Getting Started

Welcome to AI PQC Audit

AI PQC Audit is a comprehensive dual-track security platform featuring:

Post-Quantum (PQ) Audit

Assess cryptographic vulnerabilities to quantum computing threats across your infrastructure.

AI Security Assessment

Evaluate AI-specific attack vectors and vulnerabilities across 23 threat categories.

What This Platform Does
  • 13 Audit Areas: Domain TLS, Documents, Networks, Devices, Code, Software, IoT, IAM, PKI, Cloud, Vendor, Email, Mobile, and Blockchain
  • Proprietary AI Analysis: Uses advanced multi-AI orchestration with adaptive audit core for enterprise-grade security assessment
  • CISO-Ready Reports: Executive summaries with individual asset analysis and prioritized action plans
  • Latest Standards: Automatically updated with NIST and industry developments
Quick Start Process
  1. Create an account and log in
  2. Start a new audit session
  3. Upload files or enter domains for scanning
  4. Review AI-powered analysis results
  5. Download comprehensive reports
Tip: Have your network inventory, device lists, and domain names ready before starting your first audit.

Account Setup

Creating Your Account

  1. Click "Start Free Trial" on the homepage
  2. Enter your email address and create a secure password
  3. Verify your email address (check spam folder if needed)
  4. Complete your profile with organization details

Security Settings

After logging in, enhance your account security:

  1. Go to your user dropdown → Security Settings
  2. Set up Multi-Factor Authentication (MFA)
  3. Choose between authenticator app or SMS verification
  4. Save backup codes in a secure location

Organization Management

For team accounts:

  • Create or join an organization
  • Invite team members with role-based access
  • Configure organization settings and preferences
  • Set up shared audit templates
Security: Always enable MFA for accounts handling sensitive organizational data.

Starting Audits

Creating a New Audit Session

  1. Click "Start New Audit" from the homepage or dashboard
  2. Enter a descriptive audit name (e.g., "Q4 2025 Security Assessment")
  3. Select audit type: Comprehensive (recommended for full analysis)
  4. Click "Start Audit" to create your session

Two-Track Audit System

Post-Quantum (PQ) Audit

Focus: Quantum computing vulnerability assessment

  • Cryptographic algorithm analysis
  • Certificate and key strength evaluation
  • Quantum-safe migration planning
  • NIST compliance assessment
AI Security Assessment

Focus: AI-specific threat vector analysis

  • 23 AI attack categories evaluation
  • Machine learning security review
  • AI model protection assessment
  • Data poisoning vulnerability analysis

Audit Session Management

Each audit session:

  • Has a unique identifier for tracking
  • Stores all scan results in one place
  • Allows multiple scan types within the same session
  • Generates consolidated reports across all scans

Planning Your Audit

File Uploads and Domain Scanning: Most scans require either file uploads (CSV, JSON, PDF, DOCX, ZIP) or direct domain entry. Prepare your data using our templates for best results.

Before starting, gather:

  • Domain Lists: All organizational domains and subdomains (for direct entry)
  • Network Inventory: CSV/JSON files with network configurations
  • Device Lists: Hardware inventory with firmware versions (CSV format)
  • Code Archives: Source code ZIP files for analysis
  • Policy Documents: Cryptographic policies and procedures (PDF/DOCX)
  • Configuration Files: YAML, JSON, PEM, P7B certificates
  • Software Lists: Package inventories, requirements.txt files
Best Practice: Run comprehensive audits quarterly and targeted scans after major infrastructure changes.

