<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mlops - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/mlops-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/mlops-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 15 Apr 2025 14:51:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>mlops - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/mlops-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Red Teaming IA : State of play of AI risks in 2025</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/04/red-teaming-ia-state-of-play-of-ai-risks-in-2025/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/04/red-teaming-ia-state-of-play-of-ai-risks-in-2025/#respond</comments>
		
		<dc:creator><![CDATA[Basma Benali]]></dc:creator>
		<pubDate>Tue, 15 Apr 2025 13:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[genai]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[IA Generative]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[mlops]]></category>
		<category><![CDATA[Red Teaming]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25767</guid>

					<description><![CDATA[<p>Generative AI systems are fallible: in March 2025, a ChatGPT vulnerability was widely exploited to trap its users; a few months earlier, Microsoft&#8217;s health chatbot exposed sensitive data; in December, a simple prompt injection allowed the takeover of a user...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/04/red-teaming-ia-state-of-play-of-ai-risks-in-2025/">Red Teaming IA : State of play of AI risks in 2025</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Generative AI systems are fallible: in March 2025, a ChatGPT vulnerability was widely exploited to trap its users; a few months earlier, Microsoft&#8217;s health chatbot exposed sensitive data; in December, a simple prompt injection allowed the takeover of a user account on the competing service DeepSeek.</p>
<p style="text-align: justify;">Today, the impacts are limited because the latitude given to AI systems is still relatively low. Tomorrow, with the rise of agentic AI, accelerated adoption of generative AI, and the multiplication of use cases, the impacts will grow. Just as the ransomware WannaCry exploited vulnerabilities on a massive scale in 2017, major cyberattacks are likely to target AI systems and could result in injuries or financial bankruptcies.</p>
<p style="text-align: justify;">These risks can be anticipated. One of the most pragmatic ways to do this is to take on the role of a malicious individual and attempt to manipulate an AI system to study its robustness. This approach highlights system vulnerabilities and how to fix them. Specifically for generative AI, this discipline is called AI RedTeaming. In this article, we offer insight into its contours, focusing particularly on field feedback regarding the main vulnerabilities encountered.</p>
<p style="text-align: justify;">To stay aligned with the market practices, this article exclusively focuses on the RedTeaming of generative AI systems.</p>
<p style="text-align: justify;"><em> </em></p>
<h2 style="text-align: justify;"><!--StartFragment --><span class="cf0">Back to basics, how does genAI work</span> ?</h2>
<p> </p>
<p style="text-align: justify;">GenAI relies on components that are often distributed between cloud and on-premise environments. Generally, the more functionalities a generative AI system offers (searching for information, launching actions, executing code, etc.), the more components it includes. From a cybersecurity perspective, this exposes the system to multiple risks :</p>
<p><img fetchpriority="high" decoding="async" class="wp-image-25779 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2.png" alt="Underlying infrastructure / GenAI hosting platforms" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive2-800x450.png 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: center;"><em>Diagram of a Generative AI System and Issues Raised by Component</em></p>
<p> </p>
<p style="text-align: justify;">In general, an attacker only has access to a web interface through which they can interact (click, enter text into fields, etc.). From there, they can:</p>
<ul>
<li>Conduct classic cybersecurity attacks (inserting malicious scripts – XSS, etc.) by exploiting vulnerabilities in the AI system’s components;</li>
<li>Perform a new type of attack by writing in natural language to exploit the functionalities provided by the generative AI system behind the web interface: data exfiltration, executing malicious actions using the privileges of the generative AI system, etc.</li>
</ul>
<p style="text-align: justify;">Technically, each component is protected by implementing security measures defined by Security Integration Processes within Projects. It is then useful to practically assess the effective level of security through an AI RedTeam audit.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">RedTeaming IA, Art of findings AI vulnerabilities</h2>
<p> </p>
<p style="text-align: justify;">AI RedTeam audits are similar to traditional security audits. However, to address the new challenges of GenAI, they rely on specific methodologies, frameworks, and tools. Indeed, during an AI RedTeam audit, the goal is to bypass the generative AI system by either attacking its components or crafting malicious instructions in natural language. This second type of attack is called prompt injection, the art of formulating malicious queries to an AI system to divert its functionalities.</p>
<p style="text-align: justify;">During an AI RedTeam audit, two types of tests in natural language attacks (specific to AI) are conducted simultaneously:</p>
