Build Your Security Program for GenAI

In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 99-132 (2024)
  Copy   BIBTEX

Abstract

This chapter explores policies, processes, and procedures to build a robust security program tailored for GenAI models and applications. It discusses key policy elements like goals, risk management, compliance, consequences, and priority areas focused on model integrity, data privacy, resilience to attacks, and regulatory adherence. The chapter also covers specialized processes for GenAI across risk management, development cycles, and access governance. Additionally, it provides details on security procedures for access control, operations, and data management in GenAI systems. Centralized, semi-centralized, and decentralized governance structures for GenAI security are also analyzed. Helpful framework resources including MITRE ATT&CK’s ATLAS Matrix, AI vulnerability databases, the Frontier Model Forum, Cloud Security Alliance initiatives, and OWASP’s Top 10 LLM Application risks are highlighted.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

GenAI Application Level Security.Ken Huang, Grace Huang, Adam Dawson & Daniel Wu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 199-237.
Use GenAI Tools to Boost Your Security Posture.Ken Huang, Yale Li & Patricia Thaine - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 305-338.
Navigating the GenAI Security Landscape.Ken Huang, Jyoti Ponnapalli, Jeff Tantsura & Kevin T. Shin - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 31-58.
GenAI Data Security.Ken Huang, Jerry Huang & Daniele Catteddu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 133-162.
GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
From LLMOps to DevSecOps for GenAI.Ken Huang, Vishwas Manral & Wickey Wang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 241-269.
Utilizing Prompt Engineering to Operationalize Cybersecurity.Ken Huang, Grace Huang, Yuyan Duan & Ju Hyun - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 271-303.
Foundations of Generative AI.Ken Huang, Yang Wang & Xiaochen Zhang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 3-30.

Analytics

Added to PP
2024-04-06

Downloads
8 (#1,587,259)

6 months
4 (#1,269,568)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references