24. Infrastructure Modules
Training, Tuning
and Evaluation
Model and
Frameworks Code
Model and
Framework code
Model and Data
Storage
Training, Tuning
and Evaluation
Model
serving
Model and
Data Storage
Model Serving
31. Backdoor model
code to get
remote access
Example of layer acting as backdoor that can be
added at anypoint
https://splint.gitbook.io/cyberblog/security-research/tensorflow-remote-code-execution-with-malicious-model
Classic risks
38. Ensure that model &
data access requires
authentication and API
keys are stored as
secrets
Controls
39. Infrastructure Modules
Training, Tuning
and Evaluation
Model and
Frameworks Code
Model and
Data Storage
Model Serving
Model exfiltration Model deployment tampering
Model poisoning
Unauthorized
training data
Model source
tampering
40. Infrastructure Modules
Training, Tuning
and Evaluation
Model and
Frameworks Code
Model and
Data Storage
Model Serving
Model and data access control Secure-by-default ML tooling
Security as default not as optional
Adversarial training
and testing
Adversarial training
and testing
Privacy enhancing
technologies
53. Privacy enhancing technologies
Infrastructure Modules
Model and
Data Storage
Model Serving
Training, Tuning
and Evaluation
Model and
Frameworks Code
Model Modules
Model and
Data Storage
Model Serving
Training, Tuning
and Evaluation
54. Differential privacy
training to ensure the
model doesn’t learn
and recall PII
https://openreview.net/pdf?id=Q42f0dfjECO
Controls
61. Un-sanitized
plugins output
lead to data
exfiltration
https://embracethered.com/blog/posts/2023/chatgpt-cross-plugin-request-forgery-and-prompt-injection./
Classic risks
67. Application Modules
Application Model Plugin
Users External Sources
Unauthorized
model action
Denial of ML
service
Model reverse
engineering
Insecure
integrated
component
68. Application Modules
Application Model Plugin
Users External Sources
Adversarial training
and testing
User consents and
controls
Model plugin
permissions
Model plugin user
control
Application access
management
72. Application Modules
Application Model Plugin
Data Modules
Data Sources
Users External Sources
Model Modules
Model
Input Handling
Model
Model
Output Handling
System Modules
Model and
Frameworks Code
Model and
Data Storage
Model Serving
Data Filtering
and Processing
Training, Tuning
and Evaluation
Insecure code
74. Code review
Application Modules
Application Model Plugin
Data Modules
Data Sources
Users External Sources
Model Modules
Model
Input Handling
Model
Model
Output Handling
System Modules
Model and
Frameworks Code
Model and
Data Storage
Model Serving
Data Filtering
and Processing
Training, Tuning
and Evaluation
75. Require code review to
reduce security bugs
introduction and
mitigate insider risk
code tampering
Controls
77. Securing AI requires implementation
of controls across the stack
Implementation of classical controls
and AI specific, novel defense is
critical to secure AI workflows
AI Risks are a combination of classical
issues and novel AI specific threats
Takeaways
78. Improve security by adding
additional controls
Review your AI workflows
risk and controls to understand
your posture
Apply
Today
In the next 6 month