Skip to main content

Alerts

The AI Alert Management System provides intelligent threat detection, risk assessment, and automated response recommendations with executive briefing capabilities.

Overview

Monitor and respond to security alerts generated by AI agent activity, with integrated threat intelligence and compliance mapping.

Source: owkai-pilot-frontend/src/components/AIAlertManagementSystem.jsx (SEC-028)

Compliance: SOC 2 CC6.8, NIST SI-4, PCI-DSS 11.4

Dashboard Tabs

TabDescription
AlertsActive security alerts
AI InsightsAI-powered threat analysis
Threat IntelThreat intelligence feed
PerformanceAlert metrics and KPIs
Executive BriefAI-generated summaries

Alert List

Alert Information

Each alert displays:

┌─────────────────────────────────────────────────────────────┐
│ ⚠️ High Risk Agent Action Severity: HIGH │
├─────────────────────────────────────────────────────────────┤
│ Agent: support-ticket-agent │
│ MCP Server: aws-s3-connector │
│ Message: Enterprise Alert: Agent performed database_write │
├─────────────────────────────────────────────────────────────┤
│ NIST: SI-4 MITRE: T1041 Risk: 75/100 │
├─────────────────────────────────────────────────────────────┤
│ [✓ Acknowledge] [⚡ Escalate] [📋 Details] │
└─────────────────────────────────────────────────────────────┘

Alert Fields

FieldDescriptionSource
idUnique alert identifierDatabase
timestampWhen alert was createdDatabase
alert_typeClassification typeBackend
severityAlert severity levelBackend
messageAlert descriptionBackend
agent_nameHuman-readable agent nameExtracted from message
mcp_server_nameMCP server identifierExtracted from message
risk_levelRisk classificationAgent action
ai_risk_scoreAI-calculated risk (0-100)Agent action

Compliance Mappings

FieldDescriptionStandard
mitre_tacticMITRE ATT&CK tacticMITRE ATT&CK
mitre_techniqueMITRE ATT&CK techniqueMITRE ATT&CK
nist_controlNIST 800-53 controlNIST 800-53
nist_descriptionControl descriptionNIST 800-53

Alert Actions

Acknowledge Alert

  1. Review alert details
  2. Click Acknowledge
  3. Alert status changes to acknowledged

Audit Trail: Records acknowledger and timestamp.

Escalate Alert

  1. Click Escalate
  2. Select escalation level
  3. Add escalation notes
  4. Confirm escalation

Notification: Triggers security team notification.

Update Alert Status

StatusDescription
newUnreviewed alert
acknowledgedAlert reviewed
in_reviewUnder investigation
resolvedIssue addressed

AI Insights

The AI Insights tab provides automated threat analysis:

Threat Summary

{
"total_threats": 15,
"critical_threats": 2,
"high_threats": 5,
"medium_threats": 8,
"by_category": {
"data_access": 7,
"authentication": 4,
"system_config": 4
}
}

Predictive Analysis

MetricDescription
risk_scoreComposite risk score (0-100)
trend_directionincreasing, stable, decreasing
anomaly_detectedBoolean anomaly flag

AI Recommendations

Actionable recommendations prioritized by risk:

PriorityDescriptionTimeframe
CriticalImmediate action required< 1 hour
HighUrgent attention needed< 4 hours
MediumShould be addressed soon< 24 hours
LowMonitor and reviewWeekly

Threat Intelligence

The Threat Intel tab displays current threat landscape:

Intelligence Sources

  • Agent activity patterns
  • MITRE ATT&CK mapping
  • NIST control violations
  • Anomaly detection engine

Threat Categories

CategoryDescription
data_exfiltrationUnauthorized data access
privilege_escalationUnauthorized access elevation
lateral_movementNetwork traversal attempts
initial_accessEntry point attacks

Performance Metrics

Track alert system effectiveness:

Key Metrics (SEC-066)

MetricDescriptionSource
threats_detectedTotal alerts in periodUnified Metrics
threats_preventedAcknowledged alertsUnified Metrics
cost_savingsEstimated savingsUnified Metrics
accuracy_rateResolution rateUnified Metrics
false_positive_rateDismissed alertsUnified Metrics

SLA Compliance

SeverityTarget ResponseSLA
Critical15 minutes99%
High30 minutes95%
Medium60 minutes90%
Low120 minutes80%

Executive Brief

Generate AI-powered executive summaries:

Brief Contents

  • Summary: High-level threat overview
  • Key Metrics: Threats detected, prevented, cost savings
  • Recommendations: Prioritized action items
  • Risk Assessment: Overall security posture

Generation Options

OptionDescription
Time Period24h, 7d, 30d, 90d
FormatPDF, JSON
DistributionEmail list

API Reference

EndpointMethodDescription
/api/alertsGETList all alerts
/api/alerts/countGETGet alert count
/api/alerts/{id}PATCHUpdate alert status
/api/alerts/create-test-dataPOSTCreate test alerts

Source: ow-ai-backend/routes/alert_routes.py

Alert Filters

Filter Options

FilterOptions
Severitycritical, high, medium, low
Statusnew, acknowledged, in_review, resolved
Time RangeLast 24h, 7d, 30d, custom

Best Practices

  1. Review critical alerts immediately: SLA requires 15-minute response
  2. Use AI Insights: Let AI prioritize your review queue
  3. Document resolutions: Add notes for audit compliance
  4. Monitor trends: Watch for increasing threat patterns
  5. Generate weekly briefs: Keep stakeholders informed

Troubleshooting

Alerts not loading

Solution: Check authentication and refresh page.

AI Insights showing empty state

Solution: Verify organization has alert data; SEC-008 returns empty state when no alerts exist.

High false positive rate

Solution: Review and tune Smart Rules thresholds.


Source: AIAlertManagementSystem.jsx, alert_routes.py