GenAI Application Level Security

In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 199-237 (2024)
  Copy   BIBTEX

Abstract

This chapter provides a comprehensive overview of security considerations, vulnerabilities, and controls at the application layer for GenAI systems. Analysis of the OWASP Top 10 for LLM applications gives the initial context of security concerns of GenAI Applications. Leading application design paradigms including RAG, ReAct, and agent-based systems are explored, along with their security implications. Major cloud-based AI services and associated security features are discussed. The Cloud Security Alliance’s Cloud Control Matrix is leveraged to evaluate application security controls relevant to GenAI. Examples grounded in banking connect security controls to real-world scenarios. Through multifaceted coverage of risks, design patterns, services, and control frameworks, the chapter equips readers with actionable insights on securing diverse GenAI applications by integrating security across the full application life cycle.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 100,830

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Build Your Security Program for GenAI.Ken Huang, John Yeoh, Sean Wright & Henry Wang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 99-132.
Use GenAI Tools to Boost Your Security Posture.Ken Huang, Yale Li & Patricia Thaine - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 305-338.
Navigating the GenAI Security Landscape.Ken Huang, Jyoti Ponnapalli, Jeff Tantsura & Kevin T. Shin - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 31-58.
GenAI Model Security.Ken Huang, Ben Goertzel, Daniel Wu & Anita Xie - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
From LLMOps to DevSecOps for GenAI.Ken Huang, Vishwas Manral & Wickey Wang - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 241-269.
GenAI Data Security.Ken Huang, Jerry Huang & Daniele Catteddu - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 133-162.
Utilizing Prompt Engineering to Operationalize Cybersecurity.Ken Huang, Grace Huang, Yuyan Duan & Ju Hyun - 2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli (eds.), Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 271-303.
Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).

Analytics

Added to PP
2024-04-06

Downloads
13 (#1,313,811)

6 months
5 (#1,025,536)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Grace Huang
University of North Texas

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references