Adversarial Risk | Scrutinize how competitors are investing in artificial intelligence. Although there are risks in AI adoption, there are also business benefits that may impact future market positions. |
Adversarial Risk | Threat Model: how attackers may accelerate exploit attacks against the organization, employees, executives, or users. |
Adversarial Risk | Threat models potential attacks on customers or clients through spoofing and generative AI. |
Adversarial Risk | Investigate the impact of current controls, such as password resets, which use voice recognition. |
Adversarial Risk | Update the Incident Response Plan and playbooks for LLM incidents. |
AI Asset Inventory | Catalog existing AI services, tools, and owners. Designate a tag in asset management for specific inventory |
AI Asset Inventory | Include AI components in the Software Bill of Material (SBOM), a comprehensive list of all the software components, dependencies, and metadata associated with applications |
AI Asset Inventory | Catalog AI data sources and the sensitivity of the data (protected, confidential, public) |
AI Asset Inventory | Establish if pen testing or red teaming of deployed AI solutions is required to determine the current attack surface risk. |
AI Asset Inventory | Create an AI solution onboarding process |
AI Asset Inventory | Ensure skilled IT admin staff is available either internally or externally, in accordance to the SBoM |
AI Security and Privacy Training | Train all users on ethics, responsibility, and legal issues such as warranty, license, and copyright. |
AI Security and Privacy Training | Update security awareness training to include GenAI related threats. Voice cloning and image cloning, as well as in anticipation of increased spear phishing attacks |
AI Security and Privacy Training | Any adopted GenAI solutions should include training for both DevOps and cybersecurity for the deployment pipeline to ensure AI safety and security assurances. |
Establish Business Cases | Enhance customer experience |
Establish Business Cases | Better operational efficiency |
Establish Business Cases | Better knowledge management |
Establish Business Cases | Enhanced innovation |
Establish Business Cases | Market Research and Competitor Analysis |
Establish Business Cases | Document creation, translation, summarization, and analysis |
Governance | Establish the organizationś AI RACI chart (who is responsible, who is accountable, who should be consulted, and who should be informed) |
Governance | Document and assign AI risk, risk assessments, and governance responsibility within the organization. |
Governance | Establish data management policies, including technical enforcement, regarding data classification and usage limitations. Models should only leverage data classified for the minimum access level of any user of the system. For example, update the data protection policy to emphasize not to input protected or confidential data into nonbusiness-managed tools. |
Governance | Create an AI Policy supported by established policy (e.g., standard of good conduct, data protection, software use) |
Governance | Publish an acceptable use matrix for various generative AI tools for employees to use. |
Governance | Document the sources and management of any data that the organization uses from the generative LLM models. |
Legal | Confirm product warranties are clear in the product development stream to assign who is responsible for product warranties with AI. |
Legal | Review and update existing terms and conditions for any GenAI considerations. |
Legal | Review AI EULA agreements. End-user license agreements for GenAI platforms are very different in how they handle user prompts, output rights and ownership, data privacy, compliance and liability, privacy, and limits on how output can be used. |
Legal | Review existing AI-assisted tools used for code development. A chatbotś ability to write code can threaten a companyś ownership rights to its own product if a chatbot is used to generate code for the product. For example, it could call into question the status and protection of the generated content and who holds the right to use the generated content. |
Legal | Review any risks to intellectual property. Intellectual property generated by a chatbot could be in jeopardy if improperly obtained data was used during the generative process, which is subject to copyright, trademark, or patent protection. If AI products use infringing material, it creates a risk for the outputs of the AI, which may result in intellectual property infringement. |
Legal | Review any contracts with indemnification provisions. Indemnification clauses try to put the responsibility for an event that leads to liability on the person who was more at fault for it or who had the best chance of stopping it. Establish guardrails to determine whether the provider of the AI or its user caused the event, giving rise to liability |
Legal | Review liability for potential injury and property damage caused by AI systems |
Legal | Review insurance coverage. Traditional (D&O) liability and commercial general liability insurance policies are likely insufficient to fully protect AI use. |
Legal | Identify any copyright issues. Human authorship is required for copyright. An organization may also be liable for plagiarism, propagation of bias, or intellectual property infringement if LLM tools are misused. |