<ul>
<li>Manual tests. These allow a reconnaissance phase using libraries of malicious questions consolidated beforehand.</li>
<li>Automated tests. These usually involve a generative AI attacking the target generative AI system by generating a series of malicious prompts and automatically analyzing the coherence of the chatbot&#8217;s responses. They help assess the system&#8217;s robustness across a wide range of scenarios.</li>
</ul>
<p style="text-align: justify;">These tests typically identify several vulnerabilities and highlight cybersecurity risks that are often underestimated.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">What are the main vulnerabilities we found ?</h2>
<p> </p>
<p style="text-align: justify;">We have covered three main deployment categories with our clients:</p>
<ol>
<li>Simple chatbot : these solutions are primarily used for redirecting and sorting user requests;</li>
<li>RAG (Retrieval-Augmented Generation) chatbot : these more sophisticated systems consult internal document databases to enrich their responses;</li>
<li>Agentic chatbot : these advanced solutions can interact with other systems and execute actions.</li>
</ol>
<p style="text-align: justify;">The consolidation of vulnerabilities identified during our interventions, as well as their relative criticality, allows us to define the following ranking:</p>
<p style="text-align: justify;"><img decoding="async" class="aligncenter wp-image-25775 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4.png" alt="Vulnerabilités LLM &amp; Chatbots Notre Top 6 2025" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/04/Diapositive4-800x450.png 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<h3 style="text-align: justify;"><strong>Diversion of the model and generation of illegitimate content </strong></h3>
<p style="text-align: justify;">This concerns the circumvention of the technical safeguards put in place during the development of the chatbot in order to generate offensive, malicious, or inappropriate content. Thus, the credibility and reputation of the company are at risk of being impacted since it is responsible for the content produced by its chatbot. </p>
<p style="text-align: justify;">It is worth noting that the circumvention of the model&#8217;s security mechanisms can lead to a complete unlocking. This is referred to as a jailbreak of the model, which shifts it into an unrestricted mode. In this state, it can produce content outside the framework desired by the company.</p>
<h3 style="text-align: justify;"><strong>Access to the preprompt</strong></h3>
<p style="text-align: justify;">The term preprompt refers to the set of instructions that feed the model and shape it for the desired use. All models are instructed not to disclose this preprompt in any form. </p>
<p style="text-align: justify;">An attacker gaining access to this preprompt has their attack facilitated, as it allows them to map the capabilities of the chatbot model. This mapping is particularly useful for complex systems interfaced with APIs or other external systems. Furthermore, access to this preprompt by an attacker enables them to visualize how the filters and limitations of the chatbot have been implemented, which allows them to bypass them more easily.</p>
<h3 style="text-align: justify;"><strong>Web integration and third-party integration</strong></h3>
<p style="text-align: justify;">GenAI solutions are often presented to users through a web interface. AI RedTeaming activities regularly highlight classic issues of web applications, particularly the isolation of user sessions or attacks aimed at trapping them. In the case of agentic systems, these vulnerabilities can also affect third-party components interconnected with the GenAI system.</p>
<h3 style="text-align: justify;"><strong>Sensitive data leaks</strong></h3>
<p style="text-align: justify;">If the data feeding the internal knowledge base of a RAG chatbot is insufficiently consolidated (selection, management, anonymization, &#8230;), the models may inadvertently reveal sensitive or confidential information. </p>
<p style="text-align: justify;">This issue is related to aspects of rights management, data classification, and hardening the data preparation and transit pipelines (MLOps).</p>
<h3 style="text-align: justify;"><strong>Stored injection</strong></h3>
<p style="text-align: justify;">In the case of stored injection, the attacker is able to feed the knowledge base of a model by including malicious instructions (via a compromised document). This knowledge base is used for the chatbot&#8217;s responses, so any user interacting with the model and requesting the said document will have their session compromised (leak of users&#8217; conversation history data, malicious redirections, participation in a social engineering attack, etc.). </p>
<p style="text-align: justify;">Compromised documents may be particularly difficult to identify, especially in the case of large or poorly managed knowledge bases. This attack is thus persistent and stealthy.</p>
<h3 style="text-align: justify;"><strong>Mention honorable: parasitism and cost explosion</strong></h3>
<p style="text-align: justify;">We talk about parasitism when a user is able to unlock the chatbot to fully utilize the model&#8217;s capabilities and do so for free. Coupled with a lack of volumetric restrictions, a user can make a prohibitive number of requests, unrelated to the initial use case, and still be charged for them.</p>
