Articles in This Topic
Privacy-Preserving Architectures for Enterprise Data
Privacy-Preserving Architectures for Enterprise Data If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Read this with a threat model in mind. The goal is a […]
Threat Modeling for AI Systems
Threat Modeling for AI Systems The moment an assistant can touch your data or execute a tool call, it becomes part of your security perimeter. This topic is about keeping that perimeter intact when prompts, retrieval, and autonomy meet real infrastructure. Use this as an implementation guide. If you cannot translate it into a gate, […]
Supply Chain Security for Models and Dependencies
Supply Chain Security for Models and Dependencies If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Use this as an implementation guide. If you cannot translate […]
Security Posture for Local and On-Device Deployments
Security Posture for Local and On-Device Deployments If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Use this as an implementation guide. If you cannot translate […]
Secure Retrieval With Permission-Aware Filtering
Secure Retrieval With Permission-Aware Filtering If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Use this as an implementation guide. If you cannot translate it into […]
Secure Prompt and Policy Version Control
Secure Prompt and Policy Version Control The moment an assistant can touch your data or execute a tool call, it becomes part of your security perimeter. This topic is about keeping that perimeter intact when prompts, retrieval, and autonomy meet real infrastructure. Read this with a threat model in mind. The goal is a defensible […]
Secure Multi-Tenancy and Data Isolation
Secure Multi-Tenancy and Data Isolation If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Use this as an implementation guide. If you cannot translate it into […]
Secure Logging and Audit Trails
Secure Logging and Audit Trails The moment an assistant can touch your data or execute a tool call, it becomes part of your security perimeter. This topic is about keeping that perimeter intact when prompts, retrieval, and autonomy meet real infrastructure. Read this with a threat model in mind. The goal is a defensible control: […]
Secret Handling in Prompts, Logs, and Tools
Secret Handling in Prompts, Logs, and Tools Security failures in AI systems usually look ordinary at first: one tool call, one missing permission check, one log line that never got written. This topic turns that ordinary-looking edge case into a controlled, observable boundary. Treat this page as a boundary map. By the end you should […]
Sandbox Isolation and Execution Constraints
Sandbox Isolation and Execution Constraints Security failures in AI systems usually look ordinary at first: one tool call, one missing permission check, one log line that never got written. This topic turns that ordinary-looking edge case into a controlled, observable boundary. Use this as an implementation guide. If you cannot translate it into a gate, […]
Rate Limiting and Resource Abuse Controls
Rate Limiting and Resource Abuse Controls If your product can retrieve private text, call tools, or act on behalf of a user, your threat model is no longer optional. This topic focuses on the control points that keep capability from quietly turning into compromise. Treat this page as a boundary map. By the end you […]
Provenance Signals and Content Integrity
Provenance Signals and Content Integrity The moment an assistant can touch your data or execute a tool call, it becomes part of your security perimeter. This topic is about keeping that perimeter intact when prompts, retrieval, and autonomy meet real infrastructure. Use this as an implementation guide. If you cannot translate it into a gate, […]
Subtopics
Access Control
Concepts, patterns, and practical guidance on Access Control within Security and Privacy.
Adversarial Testing
Concepts, patterns, and practical guidance on Adversarial Testing within Security and Privacy.
Data Privacy
Concepts, patterns, and practical guidance on Data Privacy within Security and Privacy.
Incident Playbooks
Concepts, patterns, and practical guidance on Incident Playbooks within Security and Privacy.
Logging and Redaction
Concepts, patterns, and practical guidance on Logging and Redaction within Security and Privacy.
Model Supply Chain Security
Concepts, patterns, and practical guidance on Model Supply Chain Security within Security and Privacy.
Prompt Injection and Tool Abuse
Concepts, patterns, and practical guidance on Prompt Injection and Tool Abuse within Security and Privacy.
Sandbox Design
Concepts, patterns, and practical guidance on Sandbox Design within Security and Privacy.
Secret Handling
Concepts, patterns, and practical guidance on Secret Handling within Security and Privacy.
Secure Deployment Patterns
Concepts, patterns, and practical guidance on Secure Deployment Patterns within Security and Privacy.
Threat Modeling
Concepts, patterns, and practical guidance on Threat Modeling within Security and Privacy.
Core Topics
- Threat Modeling for AI Systems
- Prompt Injection and Tool Abuse Prevention
- Data Privacy: Minimization, Redaction, Retention
- Secret Handling in Prompts, Logs, and Tools
- Access Control and Least-Privilege Design
- Sandbox Isolation and Execution Constraints
- Supply Chain Security for Models and Dependencies
- Secure Retrieval With Permission-Aware Filtering
- Output Filtering and Sensitive Data Detection
- Model Exfiltration Risks and Mitigations
- Abuse Monitoring and Anomaly Detection
- Secure Logging and Audit Trails
- Incident Response for AI-Specific Threats
- Secure Multi-Tenancy and Data Isolation
- Adversarial Testing and Red Team Exercises
- Secure Prompt and Policy Version Control
- Client-Side vs Server-Side Risk Tradeoffs
- Authentication and Authorization for Tool Use
- Rate Limiting and Resource Abuse Controls
- Provenance Signals and Content Integrity
- Leakage Prevention for Evaluation Datasets
- Pipeline Defenses Against Data Poisoning
- Dependency Pinning and Artifact Integrity Checks
- Privacy-Preserving Architectures for Enterprise Data
- Security Posture for Local and On-Device Deployments
Related Topics
AI Foundations and Concepts
- AI Terminology Map: Model, System, Agent, Tool, Pipeline
- Training vs Inference as Two Different Engineering Problems
- Generalization and Why “Works on My Prompt” Is Not Evidence
- Overfitting, Leakage, and Evaluation Traps
- Distribution Shift and Real-World Input Messiness
- Capability vs Reliability vs Safety as Separate Axes
Related Topics
AI
A structured directory of AI topics, organized around innovation and the infrastructure shift shaping what comes next.
Access Control
Concepts, patterns, and practical guidance on Access Control within Security and Privacy.
Adversarial Testing
Concepts, patterns, and practical guidance on Adversarial Testing within Security and Privacy.
Data Privacy
Concepts, patterns, and practical guidance on Data Privacy within Security and Privacy.
Incident Playbooks
Concepts, patterns, and practical guidance on Incident Playbooks within Security and Privacy.
Logging and Redaction
Concepts, patterns, and practical guidance on Logging and Redaction within Security and Privacy.
Model Supply Chain Security
Concepts, patterns, and practical guidance on Model Supply Chain Security within Security and Privacy.
Prompt Injection and Tool Abuse
Concepts, patterns, and practical guidance on Prompt Injection and Tool Abuse within Security and Privacy.
Sandbox Design
Concepts, patterns, and practical guidance on Sandbox Design within Security and Privacy.
Secret Handling
Concepts, patterns, and practical guidance on Secret Handling within Security and Privacy.
Secure Deployment Patterns
Concepts, patterns, and practical guidance on Secure Deployment Patterns within Security and Privacy.
Agents and Orchestration
Tool-using systems, planning, memory, orchestration, and operational guardrails.
AI Foundations and Concepts
Core concepts and measurement discipline that keep AI claims grounded in reality.
AI Product and UX
Design patterns that turn capability into useful, trustworthy user experiences.
Business, Strategy, and Adoption
Adoption strategy, economics, governance, and organizational change driven by AI.
Data, Retrieval, and Knowledge
Data pipelines, retrieval systems, and grounding techniques for trustworthy outputs.