|
18 | 18 |
|
19 | 19 | ## Our Content
|
20 | 20 |
|
21 |
| -{{< cards >}} |
22 |
| - {{< small-card link="/docs/ai_security_overview/" title="0. AI Security Overview">}} |
23 |
| - {{< small-card link="/docs/1_general_controls/" title="1. General controls">}} |
24 |
| - {{< small-card link="/docs/2_threats_through_use/" title="2. Threats through use">}} |
25 |
| - {{< small-card link="/docs/3_development_time_threats/" title="3. Development-time threats">}} |
26 |
| - {{< small-card link="/docs/4_runtime_application_security_threats/" title="4. Runtime application security threats">}} |
27 |
| - {{< small-card link="/docs/5_testing/" title="5. AI security testing">}} |
28 |
| - {{< small-card link="/docs/ai_security_references/" title="References">}} |
29 |
| -{{< /cards >}} |
| 21 | +[AI Security Overview](docs/ai_security_overview/) |
| 22 | + [Summary](https://owaspai.org/goto/summary/) |
| 23 | + [About the Exchange](https://owaspai.org/goto/about/) |
| 24 | + [Threats](https://owaspai.org/goto/threatsoverview/) |
| 25 | + [Highlight: Threat matrix](https://owaspai.org/goto/aisecuritymatrix/) |
| 26 | + [Controls](https://owaspai.org/goto/controlsoverview/) |
| 27 | + [Highlight: Periodic table of threats and controls](https://owaspai.org/goto/periodictable/) |
| 28 | + [Risk analysis](https://owaspai.org/goto/riskanalysis/) |
| 29 | + [How about ...](https://owaspai.org/docs/ai_security_overview/#how-about-) |
| 30 | +[Deep dive into threats and controls:](https://owaspai.org/goto/navigator/) |
| 31 | + [1. General controls](/docs/1_general_controls) |
| 32 | + [1.1 Governance controls](https://owaspai.org/goto/governancecontrols/) |
| 33 | + [1.2 Data limitation](https://owaspai.org/goto/datalimit/) |
| 34 | + [1.3 Limit unwanted behaviour](https://owaspai.org/goto/limitunwanted/) |
| 35 | + [2. Threats through use and controls](/docs/2_threats_through_use/) |
| 36 | + [3. Development-time threats and controls](/docs/3_development_time_threats/) |
| 37 | + [4. Runtime application security threats and controls](4_runtime_application_security_threats/) |
| 38 | +[AI security testing](/docs/5_testing/) |
| 39 | +[References](/docs/ai_security_references/) |
| 40 | + |
30 | 41 |
|
31 | 42 | ## Purpose
|
32 | 43 |
|
|
0 commit comments