Resources

Guides

For educational purposes only; not legal advice.

PlaybookSOC

SOC Triage Signals for LLM Misuse

High-signal indicators for policy bypass attempts, unsafe tool use, and suspicious context manipulation.

  • Repeated instruction override attempts
  • Tool argument anomalies / schema violations
  • Unusual retrieval patterns (source churn, low provenance)
GuideDesign review

Guardrails That Survive Real Users

How to design guardrails for ambiguity, social engineering, and long context windows.

  • Boundary enforcement at tool layer
  • Policy checks at output + action stages
  • Fail-closed patterns for high-risk actions
ChecklistImplementation

RAG Safety Checklist

A practical checklist for retrieval integrity, context bounding, and safe summarization.

  • Provenance scoring and allowlisted sources
  • Redaction rules + sensitive data bounding
  • Poisoning resilience tests in CI gates
GuideGovernance

Evidence & Audit Trail Essentials

What to capture so reviews are defensible: decisions, tests, outcomes, and mitigations.

  • Minimal evidence schema
  • Retention and access controls
  • Change tracking for policies
Back to Resources Overview