Scan Types

Domain TLS/SSL

Purpose: Analyze TLS configurations and certificate security

Input: Domain names (e.g., example.com)

Checks: Cipher suites, protocol versions, certificate algorithms

Document Analysis

Purpose: Review cryptographic policies and strategies

Input: PDF, DOCX, TXT files

Checks: Policy maturity, quantum readiness, compliance gaps

Network Assessment

Purpose: Evaluate network infrastructure security

Input: CSV, JSON, YAML files

Checks: VPN protocols, encryption standards, network devices

Device Inventory

Purpose: Assess hardware quantum readiness

Input: CSV files with device specifications

Checks: TPM support, firmware versions, encryption capabilities

Code Analysis

Purpose: Scan source code for crypto vulnerabilities

Input: ZIP archives of source code

Checks: Crypto libraries, algorithm usage, implementation flaws

Software Inventory

Purpose: Analyze installed software packages

Input: JSON files, requirements.txt

Checks: Package versions, known vulnerabilities, dependencies

IoT/Edge Devices

Purpose: Evaluate IoT device security

Input: CSV files with IoT inventory

Checks: Encryption support, update mechanisms, protocols

IAM Systems

Purpose: Review identity and access management

Input: YAML, JSON configuration files

Checks: Authentication methods, access policies, protocols

PKI Certificates

Purpose: Analyze certificate infrastructure

Input: PEM, P7B certificate files

Checks: Algorithm strength, expiration, chain validation

Cloud Infrastructure

Purpose: Assess cloud security configurations

Input: YAML, JSON infrastructure files

Checks: Encryption settings, key management, compliance

Vendor Assessment

Purpose: Evaluate third-party vendor security

Input: JSON vendor information files

Checks: Security practices, compliance, risk assessment

Email Systems

Purpose: Analyze email security configurations

Input: JSON email system configurations

Checks: Encryption protocols, authentication, filtering

Mobile Applications

Purpose: Review mobile app security

Input: JSON mobile app configurations

Checks: Crypto implementation, data protection, communication

Blockchain

Purpose: Assess blockchain crypto implementations

Input: JSON blockchain configurations

Checks: Hash algorithms, signature schemes, consensus mechanisms

File Preparation

Supported File Formats

Scan Type File Formats Size Limit Notes
Documents PDF, DOCX, TXT 10MB Policies, procedures, documentation
Network CSV, JSON, YAML 5MB Network device inventories
Devices CSV 5MB Hardware specifications and firmware
Code ZIP 25MB Source code archives
Software JSON, TXT 5MB Package lists, requirements files
PKI PEM, P7B, CRT 1MB Certificate files
Cloud/IAM YAML, JSON 5MB Infrastructure configurations
Others JSON 5MB Vendor, email, mobile, blockchain configs

Sample File Templates

Download pre-built templates for each scan type:

  1. Go to the scan wizard
  2. Select your desired scan type
  3. Click "Download Template" for the appropriate file format
  4. Fill in your organizational data
  5. Upload the completed file

Data Preparation Tips

  • Accuracy: Ensure all data is current and accurate
  • Completeness: Include all relevant systems and components
  • Privacy: Remove sensitive personal information before upload
  • Format: Follow template structures exactly for best results
  • Organization: Group related systems logically
Templates: Always use the latest templates from the platform to ensure compatibility with analysis engines.

Running Scans

Step-by-Step Scanning Process

  1. Access Scan Wizard: From your audit session, click "Scan Files & Generate Reports"
  2. Select Scan Type: Choose from 13 available audit areas
  3. Upload Files or Enter Data:
    • For domains: Enter URLs separated by commas
    • For files: Upload your prepared files
    • For text: Paste configuration data directly
  4. Initiate Scan: Click "Scan [Type] & Generate Report"
  5. Wait for Analysis: AI engines process your data (typically 1-2 minutes)
  6. Review Results: Automatic redirect to results page

Multi-AI Processing

Each scan uses multiple AI engines for comprehensive analysis:

  • Analysis Engine Alpha: Advanced reasoning and comprehensive analysis
  • Analysis Engine Beta: Safety-focused vulnerability assessment
  • Analysis Engine Gamma: Multimodal analysis and advanced insights
  • Analysis Engine Delta: Real-time threat intelligence

Monitoring Scan Progress

During scanning:

  • Progress indicators show current processing stage
  • Real-time logs display analysis steps
  • Timeout protection prevents system overload
  • Fallback analysis ensures results even if some engines fail

Multiple Scans per Session

Within one audit session, you can:

  • Run multiple scan types sequentially
  • Combine results in consolidated reports
  • Track overall risk scores across all areas
  • Generate comprehensive executive summaries
Processing Time: Complex scans may take 1-2 minutes. Do not refresh the page during processing.

