Skip to content

Commit 604cb8a

Browse files
clarifications on model access control
1 parent b1a3889 commit 604cb8a

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

content/ai_exchange/content/docs/2_threats_through_use.md

+7-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
---
21
title: 2. Threats through use
32
weight: 3
43
---
@@ -62,6 +61,13 @@ Purpose: prevent attackers that are not authorized to perform attacks through us
6261

6362
Remaining risk: attackers may succeed in authenticating as an authorized user, or qualify as an authorized user, or bypass the access control through a vulnerability, or it is easy to become an authorized user (e.g. when the model is publicly available)
6463

64+
Note: this is NOT protection of a strored model. For that, see Model confidentiality in Runtime and Development at the [Periodic table](https://owaspai.org/goto/periodictable/).
65+
66+
67+
Additional benefits of model access control are:
68+
- Linking users to activity is Opportunity to link certain use or abuse to individuals - of course under privacy obligations
69+
- Linking activity to a user (or using service) allows more accurate [rate limiting](/goto/ratelimit/) to user-accounts, and detection suspect series of actions - since activity can be linked to paterns of individual users
70+
6571
Useful standards include:
6672

6773
- Technical access control: ISO 27002 Controls 5.15, 5.16, 5.18, 5.3, 8.3. Gap: covers this control fully

0 commit comments

Comments
 (0)