The AI Defense Matrix maps eight AI asset classes to NIST CSF functions, giving security leaders one grid to assign ownership, find gaps, and select controls. Sounil Yu and I co-authored it as the security-for-AI companion to his Cyber Defense Matrix.

The AI Defense Matrix helps security leaders find gaps, assign ownership, and select controls to defend AI systems. It also helps vendors explain their value and plan a product strategy. I co-authored it with Sounil Yu.
The cybersecurity community is racing to reshape our programs to secure the AI transformation era. We’re under pressure to support AI adoption while meeting our risk management responsibilities and calibrating acceptable insecurity.
Existing AI security frameworks each cover one slice of the work. NIST IR 8596 names AI components to protect, OWASP LLM Top 10 ranks application risks, and ISO 42001 specifies AI management controls. Practitioners need to combine those slices into a single view of safeguarding each AI asset class. Sounil’s Cyber Defense Matrix gave that single view for cybersecurity; the AI Defense Matrix extends it to AI-specific assets.
The resulting grid is a “security for AI” companion to the Cyber Defense Matrix, which covers “AI for security.” The AI Defense Matrix website has the details.
The framework’s eight rows are AI asset classes that enterprises need to safeguard. It uses NIST CSF 2.0 functions as columns to classify the defensive activities. Each cell captures a process or technology for defending each AI asset class:
| Asset Class | Govern | Identify | Protect | Detect | Respond | Recover |
|---|---|---|---|---|---|---|
| AI-Workload Platforms | ||||||
| AI Orchestration Tools | ||||||
| AI-Generated Code | ||||||
| AI Gateways and Routers | ||||||
| AI Model | ||||||
| Training Data | ||||||
| Runtime AI Data | ||||||
| AI Agent Identities |
Practitioners: Review each cell and ask whether any processes or technologies in your program exist at that intersection. Start with Govern to anchor on ownership, risk appetite, and policy. Create a gap inventory and use it alongside your understanding of the business context to build an AI defense roadmap.
Vendors: Identify the cells that your product addresses and map your capabilities there rather than claim broad coverage. Treat thinly covered cells as opportunities to differentiate, sharpen the roadmap, or shape the sales narrative. Use these insights to inform your product strategy.
You can use your AI assistant to work through the AI Defense Matrix interactively. My public MCP server now exposes the matrix as a set of tools your AI can use. It can explain the latest matrix contents or look up cross-mappings to other AI security frameworks. It can also run an evaluation playbook against your AI security program, or cross-map your product capabilities to find gaps.
Add my MCP server to you AI assistant (https://website-mcp.zeltser.com/mcp) to start using these tools. The same server also helps your AI evaluate security product strategies, write incident reports, and more.
Here’s how the AI Defense Matrix groups different types of AI assets:
A row earns its place when the asset needs AI-specific defense beyond what traditional cybersecurity handles. When two AI assets share the same defender team and tool category, they are combined into a single row.
Use the matrix to anchor your AI defense work as the field evolves. Let the gaps you find shape your priorities.