<p style="text-align: justify;">In general, some of the mentioned vulnerabilities concern relatively minor risks, whose business impact on information systems (IS) is limited. Nevertheless, with advances in AI technologies, these vulnerabilities take on a different dimension, particularly in the following cases:</p>
<ul>
<li>Agentic solutions with access to sensitive systems</li>
<li>RAG applications involving confidential data</li>
<li>Systems for which users have control over the knowledge base documents, opening the door to stored injections</li>
</ul>
<p style="text-align: justify;"><strong>The tested GenAI systems are largely unlockable, although the exercise becomes more complex over time. This persistent inability of the models to implement effective restrictions encourages the AI ecosystem to turn to external security components.</strong></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;">What are the new attack surfaces ?</h2>
<p> </p>
<p style="text-align: justify;">The increasing integration of AI into sensitive sectors (healthcare, finance, defense, &#8230;) expands the attack surfaces of critical systems, which reinforces the need for filtering and anonymization of sensitive data. Where AI applications were previously very compartmentalized, agentic AI puts an end to this compartmentalization as it deploys a capacity for interconnection, opening the door to potential threat propagation within information systems. </p>
<p style="text-align: justify;">The decrease in the technical level required to create an AI system, particularly through the use of SaaS platforms and Low/no code services, facilitates its use for both legitimate users and attackers. </p>
<p style="text-align: justify;">Finally, the widespread adoption of &#8220;co-pilots&#8221; directly on employees&#8217; workstations results in an increasing use of increasingly autonomous components that act in place of and with the privileges of a human, accelerating the emergence of uncontrolled AI perimeters or Shadow IT AI. </p>
<p> </p>
<h2 style="text-align: justify;">Towards increasingly difficult-to-control systems</h2>
<p> </p>
<p style="text-align: justify;">Although appearing to imitate human intelligence, GenAI models (LLMs, or Large Language Models) have the sole function of mimicking language and often act as highly efficient text auto-completion systems. These systems are not natively trained to reason, and their use encounters a &#8220;black box&#8221; operation. It is indeed complex to reliably explain their reasoning, which regularly results in hallucinations in their outputs or logical fallacies. In practice, it is also impossible to prove the absence of &#8220;backdoors&#8221; in these models, further limiting our trust in these systems. </p>
<p style="text-align: justify;">The emergence of agentic AI complicates the situation. By interconnecting systems with opaque functioning, it renders the entire reasoning process generally unverifiable and inexplicable. Cases of models training, auditing, or attacking other models are becoming widespread, leading to a major trust issue when they are integrated into corporate information systems.</p>
<p style="text-align: justify;"> </p>
<h2>What are the perspectives for the future ?</h2>
<p> </p>
<p style="text-align: justify;">The RedTeaming AI audits conducted on generative AI systems reveal a contrasting reality. On one hand, innovation is rapid, driven by increasingly powerful and integrated use cases. On the other hand, the identified vulnerabilities demonstrate that these systems, often perceived as intelligent, remain largely manipulable, unstable, and poorly explainable. </p>
<p style="text-align: justify;">This observation is part of a broader context of the democratization of AI tools coupled with their increasing autonomy. Agentic AI, in particular, reveals chains of action that are difficult to trace, acting with human privileges. In such a landscape, the risk is no longer solely technical: it also becomes organizational and strategic, involving continuous governance and oversight of its uses. </p>
<p style="text-align: justify;">In the face of these challenges, RedTeaming AI emerges as an essential lever to anticipate possible deviations, adopting the attacker’s perspective to better prevent drifts. It involves testing the limits of a system to design robust, sustainable protection mechanisms that align with new uses. Only by doing so can generative AI continue to evolve within a framework of trust, serving both users and organizations. </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/04/red-teaming-ia-state-of-play-of-ai-risks-in-2025/">Red Teaming IA : State of play of AI risks in 2025</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/04/red-teaming-ia-state-of-play-of-ai-risks-in-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Adopting MLSecOps: the key to reliable and secure AI models </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/10/adopting-mlsecops-the-key-to-reliable-and-secure-ai-models/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/10/adopting-mlsecops-the-key-to-reliable-and-secure-ai-models/#respond</comments>
		
		<dc:creator><![CDATA[Pierre Aubret]]></dc:creator>
		<pubDate>Fri, 25 Oct 2024 14:57:34 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[mlops]]></category>
		<category><![CDATA[mlsecops]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24319</guid>

