From LLMOps to DevSecOps for GenAI

In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 241-269 (2024)
  Copy   BIBTEX

Abstract

This chapter explores the emerging discipline of LLMOps, contrasting it with traditional MLOps approaches and highlighting unique considerations when operationalizing GenAI models and applications. A detailed examination of implementing LLMOps across the model lifecycle is provided, encompassing activities like base model selection, prompt engineering, model tuning, deployment, and monitoring. Recognizing security as a critical priority, strategies for integrating DevSecOps into LLMOps are outlined, establishing security as a shared responsibility across the development and operational lifecycle. The chapter offers conceptual foundations and practical guidance for successfully navigating the intricacies of LLMOps.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,830

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Build Your Security Program for GenAI.Ken Huang, John Yeoh, Sean Wright & Henry Wang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 99-132.
GenAI Data Security.Ken Huang, Jerry Huang & Daniele Catteddu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 133-162.
GenAI Application Level Security.Ken Huang, Grace Huang, Adam Dawson & Daniel Wu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 199-237.
GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
Use GenAI Tools to Boost Your Security Posture.Ken Huang, Yale Li & Patricia Thaine - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 305-338.
Navigating the GenAI Security Landscape.Ken Huang, Jyoti Ponnapalli, Jeff Tantsura & Kevin T. Shin - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 31-58.
Utilizing Prompt Engineering to Operationalize Cybersecurity.Ken Huang, Grace Huang, Yuyan Duan & Ju Hyun - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 271-303.
Foundations of Generative AI.Ken Huang, Yang Wang & Xiaochen Zhang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 3-30.

Analytics

Added to PP
2024-04-06

Downloads
27 (#818,040)

6 months
11 (#329,096)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references