Skip to content

Commit a0bac96

Browse files
Clearer structure in overview - thanks Asma
1 parent 8f85862 commit a0bac96

File tree

1 file changed

+14
-10
lines changed

1 file changed

+14
-10
lines changed

content/ai_exchange/content/docs/ai_security_overview.md

+14-10
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,10 @@
22
title: AI Security Overview
33
weight: 1
44
---
5-
See [home](https://owaspai.org/) for more information about this initiative, how to contribute or connect.
5+
## Summary - How to address AI Security?
6+
>See [home](https://owaspai.org/) for more information about this initiative, how to contribute or connect.
67
This page contains an overview of AI security and the next pages provide the main content: details on security threats to AI and controls against them. You can navigate through pages at the bottom of every page, or in the left sidebar. The right sidebar shows the different sections on a page. On small screens you can navigate through the menu.
78

8-
## Summary and visualisations
9-
10-
### Short summary: How to address AI Security?
11-
129
While AI offers powerful perfomance boosts, it also increases the attack surface available to bad actors. It is therefore imperative to approach AI applications with a clear understanding of potential threats and which of those threats to prioritize for each use case. Standards and governance help guide this process for individual entities leveraging AI capabilities.
1310

1411
- Implement **AI governance**
@@ -17,9 +14,20 @@ While AI offers powerful perfomance boosts, it also increases the attack surface
1714
- **Limit the impact** of AI by minimizing privileges and adding oversight, e.g. guardrails, human oversight.
1815
- **Countermeasures in data science** through understanding of model attacks, e.g. data quality assurance, larger training sets, detecting common perturbation attacks, input filtering.
1916

17+
## Overview of threats
18+
2019
### Threat model
20+
We distinguish three types of threats: during development-time (when data is obtained and prepared, and the model is trained/obtained), through using the model (providing input and reading the output), and by attacking the system during runtime (in production).
21+
The diagram shows the threats in these three groups as arrows. Each threat has a specific impact, incidcated by the letters, referring to the Impact legend. The control overview section contains this diagram with groups of controls added.
2122
![AI Security Threats](/images/aisecthreats2.png)
2223

24+
### AI Security Matrix
25+
The AI security matrix below shows all threats and risks, ordered by type and impact.
26+
[![](/images/OwaspAIsecuritymatix.png)](https://github.com/OWASP/www-project-ai-security-and-privacy-guide/blob/main/assets/images/OwaspAIsecuritymatix.png)
27+
28+
## Overview of controls
29+
30+
## Threat model with controls
2331
![AI Security Threats and controls](/images/aisecthreatscontrols2.png)
2432

2533
### Navigator diagram
@@ -29,11 +37,7 @@ The navigator diagram below shows all threats, controls and how they relate, inc
2937
{{< /callout >}}
3038
[![](/images/owaspaioverviewv2.png)](https://github.com/OWASP/www-project-ai-security-and-privacy-guide/raw/main/assets/images/owaspaioverviewpdfv3.pdf)
3139

32-
### AI Security Matrix
33-
The AI security matrix below shows all threats and risks, ordered by attack surface and lifecycle.
34-
[![](/images/OwaspAIsecuritymatix.png)](https://github.com/OWASP/www-project-ai-security-and-privacy-guide/blob/main/assets/images/OwaspAIsecuritymatix.png)
35-
36-
### Summary with controls
40+
### Controls added to the summary
3741

3842
How to address AI security, including all controls (in capitals - and discussed further on in the document):
3943

0 commit comments

Comments
 (0)