You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/ai_exchange/content/docs/ai_security_overview.md
+14-10
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,10 @@
2
2
title: AI Security Overview
3
3
weight: 1
4
4
---
5
-
See [home](https://owaspai.org/) for more information about this initiative, how to contribute or connect.
5
+
## Summary - How to address AI Security?
6
+
>See [home](https://owaspai.org/) for more information about this initiative, how to contribute or connect.
6
7
This page contains an overview of AI security and the next pages provide the main content: details on security threats to AI and controls against them. You can navigate through pages at the bottom of every page, or in the left sidebar. The right sidebar shows the different sections on a page. On small screens you can navigate through the menu.
7
8
8
-
## Summary and visualisations
9
-
10
-
### Short summary: How to address AI Security?
11
-
12
9
While AI offers powerful perfomance boosts, it also increases the attack surface available to bad actors. It is therefore imperative to approach AI applications with a clear understanding of potential threats and which of those threats to prioritize for each use case. Standards and governance help guide this process for individual entities leveraging AI capabilities.
13
10
14
11
- Implement **AI governance**
@@ -17,9 +14,20 @@ While AI offers powerful perfomance boosts, it also increases the attack surface
17
14
-**Limit the impact** of AI by minimizing privileges and adding oversight, e.g. guardrails, human oversight.
18
15
-**Countermeasures in data science** through understanding of model attacks, e.g. data quality assurance, larger training sets, detecting common perturbation attacks, input filtering.
19
16
17
+
## Overview of threats
18
+
20
19
### Threat model
20
+
We distinguish three types of threats: during development-time (when data is obtained and prepared, and the model is trained/obtained), through using the model (providing input and reading the output), and by attacking the system during runtime (in production).
21
+
The diagram shows the threats in these three groups as arrows. Each threat has a specific impact, incidcated by the letters, referring to the Impact legend. The control overview section contains this diagram with groups of controls added.
21
22

22
23
24
+
### AI Security Matrix
25
+
The AI security matrix below shows all threats and risks, ordered by type and impact.
0 commit comments