What to Log in AI Systems
Learn what telemetry defenders need from AI systems, why prompts alone are not enough, and how logging decisions shape detection and incident response later.
Listen to hear this room section by section.
Task 1
Why AI Telemetry Is Different
Many traditional applications can be investigated with request logs, database logs, and application errors. AI systems need more. Defenders often need to know what prompt reached the model, what documents were retrieved, which tool calls were considered or executed, which policy checks ran, and how the final output was shaped.
That does not mean "log absolutely everything forever." It means defenders need enough telemetry to reconstruct how the system reached an unsafe or suspicious result.
Without that detail, an AI incident can look like random bad behavior instead of an explainable chain of decisions.
Task 2
What Defenders Usually Want To See
Useful AI telemetry often includes the incoming request, identifiers for the prompt or policy version, retrieval sources and trust labels, tool selection and arguments, policy decisions such as blocks or approvals, output transformations such as redaction or fallback, and the final user-visible result.
Identity and scope data also matter. Defenders often need the tenant, user role, session, model or pipeline version, and correlation identifiers that tie together events across systems.
The goal is not to make every log human-readable at a glance. The goal is to make investigation possible when something goes wrong.
Task 3
Logging Without Creating New Risk
AI telemetry can create its own risks if teams log too much sensitive content without control. Prompts may contain personal data, internal notes, account details, or proprietary information. Tool arguments may reveal even more.
Blue teams therefore balance usefulness and minimization. They decide which fields must be stored in full, which can be hashed or summarized, which should be redacted, and how long high-risk data should remain available.
Good logging helps defenders see abuse without casually turning the log pipeline into another disclosure problem.
Task 4
Why Logging Shapes Everything Later
Detection rules, triage decisions, containment, and root-cause analysis all depend on telemetry. If prompt and retrieval details are missing, suspicious patterns may be impossible to distinguish. If tool-call logs are weak, side effects may be hard to trace. If policy decisions are not recorded, teams may not know whether a failure came from a missing control or a control that simply did not fire.
In other words, logging is not a reporting layer added after security. It is part of the security design.
A beginner-friendly rule is simple: log enough of the trust flow and decision flow that a defender can explain what happened after the fact.
Task 5
Practical
Name two types of AI telemetry a defender should usually collect.
Task 6
Investigation Check
Name one reason a final answer log alone is not enough for AI incident response.
Task 7
Logging Safety Check
Name one way logging can create new risk if it is handled poorly.
Ready To Move On?
Up next: Detection Engineering for AI Abuse