Guide Sections
Download Guide
Download PDFGetting Started
Welcome to AI PQC Audit
AI PQC Audit is a comprehensive dual-track security platform featuring:
Post-Quantum (PQ) Audit
Assess cryptographic vulnerabilities to quantum computing threats across your infrastructure.
AI Security Assessment
Evaluate AI-specific attack vectors and vulnerabilities across 23 threat categories.
What This Platform Does
- 13 Audit Areas: Domain TLS, Documents, Networks, Devices, Code, Software, IoT, IAM, PKI, Cloud, Vendor, Email, Mobile, and Blockchain
- Proprietary AI Analysis: Uses advanced multi-AI orchestration with adaptive audit core for enterprise-grade security assessment
- CISO-Ready Reports: Executive summaries with individual asset analysis and prioritized action plans
- Latest Standards: Automatically updated with NIST and industry developments
Quick Start Process
- Create an account and log in
- Start a new audit session
- Upload files or enter domains for scanning
- Review AI-powered analysis results
- Download comprehensive reports
Account Setup
Creating Your Account
- Click "Start Free Trial" on the homepage
- Enter your email address and create a secure password
- Verify your email address (check spam folder if needed)
- Complete your profile with organization details
Security Settings
After logging in, enhance your account security:
- Go to your user dropdown → Security Settings
- Set up Multi-Factor Authentication (MFA)
- Choose between authenticator app or SMS verification
- Save backup codes in a secure location
Organization Management
For team accounts:
- Create or join an organization
- Invite team members with role-based access
- Configure organization settings and preferences
- Set up shared audit templates
Starting Audits
Creating a New Audit Session
- Click "Start New Audit" from the homepage or dashboard
- Enter a descriptive audit name (e.g., "Q4 2025 Security Assessment")
- Select audit type: Comprehensive (recommended for full analysis)
- Click "Start Audit" to create your session
Two-Track Audit System
Post-Quantum (PQ) Audit
Focus: Quantum computing vulnerability assessment
- Cryptographic algorithm analysis
- Certificate and key strength evaluation
- Quantum-safe migration planning
- NIST compliance assessment
AI Security Assessment
Focus: AI-specific threat vector analysis
- 23 AI attack categories evaluation
- Machine learning security review
- AI model protection assessment
- Data poisoning vulnerability analysis
Audit Session Management
Each audit session:
- Has a unique identifier for tracking
- Stores all scan results in one place
- Allows multiple scan types within the same session
- Generates consolidated reports across all scans
Planning Your Audit
File Uploads and Domain Scanning: Most scans require either file uploads (CSV, JSON, PDF, DOCX, ZIP) or direct domain entry. Prepare your data using our templates for best results.
Before starting, gather:
- Domain Lists: All organizational domains and subdomains (for direct entry)
- Network Inventory: CSV/JSON files with network configurations
- Device Lists: Hardware inventory with firmware versions (CSV format)
- Code Archives: Source code ZIP files for analysis
- Policy Documents: Cryptographic policies and procedures (PDF/DOCX)
- Configuration Files: YAML, JSON, PEM, P7B certificates
- Software Lists: Package inventories, requirements.txt files
Scan Types
Domain TLS/SSL
Purpose: Analyze TLS configurations and certificate security
Input: Domain names (e.g., example.com)
Checks: Cipher suites, protocol versions, certificate algorithms
Document Analysis
Purpose: Review cryptographic policies and strategies
Input: PDF, DOCX, TXT files
Checks: Policy maturity, quantum readiness, compliance gaps
Network Assessment
Purpose: Evaluate network infrastructure security
Input: CSV, JSON, YAML files
Checks: VPN protocols, encryption standards, network devices
Device Inventory
Purpose: Assess hardware quantum readiness
Input: CSV files with device specifications
Checks: TPM support, firmware versions, encryption capabilities
Code Analysis
Purpose: Scan source code for crypto vulnerabilities
Input: ZIP archives of source code
Checks: Crypto libraries, algorithm usage, implementation flaws
Software Inventory
Purpose: Analyze installed software packages
Input: JSON files, requirements.txt
Checks: Package versions, known vulnerabilities, dependencies
IoT/Edge Devices
Purpose: Evaluate IoT device security
Input: CSV files with IoT inventory
Checks: Encryption support, update mechanisms, protocols
IAM Systems
Purpose: Review identity and access management
Input: YAML, JSON configuration files
Checks: Authentication methods, access policies, protocols
PKI Certificates
Purpose: Analyze certificate infrastructure
Input: PEM, P7B certificate files
Checks: Algorithm strength, expiration, chain validation
Cloud Infrastructure
Purpose: Assess cloud security configurations
Input: YAML, JSON infrastructure files
Checks: Encryption settings, key management, compliance
Vendor Assessment
Purpose: Evaluate third-party vendor security
Input: JSON vendor information files
Checks: Security practices, compliance, risk assessment
Email Systems
Purpose: Analyze email security configurations
