Skip to content

Commit cb16b93

Browse files
ceperezbCopilot
andcommitted
update module
Co-authored-by: Copilot <[email protected]>
1 parent a1f62ba commit cb16b93

14 files changed

Lines changed: 62 additions & 20 deletions

learn-pr/advocates/ai-security-controls/includes/2-review-ai-open-source-libraries.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,7 @@ AI OSS libraries carry some risks that go beyond those of traditional software d
99
- **Serialization risks**: AI models are frequently saved and loaded using serialization formats (such as pickle in Python). Deserializing untrusted model files can lead to arbitrary code execution.
1010
- **Rapid release cycles**: AI libraries evolve quickly, with frequent breaking changes. Organizations that pin to older versions may miss critical security patches.
1111

12-
<!-- IMAGE PLACEHOLDER: Conceptual diagram
13-
Alt text: Diagram showing four AI-specific supply chain risks for open-source libraries
14-
Suggested source: Custom diagram needed
15-
Capture instructions: Create a diagram with four risk categories (pre-trained models with backdoors, data pipeline vulnerabilities, serialization/deserialization risks, rapid release cycles) branching from a central "AI OSS Library" node.
16-
Suggested filename: ai-oss-supply-chain-risks.png
17-
Priority: Medium
18-
-->
12+
:::image type="content" source="../media/ai-open-source-supply-chain-risks.png" alt-text="Diagram showing four AI-specific supply chain risks for open-source libraries: pre-trained models with backdoors, data pipeline vulnerabilities, serialization and deserialization risks, and rapid release cycles." lightbox="../media/ai-open-source-supply-chain-risks.png":::
1913

2014
## Assess the suitability of OSS libraries
2115

@@ -51,4 +45,4 @@ Don't assume that others have performed vulnerability checks. Apply your own ass
5145
- **Prioritized remediation**: If vulnerabilities are detected, assess their impact and exploitability. Prioritize fixes based on severity and exposure.
5246
- **Continuous monitoring**: OSS vulnerability databases are updated regularly. Set up automated alerts for new CVEs affecting libraries in your AI stack.
5347

54-
:::image type="content" source="../media/ai-oss-library-review-process.png" alt-text="Flowchart of the AI open-source library security review process from assessment to approval." lightbox="../media/ai-oss-library-review-process.png":::
48+
:::image type="content" source="../media/ai-open-source-library-review-process.png" alt-text="Flowchart of the AI open-source library security review process from assessment to approval." lightbox="../media/ai-open-source-library-review-process.png":::

learn-pr/advocates/ai-security-controls/includes/5-create-metaprompts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ For example, a good metaprompt might instruct: "If a user requests large quantit
1313

1414
Industry research shows that well-designed metaprompts significantly reduce the risk of security defects and harmful outputs.
1515

16-
:::image type="content" source="../media/metaprompts.png" alt-text="Screenshot showing metaprompts and the types of security issues they help mitigate.":::
16+
:::image type="content" source="../media/system-prompts.png" alt-text="Screenshot showing metaprompts and the types of security issues they help mitigate." lightbox="../media/system-prompts.png":::
1717

1818
## Key components of an effective metaprompt
1919

@@ -25,7 +25,7 @@ A comprehensive metaprompt typically includes several types of instructions incl
2525
- Anti-manipulation defenses
2626
- Output formatting rules
2727

28-
:::image type="content" source="../media/metaprompt-components.png" alt-text="Diagram showing the five key components of an effective security metaprompt: role and scope definition, safety and compliance rules, grounding instructions, anti-manipulation defenses, and output formatting rules.":::
28+
:::image type="content" source="../media/system-prompt-components.png" alt-text="Diagram showing the five key components of an effective security metaprompt: role and scope definition, safety and compliance rules, grounding instructions, anti-manipulation defenses, and output formatting rules." lightbox="../media/system-prompt-components.png":::
2929

3030
### Role and scope definition
3131

learn-pr/advocates/ai-security-controls/includes/7-implement-application-security-best-practices-for-ai-enabled-applications.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,3 @@ Conduct ongoing security assessments that include AI-specific scenarios:
5959
- **Penetration testing**: Include AI-specific attack scenarios (prompt injection, jailbreaking, data exfiltration) in penetration tests
6060
- **Code reviews**: Review code that handles prompt construction, tool-call routing, and data retrieval for security flaws
6161
- **Red team exercises**: Conduct regular AI-focused red team exercises to test the effectiveness of security controls. The next module in this learning path covers AI red teaming in detail.
62-
63-
<!-- IMAGE PLACEHOLDER: Conceptual diagram
64-
Alt text: Diagram showing layered AI application security from SDLC through monitoring
65-
Suggested source: Custom diagram needed
66-
Capture instructions: Create a concentric or layered diagram with the secure SDLC as the outermost ring, then inner layers for agent tool security, data protection (encryption, secrets management), monitoring and observability, and regular security testing at the core. This visualizes the defense-in-depth approach for AI applications.
67-
Suggested filename: ai-app-security-layers.png
68-
Priority: Medium
69-
-->

learn-pr/advocates/ai-security-controls/media/ai-oss-library-review-process.png renamed to learn-pr/advocates/ai-security-controls/media/ai-open-source-library-review-process.png

File renamed without changes.

learn-pr/advocates/ai-security-controls/media/ai-oss-library-review-process.svg renamed to learn-pr/advocates/ai-security-controls/media/ai-open-source-library-review-process.svg

File renamed without changes.
32.1 KB
Loading
Lines changed: 56 additions & 0 deletions
Loading

learn-pr/advocates/ai-security-controls/media/metaprompt-components.png renamed to learn-pr/advocates/ai-security-controls/media/system-prompt-components.png

File renamed without changes.

learn-pr/advocates/ai-security-controls/media/metaprompt-components.svg renamed to learn-pr/advocates/ai-security-controls/media/system-prompt-components.svg

File renamed without changes.

learn-pr/advocates/ai-security-controls/media/metaprompt-processing-flow.png renamed to learn-pr/advocates/ai-security-controls/media/system-prompt-processing-flow.png

File renamed without changes.

0 commit comments

Comments
 (0)