{"id":5933,"date":"2025-05-18T05:05:06","date_gmt":"2025-05-17T21:05:06","guid":{"rendered":"https:\/\/cicserver.com\/4-components-to-know-and-apply-when-securing-ai-by-design\/"},"modified":"2025-05-18T05:05:06","modified_gmt":"2025-05-17T21:05:06","slug":"4-components-to-know-and-apply-when-securing-ai-by-design","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/4-components-to-know-and-apply-when-securing-ai-by-design\/","title":{"rendered":"4 Components to Know and Apply when Securing AI by Design"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Enterprises are ramping up AI deployments throughout their operations.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Generative AI (GenAI) tool adoption alone has significantly increased in the past year. According to McKinsey &amp; Company&#8217;s <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai\">2024 global survey on AI<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, 65% of respondents said their organizations regularly use GenAI tools. In Palo Alto&#8217;s &#8220;<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.paloaltonetworks.com\/state-of-cloud-native-security\">The State of Cloud-Native Security Report 2024<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">,&#8221; 100% of survey respondents said they&#8217;re rolling out AI-assisted application development.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Integrating AI and large language models can fuel new productivity and efficiency benefits, but they also usher in new security risks. The answer isn&#8217;t to compromise security for productivity or slow down the business in the interest of security. The answer lies in building security into the very fabric of AI-enabled applications &#8212; in other words, securing AI by design.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"New Risks Require a New Approach\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">New Risks Require a New Approach<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">For many enterprises, <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-infrastructure\/cisco-report-enterprises-ill-prepared-to-realize-ai-s-potential\">AI adoption<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> is directly tied to either growing the top line &#8212; via improved differentiation and creation of new revenue streams &#8212; or improving the bottom line through efficiencies in core business functions. Yet success is more than adding an AI model to the existing infrastructure stack and moving on to the next thing. An entirely new supply chain and AI stack are involved, including models, agents and plugins. AI also calls for new uses of potentially sensitive data for training and inferencing.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Most AI-based tools and components are still nascent. Developers are feeling the pressure to develop these tools and components quickly so that organizations can deliver personal AI experiences to their users. Yet, many AI applications aren&#8217;t built with security in mind. As a result, they can potentially expose sensitive data, such as confidential corporate information and customers&#8217; personal information. This mix of a compressed timeframe and emerging technology makes security even more complicated than it usually is with standard applications.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Hackers know this and are seizing the opportunity to target AI systems. These attacks jeopardize operational functionality, data integrity and regulatory compliance.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">However tempting it might be, the answer isn&#8217;t to ban AI use. Organizations that don&#8217;t harness the power of this technology are likely to lag behind as their peers reap new efficiency and productivity benefits.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Secure AI by Design\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Secure AI by Design<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">To stay competitive, organizations need to balance possible gains from AI adoption with security &#8212; without jeopardizing the speed of delivery. Secure AI by design is an extension of the Cybersecurity and Infrastructure Security Agency&#8217;s <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/securebydesign\">Secure by Design<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> principle. It offers a framework that prioritizes AI security, enabling enterprises to safeguard AI during development and deployment from specific and general security threats.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Key Components of a Secure AI by Design Approach\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Key Components of a Secure AI by Design Approach<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-security\/how-to-mitigate-shadow-ai-security-risks-by-implementing-the-right-policies\">Comprehensive AI security<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> includes the following components:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_ordered BasicList_limited\">\n<ol data-testid=\"basic-list-ordered\" class=\"BasicList-OrderedList BasicList-OrderedList_nestedLevel_0 body-normal\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Visibility.<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> Secure AI by design provides a view into all aspects of the enterprise AI ecosystem: Users, models, data sources, applications, plugins and internet exposure across cloud environments. It lets users recognize how AI applications interact with models and other data while also highlighting possible gaps and high-risk communication channels between apps and models.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Threat protection<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. It safeguards organizations against known and zero-day AI-specific attacks, malicious responses, prompt injection, leakage of sensitive data and more. It&#8217;s designed to protect AI applications from malicious actors who try to take advantage of all the novel risks that AI components introduce into an application infrastructure.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Continuous monitoring for new threat vectors<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. This model tracks constantly changing applications. It diligently protects and continuously monitors the AI ecosystem&#8217;s runtime risk exposure. It should also assess new and unprotected AI apps, observe AI runtime risk and highlight any unsafe communication pathways coming from AI apps.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Use of controls<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">. It allows IT teams to make informed decisions about when to allow, block or limit access to GenAI apps &#8212; either on a per-application basis or by using categorical or risk-based controls. These controls, for example, might block everyone except developers from accessing code optimization tools. Or they can allow employees to use ChatGPT for research purposes but never to edit source code.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<\/div>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Designed to be Secure\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Designed to be Secure<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">AI has the potential to transform every industry, much like cloud and mobile computing did in years past. Securing AI technologies is critical as businesses increase their development and deployment. Enterprises need a way to <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-management\/harnessing-packet-data-to-stop-evolving-ai-cyber-threats\">manage AI risks<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> at every step of the journey.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">To keep sensitive data secure, modern enterprises need a comprehensive approach to protect AI systems from a range of threats, ensuring their safe and effective use and paving the way for secure innovation. To do that, enterprises need to secure AI from the ground up.<\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Enterprises are ramping up AI deployments throughout their operations. Generative AI (GenAI) tool adoption alone has significantly increased in the past year. According to McKinsey &amp; Company&#8217;s 2024 global survey on AI, 65% of respondents said their organizations regularly use GenAI tools. In Palo Alto&#8217;s &#8220;The State of Cloud-Native Security Report 2024,&#8221; 100% of survey [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5934,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5933","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5933"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5933\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5934"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}