
Welcome to the go-to source on AI security. 170+ pages of comprehensive guidance on how to protect AI and data-centric systems against security threats - feeding straight into international standards. Made by the community and provided as open source to the community. Part of the OWASP AI Security & privacy guide.
Our Content
AI Security Overview
- About the AI Exchange
- Summary
- How to use this document
- Threats
Highlight: Threat matrix
- Controls
Highlight: Periodic table of threats and controls
- Risk analysis
- How about …Deep dive into threats and controls:
- 1. General controls
1.1 Governance controls
1.2 Data limitation
1.3 Limit unwanted behaviour
- 2. Threats through use and controls
- 3. Development-time threats and controls
- 4. Runtime application security threats and controls