Input: JSON email system configurations
Checks: Encryption protocols, authentication, filtering
Mobile Applications
Purpose: Review mobile app security
Input: JSON mobile app configurations
Checks: Crypto implementation, data protection, communication
Blockchain
Purpose: Assess blockchain crypto implementations
Input: JSON blockchain configurations
Checks: Hash algorithms, signature schemes, consensus mechanisms
File Preparation
Supported File Formats
Scan Type | File Formats | Size Limit | Notes |
---|---|---|---|
Documents | PDF, DOCX, TXT | 10MB | Policies, procedures, documentation |
Network | CSV, JSON, YAML | 5MB | Network device inventories |
Devices | CSV | 5MB | Hardware specifications and firmware |
Code | ZIP | 25MB | Source code archives |
Software | JSON, TXT | 5MB | Package lists, requirements files |
PKI | PEM, P7B, CRT | 1MB | Certificate files |
Cloud/IAM | YAML, JSON | 5MB | Infrastructure configurations |
Others | JSON | 5MB | Vendor, email, mobile, blockchain configs |
Sample File Templates
Download pre-built templates for each scan type:
- Go to the scan wizard
- Select your desired scan type
- Click "Download Template" for the appropriate file format
- Fill in your organizational data
- Upload the completed file
Data Preparation Tips
- Accuracy: Ensure all data is current and accurate
- Completeness: Include all relevant systems and components
- Privacy: Remove sensitive personal information before upload
- Format: Follow template structures exactly for best results
- Organization: Group related systems logically
Running Scans
Step-by-Step Scanning Process
- Access Scan Wizard: From your audit session, click "Scan Files & Generate Reports"
- Select Scan Type: Choose from 13 available audit areas
- Upload Files or Enter Data:
- For domains: Enter URLs separated by commas
- For files: Upload your prepared files
- For text: Paste configuration data directly
- Initiate Scan: Click "Scan [Type] & Generate Report"
- Wait for Analysis: AI engines process your data (typically 1-2 minutes)
- Review Results: Automatic redirect to results page
Multi-AI Processing
Each scan uses multiple AI engines for comprehensive analysis:
- Analysis Engine Alpha: Advanced reasoning and comprehensive analysis
- Analysis Engine Beta: Safety-focused vulnerability assessment
- Analysis Engine Gamma: Multimodal analysis and advanced insights
- Analysis Engine Delta: Real-time threat intelligence
Monitoring Scan Progress
During scanning:
- Progress indicators show current processing stage
- Real-time logs display analysis steps
- Timeout protection prevents system overload
- Fallback analysis ensures results even if some engines fail
Multiple Scans per Session
Within one audit session, you can:
- Run multiple scan types sequentially
- Combine results in consolidated reports
- Track overall risk scores across all areas
- Generate comprehensive executive summaries
Understanding Results
Risk Scoring System
Critical (8.0-10.0)
Immediate action required
Moderate (5.0-7.9)
Address within 30 days
Low Risk (3.0-4.9)
Monitor and plan
Compliant (0.0-2.9)
Quantum-ready
Results Structure
Executive Summary
- Overall Risk Score: Numerical assessment (0-10 scale)
- Vulnerability Count: Total issues found by category
- Key Findings: Most critical vulnerabilities
- Business Impact: Risk assessment for organization
Individual Asset Analysis
For each asset (domain, device, file, etc.):
- Asset Name: Specific identifier
- Current State: Present configuration/status
- Vulnerability: Specific security weakness
- Action Required: Step-by-step remediation
- Business Impact: Operational consequences
- Timeline: Recommended implementation schedule
- Effort Level: Resource requirements (Low/Medium/High)
Forced Ranking System
Within each risk category, items are ranked by priority:
- Critical-1, Critical-2, Critical-3 (highest to lower priority)
- Moderate-1, Moderate-2, Moderate-3
- Low-1, Low-2, Low-3
Navigation Tabs
Results page organizes findings by scan type:
- Domain: TLS/SSL analysis results
- Document: Policy analysis findings
- Network: Infrastructure vulnerabilities
- Device: Hardware assessment results
- Code: Software vulnerability analysis
- Software: Package and dependency analysis
- IoT/Edge: IoT device security assessment
- IAM: Identity management analysis
- PKI: Certificate infrastructure review
- Cloud: Cloud security configuration
- Vendor: Third-party risk assessment
- Email: Email system security
- Mobile: Mobile application analysis
- Blockchain: Blockchain security review
Reports & Exports
Report Generation
AI PQC Audit provides multiple report formats for different audiences:
Text Reports (Copy Function)
- Access: Click "Copy Report" button on results page
- Content: Complete text version of analysis
- Use Case: Quick sharing, email communication, internal documentation
- Format: Structured text with all individual asset analysis
PDF Reports
- Access: Click "Download PDF Report" button
- Content: Professional formatted document
- Use Case: Executive presentations, formal documentation, archival
- Features: Charts, tables, executive summary, detailed findings
Report Contents
Executive Summary Section
