{"id":24514,"date":"2024-11-06T17:22:04","date_gmt":"2024-11-06T16:22:04","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=24514"},"modified":"2024-11-07T16:08:49","modified_gmt":"2024-11-07T15:08:49","slug":"generative-ai-applications-risks-and-mitigations","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/","title":{"rendered":"Generative AI applications: risks and mitigations\u00a0"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Microsoft has announced that in Q2 2024 <\/span><i><span data-contrast=\"auto\">&#8220;more than half of Fortune 500 companies will be using Azure OpenAI&#8221;<\/span><\/i><span data-contrast=\"auto\">. [<a href=\"https:\/\/synthedia.substack.com\/p\/microsoft-azure-ai-users-base-rose\">1<\/a>] At the same time, AWS is offering Bedrock [<a href=\"https:\/\/www.usine-digitale.fr\/article\/amazon-fait-son-entree-sur-le-marche-de-l-ia-generative-avec-bedrock.N2121081\">2<\/a>], a direct competitor to Azure OpenAI.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticizing their companies [<a href=\"https:\/\/www.theguardian.com\/technology\/2024\/jan\/20\/dpd-ai-chatbot-swears-calls-itself-useless-and-criticises-firm\">3<\/a>] to data leaks [<a href=\"https:\/\/openai.com\/blog\/march-20-chatgpt-outage\">4<\/a>]; there is no shortage of examples.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Which model is right for you?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Three types of generative AI can be used to create an application. The difference lies in the precision of the answers provided:\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Simple<\/span><\/b><span data-contrast=\"auto\">: generic AI model (GPT-4, Mistral, etc.) plugged in as such, with a user interface. <\/span><span data-contrast=\"auto\">It is an internal GPT.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Boosted<\/span><\/b><span data-contrast=\"auto\">: generic AI model that leverages the company&#8217;s data, for example via RAG (<\/span><i><span data-contrast=\"auto\">Retrieval Augmented Generation). <\/span><\/i><span data-contrast=\"auto\">These are specialized companions for a particular use, HR GPT, Operations GPT, CISO GPT&#8230;).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Specialized<\/span><\/b><span data-contrast=\"auto\">: the AI model retrained for a particular use. For example, India has retrained Llama 3 for its 22 official languages to make it a specialized translator.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">All three deployment methods entail risks. We will begin by describing the different modes. We will then look at the risks, and the associated mitigations<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24518 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models.jpg\" alt=\"\" width=\"1280\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models.jpg 1280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models-340x191.jpg 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models-69x39.jpg 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models-768x432.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/1-Risks-and-models-800x450.jpg 800w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Risks and models<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Simple model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This model is the simplest to deploy. It allows users to interact with the AI models proposed by the platforms. It simplifies the integration of sending prompts and receiving responses in an application. <\/span><span data-contrast=\"auto\">It is an internal ChatGPT, with the advantage of limiting the leakage of sensitive data inserted into a prompt, unlike the web version. Also, in this case, exchanges with users are not used to re-train and improve the model. Your data is protected. The Cloud platforms offered by Azure, AWS or GCP enable these solutions to be deployed rapidly.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Examples of use: text summary, development assistant.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24520 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/2-How-the-simple-model-works--e1730990068519.jpg\" alt=\"\" width=\"1075\" height=\"582\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/2-How-the-simple-model-works--e1730990068519.jpg 1075w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/2-How-the-simple-model-works--e1730990068519-353x191.jpg 353w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/2-How-the-simple-model-works--e1730990068519-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/2-How-the-simple-model-works--e1730990068519-768x416.jpg 768w\" sizes=\"auto, (max-width: 1075px) 100vw, 1075px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">How the simple model works<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Boosted model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This model remains generic, but will have access to selected company data. The AI could, for example, consult the group&#8217;s PSSI to provide the password policy.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Examples of use: enterprise chatbot, data analysis.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24522 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/3-How-the-boosted-model-works--e1730990097453.jpg\" alt=\"\" width=\"1256\" height=\"552\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/3-How-the-boosted-model-works--e1730990097453.jpg 1256w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/3-How-the-boosted-model-works--e1730990097453-435x191.jpg 435w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/3-How-the-boosted-model-works--e1730990097453-71x31.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/3-How-the-boosted-model-works--e1730990097453-768x338.jpg 768w\" sizes=\"auto, (max-width: 1256px) 100vw, 1256px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">How the boosted model works<\/span><\/i><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Specialized model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The application is no longer based on a generic model (GPT-4, Mistral, etc.). Before using it, you will need to train your own model on your company&#8217;s data. It will always be able to consult the company&#8217;s data and will have a better understanding of it to generate its response.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Examples of applications: fault detection on a production line, medical diagnostics.