Incident Response (IR) is an organized process an organization follows to recover from a security incident. Incident Management (IM) aims to handle these incidents effectively. GenAI applications have created new security risks, which require information security teams to extend their protection responsibilities to these systems.Incident Response (IR) is an organized process an organization follows to recover from a security incident. Incident Management (IM) aims to handle these incidents effectively. GenAI applications have created new security risks, which require information security teams to extend their protection responsibilities to these systems.

GenAI Incident Severity Matrix: Custom Scoring Model for Cybersecurity Response

2025/11/09 03:45

Information Technology (IT) Incident:

An IT incident is any unplanned interruption or reduction in the quality of an IT service. Incidents range from minor issues, such as a slow application, to critical disruptions, including server outages. Incident Management (IM) aims to handle these incidents effectively, ensuring IT services are restored promptly.

Cyber Incident:

An occurrence that may jeopardize the confidentiality, integrity, or availability of information or an information system, or constitutes a threat to security policies or security procedures.

Cyber Incident Response and Severity Levels:

Incident Response (IR) is an organized process an organization follows to recover from a security incident. The primary goal of a cybersecurity Incident Response program is to limit the damage and reduce the cost and recovery time of a security breach, ensuring business continuity and preserving the integrity of systems and data.

\ Incidents should have different severity levels because not all events have the same impact on the business. Assigning a severity level is a critical step that dictates the speed and scope of resources dedicated to the response.

GenAI Incident and Severity Matrix:

The general use of Artificial Intelligence (AI) methods, including Generative AI (GenAI) and large language models (LLMs) for personal and professional activities, became possible because of technological advancements in Generative Pre-trained Transformer (GPT) systems. GenAI applications have created new security risks, which require information security teams to extend their protection responsibilities to these systems.

\ The types of possible incidents include chatbots misleading customers, data leaked by AI agents, and many more. Security Operations Center (SOC) and Incident Response (IR) teams require an applied severity matrix for AI incidents to create a standardized system that determines the actual effects and severity levels of AI-related events.

\ The tool described in the article functions to determine incident severity levels for proper IR resource distribution. The new system integrates numerical data with human assessment factors by using a matrix-based evaluation method.

\ The Matrix contains five 'Impact Dimensions' which assess the effects on AI Functionality, Data Integrity, Operation Availability, Reputation, and Remediation efforts.

\ The tool enables the evaluation of each dimension through a scoring system, which can have Low (1), Medium (2), High (3), or Critical (4) scores.

Factors to Consider Before Incident Declaration:

A preliminary assessment needs to occur before declaring an AI incident because it helps establish the need for substantial resources and immediate triage procedures. AI systems possess distinct characteristics that distinguish them from all other systems.

\ The assessment needs to identify which AI systems took part in the incident and determine their significance to operational safety and business operations. Some examples of systems are chatbots, computer vision models, recommender systems, custom agents, etc. The evaluation of functional impact requires researchers to analyze how operational design changes when AI systems encounter adversarial attacks.

\ The system shows different levels of malfunction, which include minor performance problems that affect accuracy and speed, and major problems that result in system breakdowns and dangerous or unfair outcomes. Some performance issues may be around reduced accuracy and increased latency in responses from the model.

\ The system requires identification of two things according to the ATLAS framework: the nature of the detected anomaly and whether it stems from an adversarial attack or system malfunction. MITRE ATLAS (MITRE, 2025) allows users to identify particular attack techniques (e.g., LLM Prompt Injection, Poison Training Data, Denial of AI Service), which show both the attack goals and their corresponding classification.

\ The assessment includes verification of data integrity and confidentiality by checking for any compromise of training or validation data and sensitive information (PII, PHI, proprietary model IP) and exfiltration. The evaluation process must determine how much the AI system's output affects operational and systemic business service elements that rely on its results. Determination should be made about the extent of physical danger as well as financial loss to the business.

Calculating the Severity of the Declared Incident

The evaluation of declared incidents needs standardized methods to establish suitable response procedures. The incident severity assessment requires both numerical data points and human judgment through matrix-based systems to achieve accurate evaluation. The incident severity level reaches its maximum value from any relevant impact category, which allows severe elements to increase the whole incident to a higher priority status.

The scoring system for each relevant dimension (A-E) runs from 1 to 4 to determine incident severity for organizations. The incident severity rating becomes the maximum score from all evaluated dimensions, which determines the complete severity level. The incident can reach 'Critical' status if the Functional Impact score is '2', but the Data Impact reaches '4' while other dimensions range from '1' to '2'. The structured evaluation process allows organizations to get standardized results while speeding up the evaluation process.

\ Organizations need to choose between implementing this framework as is or creating their own version that matches their existing calculation systems to establish AI Incident severity levels.

Prioritize Risks Based on the Severity of the AI Incident:

The severity level calculation helps incident response teams decide which risks need their immediate attention when planning their response and allocating resources. The response to severe incidents demands an immediate deployment of a specialized team consisting of Cybersecurity experts, AI/ML Engineers, Data Scientists, Legal professionals, and PR representatives. The response to incidents with lower severity levels needs fewer personnel to manage them.

\ Critical incidents need immediate executive and board members, legal team, regulatory body, and public stakeholder notification, but low-severity incidents should only receive limited internal information sharing. System shutdowns, together with API disconnections, function as first defense mechanisms that stop high-severity incidents from spreading. The containment process for lower-severity incidents needs to stop major operational disruptions from happening.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Evernorth Losses Spotlight Digital Asset Treasury Risks

Evernorth Losses Spotlight Digital Asset Treasury Risks

The post Evernorth Losses Spotlight Digital Asset Treasury Risks appeared on BitcoinEthereumNews.com. The month-long slide in crypto prices hasn’t just hit major assets like Bitcoin (BTC) and Ether (ETH) — it’s also dealing heavy losses to digital asset treasury companies that built their business models around accumulating crypto on their balance sheets. That’s one of the key takeaways from a recent social media analysis by onchain data company CryptoQuant, which cited XRP-focused treasury company Evernorth as a prime example of the risks in this sector. Evernorth has reportedly seen unrealized losses of about $78 million on its XRP position, mere weeks after acquiring the asset.  The pullback has also battered shares of Strategy (MSTR), the original Bitcoin treasury play. The company’s stock has dropped by more than 26% over the past month, as Bitcoin’s price has slumped, according to Google Finance data. CryptoQuant noted a 53% drop in MSTR shares from their all-time high.  However, Strategy still holds a sizable unrealized gain on its Bitcoin reserves, with an average cost basis of roughly $74,000 per BTC, according to BitcoinTreasuries.NET. Source: CryptoQuant Meanwhile, BitMine, the largest Ether-holding corporation, is now sitting on approximately $2.1 billion in unrealized losses tied to its Ether reserves, according to CryptoQuant.  BitMine currently holds nearly 3.4 million ETH, having acquired more than 565,000 over the past month, according to industry data. Related: Ripple-backed Evernorth nears launch of publicly traded XRP treasury Digital asset treasury companies: Echoes of the dot-com bubble Digital asset treasury companies, or DATs, have come under mounting valuation pressure in recent months, with analysts cautioning that their market worth is increasingly tied to the performance of their underlying crypto holdings. Some analysts, including those at venture capital firm Breed, argue that only the strongest players will endure, noting that Bitcoin-focused treasuries may be best positioned to avoid a potential “death spiral.” The risk, they say,…
Share
BitcoinEthereumNews2025/11/09 10:15
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32