Legal | Ensure agreements are in place for contractors and appropriate use of AI for any development or provided services |
Legal | Restrict or prohibit the use of generative AI tools for employees or contractors where enforceable rights may be an issue or where there are IP infringement concerns. |
Legal | Assess and AI solutions used for employee management or hiring could result in disparate treatment claims or disparate impact claims. |
Legal | Make sure the AI solutions do not collect or share sensitive information without proper consent or authorization. |
Regulatory | Determine State specific compliance requirements |
Regulatory | Determine compliance requirements for restricting electronic monitoring of employees and employment-related automated decision systems (Vermont) |
Regulatory | Determine compliance requirements for consent for facial recognition and the AI video analysis required (Illinois, Maryland) |
Regulatory | Review any AI tools in use or being considered for employee hiring or management. |
Regulatory | Confirm the vendorś compliance with applicable AI laws and best practices. |
Regulatory | Ask and document any products using AI during the hiring process. Ask how the model was trained, how it is monitored, and track any corrections made to avoid discrimination and bias. |
Regulatory | Ask and document what accommodation options are included. |
Regulatory | Ask and document whether the vendor collects confidential data. |
Regulatory | Ask how the vendor or tool stores and deletes data and regulates the use of facial recognition and video analysis tools during pre-employment. |
Regulatory | Review other organization-specific regulatory requirements with AI that may raise compliance issues. The Employee Retirement Income Security Act of 1974, for instance, has fiduciary duty requirements for retirement plans that a chatbot might not be able to meet. |
Using or Implementing Large Language Model Solutions | Threat Model: LLM components and architecture trust boundaries |
Using or Implementing Large Language Model Solutions | Data Security: Verify how data is classified and protected based on sensitivity, including personal and proprietary business data. (How are user permissions managed, and what safeguards are in place?) |
Using or Implementing Large Language Model Solutions | Access Control: Implement least privilege access controls and implement defense-in-depth measures |
Using or Implementing Large Language Model Solutions | Training Pipeline Security: Require rigorous control around training data governance, pipelines, models, and algorithms. |
Using or Implementing Large Language Model Solutions | Input and Output Security: Evaluate input validation methods, as well as how outputs are filtered, sanitized, and approved. |
Using or Implementing Large Language Model Solutions | Monitoring and Response: Map workflows, monitoring, and responses to understand automation, logging, and auditing. Confirm audit records are secure. |
Using or Implementing Large Language Model Solutions | Include application testing, source code review, vulnerability assessments, and red teaming in the production release process. |
Using or Implementing Large Language Model Solutions | Consider vulnerabilities in the LLM model solutions (Rezilion OSFF Scorecard). |
Using or Implementing Large Language Model Solutions | Look into the effects of threats and attacks on LLM solutions, such as prompt injection, the release of sensitive information, and process manipulation. |
Using or Implementing Large Language Model Solutions | Investigate the impact of attacks and threats to LLM models, including model poisoning, improper data handling, supply chain attacks, and model theft. |
Using or Implementing Large Language Model Solutions | Supply Chain Security: Request third-party audits, penetration testing, and code reviews for third-party providers. (both initially and on an ongoing basis) |
Using or Implementing Large Language Model Solutions | Infrastructure Security: How often does the vendor perform resilience testing? What are their SLAs in terms of availability, scalability, and performance? |
Using or Implementing Large Language Model Solutions | Update incident response playbooks and include an LLM incident in tabletop exercises. |
Using or Implementing Large Language Model Solutions | Identify or expand metrics to benchmark generative cybersecurity AI against other approaches to measure expected productivity improvements. |
Testing, Evaluation, Verification, and Validation (TEVV) | Establish continuous testing, evaluation, verification, and validation throughout the AI model lifecycle. |
Testing, Evaluation, Verification, and Validation (TEVV) | Provide regular executive metrics and updates on AI Model functionality, security, reliability, and robustness. |
Model Cards and Risk Cards | Review a models model card |
Model Cards and Risk Cards | Review risk card if available |
Model Cards and Risk Cards | Establish a process to track and maintain model cards for any deployed model including models used through a third party. |
RAG: Large Language Model Optimization | Retrieval Augmented Generation (RAG) & LLM: Examples |
RAG: Large Language Model Optimization | 12 RAG Pain Points and Proposed Solutions |
AI Red Teaming | Incorporate Red Team testing as a standard practice for AI Models and applications. |