					<description><![CDATA[<p>Artificial intelligence (AI) now occupies a central place in the products and services offered by businesses and public services, largely thanks to the rise of generative AI. To support this growth and encourage the adoption of AI, it has been...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/adopting-mlsecops-the-key-to-reliable-and-secure-ai-models/">Adopting MLSecOps: the key to reliable and secure AI models </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">Artificial intelligence (AI) now occupies a central place in the products and services offered by businesses and public services, largely thanks to the rise of generative AI. To support this growth and encourage the adoption of AI, it has been necessary </span><b><span data-contrast="auto">to industrialize the design of AI systems </span></b><span data-contrast="auto">by adapting model development methods and procedures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This gave rise to </span><b><span data-contrast="auto">MLOps</span></b><span data-contrast="auto">, a contraction of &#8220;Machine Learning&#8221; (the heart of AI systems) and &#8220;Operations&#8221;. Like DevOps, MLOps facilitates the success of Machine Learning projects while ensuring the production of high-performance models.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">However, it is crucial to guarantee the security of the algorithms so that they remain efficient and reliable over time. To achieve this, it is necessary to </span><b><span data-contrast="auto">evolve from MLOps to MLSecOps</span></b><span data-contrast="auto">, by integrating security into processes in the same way as DevSecOps. </span><b><span data-contrast="auto">Few organisations have adopted and deployed a complete MLSecOps process</span></b><span data-contrast="auto">. In this article, we explore in detail the form that MLSecOps could take.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2 style="text-align: justify;"><span data-contrast="none">MLOps, the fundamentals of AI model development</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h2>
<h3 style="text-align: justify;"><span data-contrast="none">Closer links with DevOps</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">DevOps is an approach that combines software development (Dev) and IT operations (Ops). Its aim is to shorten the development lifecycle while ensuring continuous high-quality delivery. Key principles include process automation (development, testing and release), continuous delivery (CI/CD) and fast feedback loops.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">MLOps is an extension of DevOps principles applied specifically to Machine Learning (ML) projects. Workflows are simplified and automated as far as possible, from the preparation of training data to the management of models in production. </span><span data-contrast="auto">MLOps differs from DevOps in several ways:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Importance of data and models</span></b><span data-contrast="auto">: In Machine Learning, data, and models are crucial. MLOps goes a step further by automating all the stages of Machine Learning, from data preparation to the training phases. What&#8217;s more, a larger volume of data is often used in Machine Learning projects.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Experimental nature of development</span></b><span data-contrast="auto">: Development in Machine Learning is experimental and involves continually testing and adjusting models to find the best algorithms, parameters and relevant data for learning. This poses challenges for adapting DevOps to Machine Learning, as DevOps focuses on process automation and stability.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Complexity of testing and acceptance</span></b><span data-contrast="auto">: The evolving nature of the models and the complexity of the data make the testing and acceptance phases more delicate in Machine Learning. What&#8217;s more, performance monitoring is essential to ensure that the models work properly in production. In Machine Learning, therefore, it is necessary to adapt the Operational Maintenance procedures to maintain the stability and reliability of the systems.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">In short, an MLOps chain shares common elements with a DevOps chain although introduces additional steps and places particular importance on the management and use of data. The following graph highlights in yellow all the additional steps that MLOps introduces:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Data access and use</span></b><span data-contrast="auto">: This stage includes all the data engineering phases (collection, transformation and versioning of the data used for training). The challenge is to ensure the integrity of the data and the reproducibility of the tests.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Model acceptance</span></b><span data-contrast="auto">: ML acceptance and integration tests are more complex and take place at three different layers: the data pipeline, the ML model pipeline and the application pipeline.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Production monitoring</span></b><span data-contrast="auto">: This involves guaranteeing the model&#8217;s performance over time and avoiding &#8220;model drifting&#8221; (decline in performance over time). To achieve this, all deviations (instantaneous change, gradual change, recurring change) must be detected, analyzed, and corrected if necessary.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img decoding="async" class="aligncenter wp-image-24325 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/1-1.jpg" alt="" width="1391" height="689" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/1-1.jpg 1391w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/1-1-386x191.jpg 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/1-1-71x35.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/1-1-768x380.jpg 768w" sizes="(max-width: 1391px) 100vw, 1391px" /></span></p>
