Initial Access (7 techniques)
MITRE ATLAS tactic
The adversary is trying to gain access to the AI system. The target system could be a network, mobile device, or an edge device such as a sensor platform. The AI capabilities used by the system could be local with onboard or cloud-enabled AI capabilities. Initial Access consists of techniques that use various entry vectors to gain their initial foothold within the system.
Techniques
- AML.T0010 — AI Supply Chain Compromise Maturity: realized
- AML.T0012 — Valid Accounts Maturity: realized
- AML.T0015 — Evade AI Model Maturity: realized
- AML.T0049 — Exploit Public-Facing Application Maturity: realized
- AML.T0052 — Phishing Maturity: realized
- AML.T0078 — Drive-by Compromise Maturity: demonstrated
- AML.T0093 — Prompt Infiltration via Public-Facing Application Maturity: demonstrated
AI red teaming training, taught by practitioners.
Hands-on courses on adversarial AI, prompt injection, and AI security operations.
View AI Security Courses