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24524 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/4-How-the-specialised-model-works--e1730990131373.jpg\" alt=\"\" width=\"1280\" height=\"678\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/4-How-the-specialised-model-works--e1730990131373.jpg 1280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/4-How-the-specialised-model-works--e1730990131373-361x191.jpg 361w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/4-How-the-specialised-model-works--e1730990131373-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/4-How-the-specialised-model-works--e1730990131373-768x407.jpg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">How the specialized model works<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">What risks are you exposed to?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Regardless of the model selected, there are a number of transversal or specific risks. It is important to take these into account to ensure that the solution is securely integrated.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Hijacking the model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">AI models are exposed to the risk of misuse. Imagine a scenario where someone uses this technology to generate harmful content. This could lead to real consequences such as the propagation of toxic content. <\/span><span data-contrast=\"auto\">One known attack for this purpose is <\/span><i><span data-contrast=\"auto\">Prompt Injection <\/span><\/i><span data-contrast=\"auto\">[<a href=\"https:\/\/www.riskinsight-wavestone.com\/2023\/10\/quand-les-mots-deviennent-des-armes-prompt-injection-et-intelligence-artificielle\/\">5<\/a>].<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24526 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/5-Example-Model-hijacking-Prompt-Injection--e1730990299679.jpg\" alt=\"\" width=\"1064\" height=\"573\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/5-Example-Model-hijacking-Prompt-Injection--e1730990299679.jpg 1064w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/5-Example-Model-hijacking-Prompt-Injection--e1730990299679-355x191.jpg 355w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/5-Example-Model-hijacking-Prompt-Injection--e1730990299679-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/5-Example-Model-hijacking-Prompt-Injection--e1730990299679-768x414.jpg 768w\" sizes=\"auto, (max-width: 1064px) 100vw, 1064px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Example &#8211; Model hijacking (Prompt Injection)<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Hallucination<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">When AI asserts information that is false, it hallucinates. Think of it as &#8220;daydreaming&#8221;: if it doesn&#8217;t have the answer, it will &#8220;invent&#8221; things to fill the void. This can be particularly problematic in situations where accuracy is crucial: generating reports, making decisions, etc. Users could unknowingly spread this false information, or make bad decisions.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24528 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/6-Example-Model-hallucination--e1730992007979.jpg\" alt=\"\" width=\"1077\" height=\"573\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/6-Example-Model-hallucination--e1730992007979.jpg 1077w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/6-Example-Model-hallucination--e1730992007979-359x191.jpg 359w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/6-Example-Model-hallucination--e1730992007979-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/6-Example-Model-hallucination--e1730992007979-768x409.jpg 768w\" sizes=\"auto, (max-width: 1077px) 100vw, 1077px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Example &#8211; Model hallucination<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Data leakage<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">There are several ways in which data can be leaked. An attacker can inject a malicious prompt to retrieve it, or an employee can be given more rights than necessary and access sensitive information (e.g. strategic minutes of an executive committee meeting). The security of the underlying database must therefore be proportional to the amount of data stored.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The model has access to certain company data. If, for example, its rights are too extensive, it will be able to consult confidential data. These responses will therefore include sensitive information that should not be disclosed.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24530 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/7-Example-Data-leak--e1730992041787.jpg\" alt=\"\" width=\"1269\" height=\"569\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/7-Example-Data-leak--e1730992041787.jpg 1269w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/7-Example-Data-leak--e1730992041787-426x191.jpg 426w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/7-Example-Data-leak--e1730992041787-71x32.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/7-Example-Data-leak--e1730992041787-768x344.jpg 768w\" sizes=\"auto, (max-width: 1269px) 100vw, 1269px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Example &#8211; Data leak<\/span><\/i><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Model theft<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">If the model is specialized, it is now your company&#8217;s intellectual property. As such, it could be a target for attackers. Confidential training data, for example, could be targeted. The question of trust in the Cloud host may also arise: wouldn&#8217;t it be better to host it locally?<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24532 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/8-Example-Model-theft--e1730992077288.jpg\" alt=\"\" width=\"1280\" height=\"682\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/8-Example-Model-theft--e1730992077288.jpg 1280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/8-Example-Model-theft--e1730992077288-358x191.jpg 358w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/8-Example-Model-theft--e1730992077288-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/8-Example-Model-theft--e1730992077288-768x409.jpg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">\u00a0Example &#8211; Model theft<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Poisoning the model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Without claiming to steal the model, the attacker&#8217;s aim could be to make it unreliable. The responses generated could then no longer be used by the teams.