Vulnerabilities
After you connect IBM Guardium AI Security to your cloud accounts, IBM Guardium AI Security creates insights and lists all security and compliance vulnerabilities that can affect the discovered AI deployments.
In the IBM Guardium main menu, click AI Security, and then click Vulnerabilities to see the Vulnerabilities dashboard. The Vulnerabilities dashboard gives you an overview of:
- Categorization in terms of criticality, high, medium, or low
- Categorization in terms of types of vulnerability entity, data, model, or application
- Categorization in terms of status of vulnerabilities, new, pending, ignore, or resolved
- A tabular list with more information about the vulnerabilities:
- Name of the vulnerability(high, medium, and low)
- Category of the vulnerability
- Entity type of the vulnerability (data, model, or application)
- Name of the AI deployment of the vulnerability
- Date of detection of the vulnerability
- Status of the vulnerability (new, pending, ignore, or resolved)
You can click a vulnerability that is listed in the table and view other details about the vulnerability's type of exposure, data, and AI deployment.