- Overall risk assessment
- Key vulnerability statistics
- Business impact analysis
- Compliance status overview
- Recommended next steps
Technical Analysis Section
- Detailed vulnerability descriptions
- Individual asset assessments
- Risk categorization and ranking
- Specific remediation steps
- Implementation timelines
Methodology Section
- AI analysis engine details
- Assessment criteria used
- Compliance frameworks referenced
- Limitations and assumptions
Advanced Analytics
Access additional analysis through navigation menu:
- Analytics Dashboard: Executive charts and trends
- Q-Day Monitor: Quantum threat timeline analysis
- Multi-AI Engine: Consensus analysis details
- Compliance Dashboard: Standards alignment tracking
- Remediation Workflows: Implementation planning tools
Data Export Options
- Raw Data: CSV exports of scan results
- API Access: Programmatic data retrieval
- Integration: Connect with SIEM and GRC tools
- Historical Data: Trend analysis across multiple audits
Advanced Features
Multi-AI Engine Analysis
Access detailed AI analysis through Analytics → Multi-AI Engine:
- Consensus Analysis: Compare results across 4 AI engines
- Confidence Scoring: Reliability metrics for each finding
- Engine Performance: Track AI engine accuracy and speed
- Custom Prompts: Advanced users can customize analysis criteria
Q-Day Timeline Monitoring
Quantum threat assessment via Analytics → Q-Day Monitor:
- Q-Day Analysis: X + Y > Z assessment for your organization
- Threat Timeline: Real-time quantum computing progress tracking
- Migration Planning: Automated post-quantum migration timelines
- Risk Forecasting: Predictive analysis of quantum threats
Compliance Dashboard
Standards alignment tracking:
- NIST Standards: Automated compliance checking
- FIPS Validation: Federal standards alignment
- Industry Frameworks: ISO, SOC, GDPR compliance
- Custom Standards: Organization-specific requirements
Organization Management
For team and enterprise users:
- Role-Based Access: Admin, Manager, Analyst, Viewer roles
- Team Collaboration: Shared audit sessions and templates
- Centralized Reporting: Organization-wide security posture
- Policy Management: Custom organizational policies
Security Monitoring
Enterprise security features:
- Security Monitor: Real-time threat detection for platform usage
- Audit Logging: Complete activity tracking
- IP Monitoring: Geographic and behavioral analysis
- Alert System: Email and SMS notifications for security events
Post-Quantum Security
Platform self-protection features:
- Quantum-Resistant Encryption: Platform uses PQ algorithms
- Algorithm Testing: Validate quantum-safe implementations
- Security Metrics: Real-time cryptographic status
- Research Integration: Latest PQ research integration
Automated Updates
Daily PQ resources updates (1-5 AM UTC):
- NIST Standards: Latest cryptographic standards
- Industry Research: Academic and commercial developments
- Threat Intelligence: Quantum computing progress
- Algorithm Updates: New post-quantum algorithms
Troubleshooting
Common Issues and Solutions
Login and Authentication
Solution:
- Check email spam folder for reset instructions
- Clear browser cache and cookies
- Try incognito/private browsing mode
- Contact support if MFA codes not working
File Upload Issues
Solution:
- Check file size limits (see File Preparation section)
- Verify file format is supported
- Ensure stable internet connection
- Try compressing large files
- Use templates for proper formatting
Scan Processing Problems
Solution:
- Wait for full processing (up to 2 minutes for complex scans)
- Do not refresh page during processing
- Check if AI engines are temporarily unavailable
- Retry scan if process fails
- Contact support for persistent issues
Results Not Displaying
Solution:
- Refresh the results page
- Check if audit session is still active
- Verify scan completed successfully
- Try accessing from audit history
- Contact support with session ID
PDF Generation Issues
Solution:
- Ensure popup blockers are disabled
- Try different browser
- Check browser download settings
- Use copy report as alternative
- Contact support for large report issues
Error Codes
Error Code | Description | Solution |
---|---|---|
AUTH_001 | Authentication failure | Log out and log back in |
UPLOAD_002 | File format not supported | Check supported formats list |
SCAN_003 | AI engine timeout | Retry scan, reduce file size |
REPORT_004 | PDF generation failure | Use text report, contact support |
SESSION_005 | Invalid audit session | Start new audit session |
Performance Optimization
- File Size: Keep uploads under recommended limits
- Browser: Use Chrome, Firefox, or Safari for best performance
- Network: Stable broadband connection recommended
- Concurrent Scans: Run one scan at a time for optimal performance
- Data Quality: Clean, well-formatted data processes faster
Getting Additional Help
If you continue experiencing issues:
- Submit Ticket: Support → Submit Ticket with detailed description
- Live Chat: Available during business hours
- Email Support: Include session ID and error details
- FAQ: Check FAQ section for additional answers
- Video Tutorials: Step-by-step visual guides