Understanding Results

Risk Scoring System

Critical (8.0-10.0)

Immediate action required

Moderate (5.0-7.9)

Address within 30 days

Low Risk (3.0-4.9)

Monitor and plan

Compliant (0.0-2.9)

Quantum-ready

Results Structure

Executive Summary
  • Overall Risk Score: Numerical assessment (0-10 scale)
  • Vulnerability Count: Total issues found by category
  • Key Findings: Most critical vulnerabilities
  • Business Impact: Risk assessment for organization
Individual Asset Analysis

For each asset (domain, device, file, etc.):

  • Asset Name: Specific identifier
  • Current State: Present configuration/status
  • Vulnerability: Specific security weakness
  • Action Required: Step-by-step remediation
  • Business Impact: Operational consequences
  • Timeline: Recommended implementation schedule
  • Effort Level: Resource requirements (Low/Medium/High)
Forced Ranking System

Within each risk category, items are ranked by priority:

  • Critical-1, Critical-2, Critical-3 (highest to lower priority)
  • Moderate-1, Moderate-2, Moderate-3
  • Low-1, Low-2, Low-3

Navigation Tabs

Results page organizes findings by scan type:

  • Domain: TLS/SSL analysis results
  • Document: Policy analysis findings
  • Network: Infrastructure vulnerabilities
  • Device: Hardware assessment results
  • Code: Software vulnerability analysis
  • Software: Package and dependency analysis
  • IoT/Edge: IoT device security assessment
  • IAM: Identity management analysis
  • PKI: Certificate infrastructure review
  • Cloud: Cloud security configuration
  • Vendor: Third-party risk assessment
  • Email: Email system security
  • Mobile: Mobile application analysis
  • Blockchain: Blockchain security review
CISO Focus: Results are designed for executive consumption with clear business impact and actionable recommendations.

Reports & Exports

Report Generation

AI PQC Audit provides multiple report formats for different audiences:

Text Reports (Copy Function)
  • Access: Click "Copy Report" button on results page
  • Content: Complete text version of analysis
  • Use Case: Quick sharing, email communication, internal documentation
  • Format: Structured text with all individual asset analysis
PDF Reports
  • Access: Click "Download PDF Report" button
  • Content: Professional formatted document
  • Use Case: Executive presentations, formal documentation, archival
  • Features: Charts, tables, executive summary, detailed findings

Report Contents

Executive Summary Section
  • Overall risk assessment
  • Key vulnerability statistics
  • Business impact analysis
  • Compliance status overview
  • Recommended next steps
Technical Analysis Section
  • Detailed vulnerability descriptions
  • Individual asset assessments
  • Risk categorization and ranking
  • Specific remediation steps
  • Implementation timelines
Methodology Section
  • AI analysis engine details
  • Assessment criteria used
  • Compliance frameworks referenced
  • Limitations and assumptions

Advanced Analytics

Access additional analysis through navigation menu:

  • Analytics Dashboard: Executive charts and trends
  • Q-Day Monitor: Quantum threat timeline analysis
  • Multi-AI Engine: Consensus analysis details
  • Compliance Dashboard: Standards alignment tracking
  • Remediation Workflows: Implementation planning tools

Data Export Options

  • Raw Data: CSV exports of scan results
  • API Access: Programmatic data retrieval
  • Integration: Connect with SIEM and GRC tools
  • Historical Data: Trend analysis across multiple audits
Data Security: All reports contain anonymized data suitable for sharing with stakeholders and vendors.

