Control #
A
2
.
4
Respond to adversarial inputs in production
Monitor system usage to detect adversarial probing, repeated manipulation attempts, or suspicious prompt patterns. Define and enforce response actions such as logging, rate limits, degradations, or user blocks.
Evidence
We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.
Recommended actions
We'll recommend specific practices and actions for complying with this control.