Design
Secure architecture patterns and implementation guidance
▼
▶
Infrastructure & Data Security
(4)
NIST SP 800-218A: Secure Software Dev for GenAI
High
NIST
SSDF supplement for AI/ML secure development practices
RAG Security Patterns
High
Design Pattern
Vector DB security, embedding protection, retrieval guardrails
Context Window Security
High
Design Pattern
Memory isolation, context leakage prevention, session boundaries
VM Hardening & Network Isolation
High
Infrastructure
Container security, network segmentation, egress controls
Testing
Evaluation, red teaming, and vulnerability assessment
▼
▶
Testing Tools & Frameworks
(4)
High
NIST
Open-source adversarial ML testing framework for model robustness evaluation
OWASP FinBot CTF
Medium
OWASP
Capture The Flag platform for practicing agentic security skills
Prompt Injection Testing
Critical
Testing Pattern
Direct/indirect injection, jailbreak attempts, system prompt extraction
NIST AI RMF: MEASURE Function
Critical
NIST
Quantitative/qualitative tools for AI risk measurement and benchmarking
Governance
Policies, oversight, and organizational controls
▼
▶
Agentic Governance & Supply Chain
(4)
State of Agentic Security & Governance 1.0
Critical
OWASP
Practical governance guide for safe autonomous AI deployment
OWASP GenAI COMPASS
High
OWASP
Total Impact Assessment methodology for GenAI systems
Human-AI Configuration Policies (GOVERN 3.2)
High
NIST
Oversight levels, human-in-the-loop requirements, autonomy boundaries
AI-BOM / ML-BOM
High
Industry
Bill of Materials for AI components, model cards, dataset documentation
Operations
Runtime security, monitoring, and incident response
▼
▶
Monitoring & Incident Response
(4)
LLMSecOps: Anomaly Detection
High
Industry
Behavioral monitoring, drift detection, abuse identification
LLMSecOps: Immutable Logs
High
Industry
Audit trails, prompt/response logging, forensic readiness
AI Incident Response Playbooks
High
Operations
Prompt injection response, model compromise, data exfiltration procedures
Content Provenance (C2PA)
Medium
Industry
Watermarking, synthetic content detection, authenticity verification
Cross-Cutting Concerns
Supply Chain Security
- Model provenance verification
- Dataset integrity tracking
- Dependency scanning (ML libs)
- Plugin/tool vetting workflows
Privacy & Data Protection
- PII in training data handling
- Inference attack prevention
- Membership inference protection
- Model inversion defense
Compliance Alignment
- EU AI Act requirements
- NIST CSF 2.0 integration
- ISO/IEC 42001 alignment
- SOC 2 for AI adaptations
