An approved AI vendor suffers a data breach affecting [Company] data | Vendor notifies [Company] that training pipelines were accessed without authorisation |
| Model misbehaviour | AI produces output that causes or risks material harm | AI-generated advice causes a customer to take a harmful action |
| Unauthorised tool use | Employee uses an unapproved AI tool with company data | Employee signs up for an AI service with their company email and pastes source code |
Phase 1 — Detection
Sources of detection
- Employee self-report via [security incident email / ticketing system]
- Vendor breach notification (contractual obligation, typically [X] hours)
- DLP alert triggered by AI-related data movement
- Anomaly detected in AI audit logs
- Customer complaint or external report
Initial triage (within [2] hours of detection)
- Log the incident in [ITSM / security platform] with: detection timestamp, reporter, AI tool involved, data type involved (if known), estimated scope.
- Assign an Incident Lead from [Security team].
- Classify severity using the matrix below.
Severity matrix
| Severity | Criteria | Target response time |
|----------|----------|----------------------|
| Critical | Restricted data (PHI, PCI, MNPI) involved; ongoing exfiltration; vendor breach confirmed | Immediate — escalate to [CISO] within 30 min |
| High | Confidential data involved; scope uncertain; regulatory notification likely | Within 2 hours |
| Medium | Internal data involved; scope limited; no regulatory trigger | Within 24 hours |
| Low | No sensitive data confirmed; policy violation only | Within 5 business days |
Phase 2 — Containment
Immediate actions (Critical and High incidents)
- Suspend access: revoke the affected user's access to the AI tool. If the tool is a shared service, assess whether broader suspension is warranted.
- Preserve evidence: capture screenshots, export session logs, preserve any vendor audit logs before they expire. Do not delete or modify potential evidence.
- Isolate affected accounts: if an AI agent has credentials or API keys, rotate them immediately.
- Notify vendor: contact the AI vendor's security team at [vendor security email / support portal]. Request confirmation of what was received and whether it was retained or used.
- Block exfiltration path: if the incident involved a specific integration or API endpoint, disable it pending investigation.
Vendor breach containment
- Request a detailed incident report from the vendor within [48] hours.
- Review the DPA to confirm vendor's breach notification obligations and timelines.
- Assess whether [Company] data in the vendor's environment can be deleted or quarantined.
- Preserve all vendor communications for legal and regulatory purposes.
Phase 3 — Eradication
- Identify the root cause: misconfigured tool, policy gap, user error, vendor vulnerability.
- Remove any persistent access the attacker or the incident may have created (tokens, API keys, session cookies).
- Confirm with the vendor that affected data has been purged from their systems (get written confirmation).
- Close the specific vulnerability or process gap that enabled the incident.
Phase 4 — Recovery
- Restore affected user access only after root cause is confirmed and controls are in place.
- Update the AI tool inventory with incident notes and revised risk rating.
- Re-run any AI-generated outputs that may have been contaminated or unreliable due to the incident.
- Communicate to affected business unit leaders: what happened, what was done, and what changed.
Phase 5 — Notification and Reporting
Internal
- Incident Lead notifies [CISO] within [X] hours of severity determination.
- [CISO] notifies [Executive sponsor / CEO] for Critical incidents.
- Legal and Privacy teams are looped in immediately for any incident with potential regulatory triggers.
Regulatory
- GDPR Article 33: notify supervisory authority within 72 hours if breach involves EU personal data.
- CCPA / CPRA: notify Attorney General within 72 hours for qualifying breaches.
- HIPAA: notify HHS within 60 days of discovery; notify affected individuals within 60 days.
- [Other applicable regulations]: [timeframes].
Customer notification
Follow [Company]'s customer breach notification policy. Draft notification language must be reviewed by [Legal] before sending.
Phase 6 — Lessons Learned
Conduct a post-incident review within [10] business days of closure for High and Critical incidents.
Review agenda:- Timeline reconstruction: what happened, and when did we detect it?
- Root cause analysis: why did this happen?
- Control gaps: what was missing or failed?
- Remediation tracking: are all action items assigned with owners and due dates?
- Policy updates: does the Acceptable Use Policy or Vendor Evaluation Checklist need revision?
- Training updates: is there a training gap that contributed to the incident?
Document findings in the incident record in [ITSM system]. Share a summary with the Security leadership team and relevant business owners.
Contact Directory
| Role | Name | Contact |
|------|------|---------|
| Security on-call | [Name] | [Phone / PagerDuty] |
| CISO | [Name] | [Email / Phone] |
| Legal / Privacy | [Name] | [Email] |
| HR (for policy violations) | [Name] | [Email] |
| [Vendor A] security | — | [Vendor security URL] |
| [Vendor B] security | — | [Vendor security URL] |
Runbook version: [Date]. Next scheduled review: [Date].