Record summary
A quick snapshot of what this page covers.
Techniques6Attack methods connected to this risk.
Mitigations16Defenses that may help with related attacks.
Domain2. Privacy & SecurityThe broad risk area this belongs to.
Risk profile
How this risk is described and categorized.
Domain2. Privacy & Security
Subdomain2.1 > Compromise of privacy by leaking or correctly inferring sensitive information
Entity2 - AI
Intent2 - Unintentional
Timing3 - Other
CategorySafety & Trustworthiness
SubcategoryData governance
Suggested mitigations
Defenses that may help with related attacks.
Restrict Number of AI Model Queries
Business and Data UnderstandingDeployment+1 more
Control Access to AI Models and Data in Production
DeploymentMonitoring and Maintenance
AI Telemetry Logging
DeploymentMonitoring and Maintenance
Validate AI Model
ML Model EvaluationMonitoring and Maintenance
Generative AI Guardrails
ML Model EngineeringML Model Evaluation+1 more
Generative AI Guidelines
ML Model EngineeringML Model Evaluation+1 more
Generative AI Model Alignment
ML Model EngineeringML Model Evaluation+1 more
Control Access to AI Models and Data at Rest
Business and Data UnderstandingData Preparation+2 more
Encrypt Sensitive Information
Data PreparationML Model Engineering+1 more
AI Model Distribution Methods
Deployment
Restrict Library Loading
Deployment
Code Signing
Deployment
Verify AI Artifacts
Business and Data UnderstandingData Preparation+1 more
Vulnerability Scanning
ML Model EngineeringData Preparation
User Training
Business and Data UnderstandingData Preparation+4 more
AI Bill of Materials
Business and Data UnderstandingData Preparation+1 more
Source
Research source for this risk, when available.
Included resource
Cataloguing LLM Evaluations
Original source
MIT AI Risk Repository
Open the public repository used for AI risk records and taxonomy fields.
