Skip to content

Commit

Permalink
Special attention to cloud configuration, as a response to feedback b…
Browse files Browse the repository at this point in the history
…y Tal Shapira of Reco AI
  • Loading branch information
robvanderveer authored Jul 24, 2024
1 parent ba4de81 commit de2cd9d
Showing 1 changed file with 2 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ weight: 5
> Category: group of runtime threats
> Permalink: https://owaspai.org/goto/generalappsecthreats/
Impact: General application security threats can impact confidentiality, integrity and availability of all assets.
Impact: Conventional application security threats can impact confidentiality, integrity and availability of all assets.

AI systems are IT systems and therefore can have security weaknesses and vulnerabilities that are not AI-specific such as SQL-Injection. Such topics are covered in depth by many sources and are out of scope for this publication.
Note: some controls in this document are application security controls that are not AI-specific, but applied to AI-specific threats (e.g. monitoring to detect model attacks).
Expand All @@ -22,6 +22,7 @@ Note: some controls in this document are application security controls that are
- More detailed and comprehensive control overviews can be found in for example Common criteria protection profiles (ISO/IEC 15408 with evaluation described in ISO 18045),
- or in [OWASP ASVS](https://owasp.org/www-project-application-security-verification-standard/)
- Operational security
When models are hosted by third parties then security configuration of those services deserves special attention. Part of this configuration is [model access control](/goto/modelaccesscontrol/): an important mitigation for security risks. Cloud AI configuation options deserve scrutiny, like for example opting out when necessary of monitoring by the third party - which could increase the risk of exposing sensitive data.
Links to standards:
- See [OpenCRE on operational security processes](https://www.opencre.org/cre/862-452)
- The ISO 27002 controls only partly cover operational security controls, and on a high abstraction level
Expand Down

0 comments on commit de2cd9d

Please sign in to comment.