-
Notifications
You must be signed in to change notification settings - Fork 57
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
10 changed files
with
47 additions
and
42 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1 change: 1 addition & 0 deletions
1
...ntent/docs/security/1_general_controls.md → ...change/content/docs/1_general_controls.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,6 @@ | ||
--- | ||
title: 1. General controls | ||
weight: 2 | ||
--- | ||
|
||
## 1.1 General governance controls | ||
|
1 change: 1 addition & 0 deletions
1
...nt/docs/security/2_threats_through_use.md → ...nge/content/docs/2_threats_through_use.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1 change: 1 addition & 0 deletions
1
...cs/security/3_development_time_threats.md → ...ontent/docs/3_development_time_threats.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,6 @@ | ||
--- | ||
title: 3. Development-time threats | ||
weight: 4 | ||
--- | ||
|
||
**Background:** | ||
|
1 change: 1 addition & 0 deletions
1
...4_runtime_application_security_threats.md → ...4_runtime_application_security_threats.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,33 +1,11 @@ | ||
--- | ||
title: AI Exchange | ||
title: Content | ||
--- | ||
|
||
<!-- TODO: Fix external and internal URLs --> | ||
|
||
## Purpose | ||
|
||
The OWASP AI Exchange is as an open source collaborative document to advance the development of global AI security standards and regulations. It provides a comprehensive overview of AI threats, vulnerabilities, and controls to foster alignment among different standardization initiatives. This includes the EU AI Act, ISO/IEC 27090 (AI security), the [OWASP ML top 10](https://mltop10.info/), the [OWASP LLM top 10](https://llmtop10.com/), and [OpenCRE](https://opencre.org) - which we want to use to provide the AI Exchange content through the security chatbot [OpenCRE-Chat](https://opencre.org/chatbot). | ||
|
||
Our **mission** is to be the authoritative source for consensus, foster alignment, and drive collaboration among initiatives - NOT to set a standard, but to drive standards. By doing so, it provides a safe, open, and independent place to find and share insights for everyone. See [AI Exchange LinkedIn page](https://www.linkedin.com/company/owasp-ai-exchange/). | ||
|
||
Maintained here at [owaspai.org](https://owaspai.org) it currently uses both a GitHub repository and a Word Document for contributions. It is is an **open-source living document** for the worldwide exchange of AI security expertise. It serves, for example, as input to security standardization for the EU AI Act towards mid-December (your help is urgently needed!). The document is maintained by OWASP as part of the [OWASP AI guide](https://owasp.org/www-project-ai-security-and-privacy-guide/) project. It will periodically publish content with credited contributions into the Guide. | ||
|
||
OWASP AI Exchange by The AI Security Community is marked with [CC0 1.0](http://creativecommons.org/publicdomain/zero/1.0?ref=chooser-v1) {{< icon "creative-commons" >}} {{< icon "zero" >}} meaning you can use any part freely, without attribution. If possible, it would be nice if the OWASP AI Exchange is credited and/or linked to, for readers to find more information. | ||
|
||
## Table of Contents | ||
|
||
- [Introduction](/docs/security/#introduction) | ||
- [Privacy](/docs/privacy/) | ||
- [Generative AI](/docs/security/#how-about-generative-ai-eg-llm) | ||
- [Summary](/docs/security/#summary) | ||
- [Mapping guidelines to controls](/docs/security/#mapping-guidelines-to-controls) | ||
- [1. General controls for all threats](/docs/security/1_general_controls/) | ||
- [2. Threats through use](/docs/security/2_threats_through_use/) | ||
- [3. Development-time threats](/docs/security/3_development_time_threats/) | ||
- [4. Runtime Application security threats](/docs/security/4_runtime_application_security_threats/) | ||
- [References](/docs/security/#references) | ||
- [Expanded Table of contents](/docs/security/#expanded-table-of-contents) | ||
|
||
The navigator diagram below shows all threats, controls and how they relate, including risks and the types of controls. | ||
Click on the image to get a pdf with clickable links. | ||
[![AI Exchange Navigator](https://github.com/OWASP/www-project-ai-security-and-privacy-guide/raw/main/assets/images/owaspaioverviewv2.png)](https://github.com/OWASP/www-project-ai-security-and-privacy-guide/raw/main/assets/images/owaspaioverviewpdfv3.pdf) | ||
{{< cards >}} | ||
{{< card link="/docs/overview/" title="AI Security Overview">}} | ||
{{< card link="/docs/1_general_controls/" title="1. General controls">}} | ||
{{< card link="/docs/2_threats_through_use/" title="2. Threats through use">}} | ||
{{< card link="/docs/3_development_time_threats/" title="3. Development-time threats">}} | ||
{{< card link="/docs/4_runtime_application_security_threats/" title="4. Runtime application security threats">}} | ||
{{< /cards >}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.