<p style="text-align: center;"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">1</span></i><i><span data-contrast="none"> &#8211; Adapting the DevOps stages to Machine Learning</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h3> </h3>
<h3 style="text-align: justify;"><span data-contrast="none">Implementing MLOps requires creating a dialogue between data engineers and DevOps operators</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Moving to MLOps means </span><b><span data-contrast="auto">creating new organizational steps </span></b><span data-contrast="auto">specifically adapted to data management. This includes the collection and transformation of training data, as well as the processes for tracking the different versions of the data. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this sense, collaboration between MLOps experts, data scientists and data engineers is essential for success in this constantly evolving field. The main challenge in setting up an MLOps chain therefore lies in integrating the data engineers into the DevOps processes. They are responsible for preparing the data that MLOps engineers need to train and execute models. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3>And what about safety? </h3>
<p style="text-align: justify;"><span data-contrast="auto">The massive adoption of generative AI in 2024 has provided us with a variety of examples of security term compromises. Indeed, the attack surface is large: a malicious actor can both </span><b><span data-contrast="auto">attack the model </span></b><span data-contrast="auto">itself (model theft, model reconstruction, diversion from initial use) </span><b><span data-contrast="auto">but also attack its data </span></b><span data-contrast="auto">(extracting training data, modifying behaviour by adding false data, etc.). To illustrate the latter, we have simulated two realistic attacks in previous articles: </span><a href="https://www.riskinsight-wavestone.com/en/2023/06/attacking-ai-a-real-life-example/"><span data-contrast="none">Attacking an AI? A concrete example!</span></a><span data-contrast="auto"> or </span><a href="https://www.riskinsight-wavestone.com/en/2023/10/language-as-a-sword-the-risk-of-prompt-injection-on-ai-generative/"><span data-contrast="none">When words become weapons: prompt injection</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">At the same time, MLOps introduces automation, which speeds up production. While this may reduce time</span><i><span data-contrast="auto"> to market</span></i><span data-contrast="auto">, it also increases the risks (supply chain attacks, massaction). It is therefore crucial to ensure that the risks associated with cybersecurity and AI are properly managed.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">As DevSecOps does for DevOps, the MLOps production chain must be secure. Here is an overview of the main risks in the MLOps chain:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/2-1.jpg" alt="" width="1250" height="652" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/2-1.jpg 1250w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/2-1-366x191.jpg 366w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/2-1-71x37.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/2-1-768x401.jpg 768w" sizes="auto, (max-width: 1250px) 100vw, 1250px" /></span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2><span data-contrast="none">Adopt MLSECOPS</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h2>
<h3><span data-contrast="none">Integrating safety into MLOPS teams and strengthening the safety culture</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">The principles of MLSecOps need to be understood by data scientists and data engineers. To achieve this, it is crucial that the security teams are involved from the outset of the project. </span><span data-contrast="auto">This can be done in two ways:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">When a new project is created, a member of the security team is assigned as the security manager. He or she supervises progress and answers questions from the project teams.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">A more agile approach, similar to DevSecOps, involves designating a member of the team as the &#8220;</span><b><span data-contrast="auto">Security Champion</span></b><span data-contrast="auto">&#8220;. This cybersecurity referent within the project team becomes the main point of contact for the cyber teams. This method enables security to be integrated more realistically into the project but requires appropriate training for the Security Champion.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">For this change to be effective, it is also necessary to change the way project teams perceive cybersecurity:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">By providing basic training to teams to help them better understand the challenges of cyber security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">By integrating cyber security into collaboration and knowledge platforms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="23" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">By organising regular awareness campaigns.