Skip to content

Commit 68c93b7

Browse files
added code of practice
1 parent 78d40e4 commit 68c93b7

File tree

1 file changed

+17
-12
lines changed

1 file changed

+17
-12
lines changed

content/ai_exchange/content/docs/ai_security_overview.md

+17-12
Original file line numberDiff line numberDiff line change
@@ -456,50 +456,55 @@ GenAI References:
456456
>Permalink: https://owaspai.org/goto/jointguidelines/
457457
458458
Mapping of the UK NCSC /CISA [Joint Guidelines for secure AI system development](https://www.ncsc.gov.uk/collection/guidelines-secure-ai-system-development) to the controls here at the AI Exchange.
459-
To see those controls linked to threats, refer to the [Periodic table of AI security](/goto/periodictable/).
459+
To see those controls linked to threats, refer to the [Periodic table of AI security](/goto/periodictable/).
460+
461+
Note that the UK Government drove an initiative through their DSIT repartment to build on these joint guidelines and produce the [DSIT Code of Practice for the Cyber Secyrity of AI](https://www.gov.uk/government/publications/ai-cyber-security-code-of-practice/code-of-practice-for-the-cyber-security-of-ai#code-of-practice-principles), which reorganizes things according to 13 principles, does a few tweaks, and adds a bit more governance. The principle mapping is added below, and adds mostly post-market aspects:
462+
- Principle 10: Communication and processes assoiated with end-users and affected entities
463+
- Principle 13: Ensure proper data and model disposal
464+
460465

461466
1. Secure design
462467

463-
- Raise staff awareness of threats and risks:
468+
- Raise staff awareness of threats and risks (DSIT principle 1):
464469
#[SECURITY EDUCATE](/goto/seceducate/)
465-
- Model the threats to your system:
470+
- Model the threats to your system (DSIT principle 3):
466471
See Risk analysis under #[SECURITY PROGRAM](/goto/secprogram/)
467-
- Design your system for security as well as functionality and performance:
472+
- Design your system for security as well as functionality and performance (DSIT principle 2):
468473
#[AI PROGRAM](/goto/aiprogram/ ), #[SECURITY PROGRAM](/goto/secprogram/), #[DEVELOPMENT PROGRAM](/goto/devprogram/), #[SECURE DEVELOPMENT PROGRAM](/goto/secdevprogram/), #[CHECK COMPLIANCE](/goto/checkcompliance/), #[LEAST MODEL PRIVILEGE](/goto/leastmodelprivilege/), #[DISCRETE](/goto/discrete/), #[OBSCURE CONFIDENCE](/goto/obscureconfidence/), #[OVERSIGHT](/goto/oversight/), #[RATE LIMIT](/goto/ratelimit/), #[DOS INPUT VALIDATION](/goto/dosinputvalidation/), #[LIMIT RESOURCES](/goto/limitresources/), #[MODEL ACCESS CONTROL](/goto/modelaccesscontrol/), #[AI TRANSPARENCY](/goto/aitransparency)
469474
- Consider security benefits and trade-offs when selecting your AI model
470475
All development-time data science controls (currently 13), #[EXPLAINABILITY](/goto/explainability/)
471476

472477
2. Secure Development
473478

474-
- Secure your supply chain:
479+
- Secure your supply chain (DSIT principle 7):
475480
#[SUPPLY CHAIN MANAGE](/goto/supplychainmanage/)
476-
- Identify, track and protect your assets:
481+
- Identify, track and protect your assets (DSIT principle 5):
477482
#[DEVELOPMENT SECURITY](/goto/devsecurity/), #[SEGREGATE DATA](/goto/segregatedata/), #[CONFIDENTIAL COMPUTE](/goto/confcompute/), #[MODEL INPUT CONFIDENTIALITY](/goto/modelinputconfidentiality/), #[RUNTIME MODEL CONFIDENTIALITY](/goto/runtimemodelconfidentiality/), #[DATA MINIMIZE](/goto/dataminimize/), #[ALLOWED DATA](/goto/alloweddata/), #[SHORT RETAIN](/goto/shortretain/), #[OBFUSCATE TRAINING DATA](/goto/obfuscatetrainingdata/) and part of #[SECURITY PROGRAM](/goto/secprogram/)
478-
- Document your data, models and prompts:
483+
- Document your data, models and prompts (DSIT principle 8):
479484
Part of #[DEVELOPMENT PROGRAM](/goto/devprogram/)
480485
- Manage your technical debt:
481486
Part of #[DEVELOPMENT PROGRAM](/goto/devprogram/)
482487

483488
3. Secure deployment
484489

485-
- Secure your infrastructure:
490+
- Secure your infrastructure (DSIT principle 6):
486491
Part of #[SECURITY PROGRAM](/goto/secprogram/) and see ‘Identify, track and protect your assets’
487492
- Protect your model continuously:
488493
#[INPUT DISTORTION](/goto/inputdistortion/), #[FILTER SENSITIVE MODEL OUTPUT](/goto/filtersensitivemodeloutput/), #[RUNTIME MODEL IO INTEGRITY](/goto/runtimemodeliointegrity/), #[MODEL INPUT CONFIDENTIALITY](/goto/modelinputconfidentiality/), #[PROMPT INPUT VALIDATION](/goto/promptinputvalidation/), #[INPUT SEGREGATION](/goto/inputsegregation/)
489494
- Develop incident management procedures:
490495
Part of #[SECURITY PROGRAM](/goto/secprogram/)
491496
- Release AI responsibly:
492497
Part of #[DEVELOPMENT PROGRAM](/goto/devprogram/)
493-
- Make it easy for users to do the right things:
494-
Part of #[SECURITY PROGRAM](/goto/secprogram/)
498+
- Make it easy for users to do the right things (DSIT principe 4, called Enable human responsibility for AI systems):
499+
Part of #[SECURITY PROGRAM](/goto/secprogram/), and also involving #[EXPLAINABILITY](/goto/explainability/), documenting prohibited use cases, and #[HUMAN OVERSIGHT](/goto/humanoversight))
495500

496501
4. Secure operation and maintenance
497502

498-
- Monitor your system’s behaviour:
503+
- Monitor your system’s behaviour (DSIT principle 12 and similar to DSIT principle 9 - appropriate testing and validation):
499504
#[CONTINUOUS VALIDATION](/goto/continuousvalidation/), #[UNWANTED BIAS TESTING](/goto/unwantedbiastesting/)
500505
- Monitor your system’s inputs:
501506
#[MONITOR USE](/goto/monitoruse/), #[DETECT ODD INPUT](/goto/detectoddinput/), #[DETECT ADVERSARIAL INPUT](/goto/detectadversarialinput/)
502-
- Follow a secure by design approach to updates:
507+
- Follow a secure by design approach to updates (DSIT Principle 11: Maintain regular security updates, patches and mitigations):
503508
Part of #[SECURE DEVELOPMENT PROGRAM](/goto/secdevprogram/)
504509
- Collect and share lessons learned:
505510
Part of #[SECURITY PROGRAM](/goto/secprogram/) and #[SECURE DEVELOPMENT PROGRAM](/goto/secdevprogram/)

0 commit comments

Comments
 (0)