category
AI Mitigations
Practical safeguards that help reduce AI security and safety risks.
Showing 21-40 of 44 records
Input and Output Validation for AI Agent Components is an AI mitigation for Business and Data Understanding, Data Preparation, Deployment, grouped as Technic...
Segmentation of AI Agent Components is an AI mitigation for Deployment, Business and Data Understanding, grouped as Technical - Cyber. It is connected to 6 a...
User Training is an AI mitigation for Business and Data Understanding, Data Preparation, ML Model Engineering, ML Model Evaluation, Deployment, Monitoring an...
AI Model Distribution Methods is an AI mitigation for Deployment, grouped as Policy. It is connected to 6 attack methods.
Verify AI Artifacts is an AI mitigation for Business and Data Understanding, Data Preparation, ML Model Engineering, grouped as Technical - Cyber. It is conn...
Limit Model Artifact Release is an AI mitigation for Business and Data Understanding, Deployment, grouped as Policy. It is connected to 6 attack methods.
Single-User AI Agent Permissions Configuration is an AI mitigation for Deployment, grouped as Technical - Cyber. It is connected to 7 attack methods.
Privileged AI Agent Permissions Configuration is an AI mitigation for Deployment, grouped as Technical - Cyber. It is connected to 7 attack methods.
AI Bill of Materials is an AI mitigation for Business and Data Understanding, Data Preparation, ML Model Engineering, grouped as Policy. It is connected to 7...
Generative AI Model Alignment is an AI mitigation for ML Model Engineering, ML Model Evaluation, Deployment, grouped as Technical - ML. It is connected to 7...
Generative AI Guidelines is an AI mitigation for ML Model Engineering, ML Model Evaluation, Deployment, grouped as Technical - ML. It is connected to 7 attac...
Limit Public Release of Information is an AI mitigation for Business and Data Understanding, grouped as Policy. It is connected to 7 attack methods.
Generative AI Guardrails is an AI mitigation for ML Model Engineering, ML Model Evaluation, Deployment, grouped as Technical - ML. It is connected to 8 attac...
Code Signing is an AI mitigation for Deployment, grouped as Technical - Cyber. It is connected to 8 attack methods.
Input Restoration is an AI mitigation for Data Preparation, ML Model Evaluation, Deployment, Monitoring and Maintenance, grouped as Technical - ML. It is con...
Validate AI Model is an AI mitigation for ML Model Evaluation, Monitoring and Maintenance, grouped as Technical - ML. It is connected to 8 attack methods.
Model Hardening is an AI mitigation for Data Preparation, ML Model Engineering, grouped as Technical - ML. It is connected to 8 attack methods.
Adversarial Input Detection is an AI mitigation for Data Preparation, ML Model Engineering, ML Model Evaluation, Deployment, Monitoring and Maintenance, grou...
Control Access to AI Models and Data in Production is an AI mitigation for Deployment, Monitoring and Maintenance, grouped as Policy. It is connected to 11 a...
Use Ensemble Methods is an AI mitigation for ML Model Engineering, grouped as Technical - ML. It is connected to 11 attack methods.