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Securing MLOPS chain tools</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To guarantee product security, it is essential to secure the production chain. In the context of MLOps, this means ensuring that all the tools are used correctly, with practices that incorporate cybersecurity, whether they be </span><b><span data-contrast="auto">data processing and management tools </span></b><span data-contrast="auto">(such as MongoDB, SQL, etc.), </span><b><span data-contrast="auto">monitoring tools </span></b><span data-contrast="auto">(such as Prometheus), or more or less specific </span><b><span data-contrast="auto">development tools </span></b><span data-contrast="auto">(such as MLFlow or GitHub).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">For example, it is crucial that teams remain vigilant on issues such as identification and identity management, business continuity, monitoring and data management. The possibilities offered by the various tools used throughout the lifecycle, and their specific features, must be examined in relation to these issues. Ideally, cybersecurity features should be used as selection criteria when choosing the most suitable tool.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3><span data-contrast="none">Defining AI security practices</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">In addition to the security of the tools used to build AI systems, security measures must be incorporated to prevent vulnerabilities specific to AI systems. These measures must be incorporated right from the design stage and throughout the application&#8217;s lifecycle, following an MLSecOps approach. From data collection to system monitoring, there are numerous security measures to incorporate:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/3-1.jpg" alt="" width="1135" height="510" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/3-1.jpg 1135w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/3-1-425x191.jpg 425w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/3-1-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/3-1-768x345.jpg 768w" sizes="auto, (max-width: 1135px) 100vw, 1135px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">2</span></i><i><span data-contrast="none"> &#8211; Securing the MLOps lifecycle</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><span data-contrast="none">Three security measures to implement in your MLSecOps processes</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:360,&quot;335559739&quot;:80}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Depending on the security strategy adopted, various security measures can be integrated throughout the MLOps lifecycle. We have detailed the main defence mechanisms for securing AI in the following article: </span><a href="https://www.riskinsight-wavestone.com/en/2024/03/securing-ai-the-new-cybersecurity-challenges/"><span data-contrast="none">Securing AI: The New Cybersecurity Challenges</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this section, we will focus on 3 specific measures that can be implemented to enhance the security of MLOps:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134245418&quot;:true}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-24331 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/4-1.jpg" alt="" width="1100" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/4-1.jpg 1100w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/4-1-385x191.jpg 385w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/4-1-71x35.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/10/4-1-768x381.jpg 768w" sizes="auto, (max-width: 1100px) 100vw, 1100px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">3</span></i><i><span data-contrast="none"> &#8211; Selected security measures</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3><span data-contrast="none">Checking the relevance of data and the risks of poisoning</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">In the context of Machine Learning, data security is essential to prevent the risk of poisoning and to guarantee the integrity of the data processed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Before processing the data collected, it is essential to continually check </span><b><span data-contrast="auto">the origin of the data in </span></b><span data-contrast="auto">order to guarantee its quality and relevance. This is all the more complex when using external data streams, the provenance and veracity of which can sometimes be uncertain. The major risk lies in the </span><b><span data-contrast="auto">integration of user data during continuous learning</span></b><span data-contrast="auto">. This can lead to unpredictable results, as illustrated by the example of Microsoft&#8217;s TAY ChatBot in 2016. This was designed to learn through user interaction. However, without proper moderation, it quickly adopted inappropriate behaviour, reflecting the negative feedback it received. This incident highlights the importance of constant monitoring and moderation of input data, particularly when it comes from real-time human interactions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Various analysis techniques can be used to </span><b><span data-contrast="auto">clean up a dataset</span></b><span data-contrast="auto">. The aim is to check the integrity of the data and remove any data that could have a negative impact on the model&#8217;s performance. </span><span data-contrast="auto">Two main methods are possible: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">On the one hand, we can individually check the integrity of each data item by checking for outliers, validating the format or characteristic metrics, etc.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">On the other hand, with a global analysis, approaches such as cross-validation and statistical clustering are effective in identifying and eliminating inappropriate elements from the dataset.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p> </p>