Advanced Features

Multi-AI Engine Analysis

Access detailed AI analysis through Analytics → Multi-AI Engine:

  • Consensus Analysis: Compare results across 4 AI engines
  • Confidence Scoring: Reliability metrics for each finding
  • Engine Performance: Track AI engine accuracy and speed
  • Custom Prompts: Advanced users can customize analysis criteria

Q-Day Timeline Monitoring

Quantum threat assessment via Analytics → Q-Day Monitor:

  • Q-Day Analysis: X + Y > Z assessment for your organization
  • Threat Timeline: Real-time quantum computing progress tracking
  • Migration Planning: Automated post-quantum migration timelines
  • Risk Forecasting: Predictive analysis of quantum threats

Compliance Dashboard

Standards alignment tracking:

  • NIST Standards: Automated compliance checking
  • FIPS Validation: Federal standards alignment
  • Industry Frameworks: ISO, SOC, GDPR compliance
  • Custom Standards: Organization-specific requirements

Organization Management

For team and enterprise users:

  • Role-Based Access: Admin, Manager, Analyst, Viewer roles
  • Team Collaboration: Shared audit sessions and templates
  • Centralized Reporting: Organization-wide security posture
  • Policy Management: Custom organizational policies

Security Monitoring

Enterprise security features:

  • Security Monitor: Real-time threat detection for platform usage
  • Audit Logging: Complete activity tracking
  • IP Monitoring: Geographic and behavioral analysis
  • Alert System: Email and SMS notifications for security events

Post-Quantum Security

Platform self-protection features:

  • Quantum-Resistant Encryption: Platform uses PQ algorithms
  • Algorithm Testing: Validate quantum-safe implementations
  • Security Metrics: Real-time cryptographic status
  • Research Integration: Latest PQ research integration

Automated Updates

Daily PQ resources updates (1-5 AM UTC):

  • NIST Standards: Latest cryptographic standards
  • Industry Research: Academic and commercial developments
  • Threat Intelligence: Quantum computing progress
  • Algorithm Updates: New post-quantum algorithms
Pro Tip: Enable all available features for comprehensive post-quantum readiness assessment.

Troubleshooting

Common Issues and Solutions

Login and Authentication
Problem: Cannot log in / password reset not working
Solution:
  1. Check email spam folder for reset instructions
  2. Clear browser cache and cookies
  3. Try incognito/private browsing mode
  4. Contact support if MFA codes not working
File Upload Issues
Problem: File upload fails or times out
Solution:
  1. Check file size limits (see File Preparation section)
  2. Verify file format is supported
  3. Ensure stable internet connection
  4. Try compressing large files
  5. Use templates for proper formatting
Scan Processing Problems
Problem: Scan hangs or times out
Solution:
  1. Wait for full processing (up to 2 minutes for complex scans)
  2. Do not refresh page during processing
  3. Check if AI engines are temporarily unavailable
  4. Retry scan if process fails
  5. Contact support for persistent issues
Results Not Displaying
Problem: Results page is empty or incomplete
Solution:
  1. Refresh the results page
  2. Check if audit session is still active
  3. Verify scan completed successfully
  4. Try accessing from audit history
  5. Contact support with session ID
PDF Generation Issues
Problem: PDF download fails or is incomplete
Solution:
  1. Ensure popup blockers are disabled
  2. Try different browser
  3. Check browser download settings
  4. Use copy report as alternative
  5. Contact support for large report issues

Error Codes

Error Code Description Solution
AUTH_001 Authentication failure Log out and log back in
UPLOAD_002 File format not supported Check supported formats list
SCAN_003 AI engine timeout Retry scan, reduce file size
REPORT_004 PDF generation failure Use text report, contact support
SESSION_005 Invalid audit session Start new audit session

Performance Optimization

  • File Size: Keep uploads under recommended limits
  • Browser: Use Chrome, Firefox, or Safari for best performance
  • Network: Stable broadband connection recommended
  • Concurrent Scans: Run one scan at a time for optimal performance
  • Data Quality: Clean, well-formatted data processes faster

Getting Additional Help

If you continue experiencing issues:

  • Submit Ticket: Support → Submit Ticket with detailed description
  • Live Chat: Available during business hours
  • Email Support: Include session ID and error details
  • FAQ: Check FAQ section for additional answers
  • Video Tutorials: Step-by-step visual guides
Support Hours: Monday-Friday 9 AM - 6 PM EST. Emergency support available for enterprise customers.

© 2025 AI PQC Audit. Advanced multi-AI powered post-quantum cryptography security platform.

Powered by Proprietary Multi-AI Technology