Viewing and managing vulnerabilities in IBM Guardium AI Security
After you connect IBM Guardium AI Security to your cloud accounts, IBM Guardium AI Security creates insights and lists all security and compliance vulnerabilities that can affect the discovered AI deployments.
AI Security This content is available through the Guardium AI Security module.
In the main menu, click Intelligence>Vulnerabilities>AI Deployments to see the Vulnerabilities page. The Vulnerabilities page gives you an overview of:
- Categorization in terms of criticality, high, medium, or low
- Categorization in terms of types of vulnerability entity, data, model, or application
- Categorization in terms of status of vulnerabilities, new, pending, ignore, or resolved
- A tabular list with more information about the vulnerabilities:
- Name of the vulnerability(high, medium, and low)
- Category of the vulnerability
- Entity type of the vulnerability (data, model, or application)
- Name of the AI deployment of the vulnerability
- Date of detection of the vulnerability
- Status of the vulnerability (new, pending, ignore, or resolved)
You can click a vulnerability that is listed in the table and view other details about the vulnerability's type of exposure, data, and AI deployment.