<h3><span data-contrast="none">Introduce contradictory examples</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Contradictory examples are corrupted inputs, modified to mislead the predictions of a Machine Learning algorithm. These modifications are designed to be undetectable to the human eye but sufficient to fool the algorithm. This type of attack exploits vulnerabilities or flaws in the model training to cause prediction errors. To reduce these errors, the model can be taught to identify and ignore this type of input.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To do this, we can </span><b><span data-contrast="auto">deliberately add contradictory examples to the training data</span></b><span data-contrast="auto">. The aim is to present the model with slightly altered data, in order to prepare it to correctly identify and manage potential errors. Creating this type of degraded data is complex. The generation of these contradictory examples must be adapted to the problem and the threats identified. It is crucial to </span><b><span data-contrast="auto">carefully monitor the training phase </span></b><span data-contrast="auto">to ensure that the model effectively recognises these incorrect inputs and knows how to react correctly. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h3><span data-contrast="none">Modify user entries</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Input security is essential to minimise the risks associated with malicious manipulation. A major weakness of LLMs (</span><i><span data-contrast="auto">Large Language Models</span></i><span data-contrast="auto">) is their lack of in-depth contextual understanding and their sensitivity to the precise formulation of prompts. One of the best-known techniques for exploiting this vulnerability is the </span><a href="https://www.riskinsight-wavestone.com/en/2023/10/language-as-a-sword-the-risk-of-prompt-injection-on-ai-generative/"><i><span data-contrast="none">prompt injection</span></i></a><span data-contrast="auto"> attack. It is therefore necessary </span><b><span data-contrast="auto">to introduce an intermediate step of transforming user data </span></b><span data-contrast="auto">before it is processed by the model.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is possible to modify the input slightly in order to counter this type of attack, while preserving the accuracy of the model. This transformation can be carried out using various techniques (e.g. coding, adding noise, reformulation, feature compression, etc.). The aim is to retain only what is essential for the response. In this way, any superfluous, potentially malicious information is discarded. In addition, this method deprives the attacker of the possibility of accessing the real input to the system. This prevents any in-depth analysis of the relationships between inputs and outputs, and thus complicates the design of future attacks. However, it remains essential to test the various measures implemented, to ensure that they do not degrade the performance of the model, thus guaranteeing enhanced security without compromising efficiency.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;" aria-level="1"> </p>
<p aria-level="1"> </p>
<p aria-level="1"> </p>
<p style="text-align: justify;"><span data-contrast="auto">Due to industrial production of applications based on Machine Learning and AI, large-scale security is becoming a crucial organisational issue for the market. It is imperative to make the transition to MLSecOps. This transformation is based on three main pillars:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Strengthening the security culture of Data Scientists</span></b><span data-contrast="auto">: It is essential that Data Scientists understand and integrate security principles into their day-to-day work. This creates a shared security culture and strengthens collaboration between the various players.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Securing the tools that produce Machine Learning algorithms</span></b><span data-contrast="auto">: It is essential to select secure MLOPS tools and apply best practices within the tools (rights management, etc.) to secure the Machine Learning algorithm &#8220;factory&#8221; and thus reduce the surface area for compromise.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Integrating AI-specific security measures</span></b><span data-contrast="auto">: Adapting security measures to the specific features of AI systems is crucial to preventing potential attacks and ensuring the reliability of models over time. These security measures should therefore be integrated into the MLOps chain using MLSecOps.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Make the transition to MLSecOps today. Train your teams, secure your tools, and integrate AI-specific security measures. Making this shift, you will be able to benefit from AI systems that are industrially produced and secure by design. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><b><span data-contrast="none">Thanks to Louis FAY and Hortense SOULIER who contributed to the writing of this article as well.</span></b></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/10/adopting-mlsecops-the-key-to-reliable-and-secure-ai-models/">Adopting MLSecOps: the key to reliable and secure AI models </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/10/adopting-mlsecops-the-key-to-reliable-and-secure-ai-models/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