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Poisoning can occur in two ways:\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"21\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">Boosted model: the attacker accesses the RAG and modifies the information. The model then relies on poisoned data to provide its answers.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul style=\"text-align: justify;\">\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"21\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Specialized model: the attacker poisons the model&#8217;s training data. Either directly on the database that he makes available on a public platform (Hugging face type), or by accessing the training database hosted in your information system.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24534 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/9-Example-Poisoning-the-model--e1730992111840.jpg\" alt=\"\" width=\"1280\" height=\"678\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/9-Example-Poisoning-the-model--e1730992111840.jpg 1280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/9-Example-Poisoning-the-model--e1730992111840-361x191.jpg 361w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/9-Example-Poisoning-the-model--e1730992111840-71x39.jpg 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/9-Example-Poisoning-the-model--e1730992111840-768x407.jpg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">\u00a0Example &#8211; Poisoning the model<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 style=\"text-align: justify;\" aria-level=\"2\"><span data-contrast=\"none\">Main risks: what mitigations?<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Of the 5 risks presented, 3 dominate in the risk analyses carried out by our teams. We suggest you study the associated mitigations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The novelty of the technology provides an opportunity to build a solid security foundation. Several iterations will be necessary to achieve an effective and secure solution.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Risk #1: Hijacking the model<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24536 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/10-Hijacking-the-model-and-the-key-to-remediation--e1730908671925.jpg\" alt=\"\" width=\"876\" height=\"721\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/10-Hijacking-the-model-and-the-key-to-remediation--e1730908671925.jpg 876w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/10-Hijacking-the-model-and-the-key-to-remediation--e1730908671925-232x191.jpg 232w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/10-Hijacking-the-model-and-the-key-to-remediation--e1730908671925-47x39.jpg 47w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/10-Hijacking-the-model-and-the-key-to-remediation--e1730908671925-768x632.jpg 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">Hijacking the model and the key to remediation<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">We recommend the following measures to prevent the model from being hijacked:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#1 &#8211; Toughen the configuration <\/span><\/b><span data-contrast=\"auto\">in two ways. Firstly, management of the <\/span><i><span data-contrast=\"auto\">master prompt <\/span><\/i><span data-contrast=\"auto\">(discussion window with the model). Certain keywords, for example, can be banned to prevent abuse. Secondly, the number of <\/span><i><span data-contrast=\"auto\">tokens <\/span><\/i><span data-contrast=\"auto\">and therefore the size of responses. A less verbose model will have less chance of being hijacked. Other parameters can be taken into account: temperature, language used, etc.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#2 &#8211; Filter responses <\/span><\/b><span data-contrast=\"auto\">by applying, for example, a simple response filtering algorithm. To go further, it is possible to deploy specialised LLM firewalls. This would make it possible, for example, to prevent potential abuse (this is known as <\/span><i><span data-contrast=\"auto\">abuse monitoring).<\/span><\/i><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#3 &#8211; Limit the sources <\/span><\/b><span data-contrast=\"auto\">to which the model has access to generate its responses. If the model is given access to company data, it can be limited to this data only. In this way, it will not be able to search for other information on the Internet, for example. <\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Risk #2: Hallucination<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24538 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/11-Hallucination-and-the-key-to-remediation--e1730908712943.jpg\" alt=\"\" width=\"934\" height=\"721\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/11-Hallucination-and-the-key-to-remediation--e1730908712943.jpg 934w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/11-Hallucination-and-the-key-to-remediation--e1730908712943-247x191.jpg 247w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/11-Hallucination-and-the-key-to-remediation--e1730908712943-51x39.jpg 51w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/11-Hallucination-and-the-key-to-remediation--e1730908712943-768x593.jpg 768w\" sizes=\"auto, (max-width: 934px) 100vw, 934px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><i><span data-contrast=\"auto\">\u00a0Hallucination and the key to remediation<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">To deal with hallucinations, we recommend the following measures:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#1 &#8211; Train and educate <\/span><\/b><span data-contrast=\"auto\">users on how models work, their limitations and best practices. This enables users to use Large Language Models responsibly and to recognise misuse or potential security threats.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#2 &#8211; Toughen the configuration <\/span><\/b><span data-contrast=\"auto\">in two ways. Firstly, adjusting the parameters, including setting the model <\/span><i><span data-contrast=\"auto\">temperature <\/span><\/i><span data-contrast=\"auto\">(how creative the model is) and limiting the number of <\/span><i><span data-contrast=\"auto\">tokens <\/span><\/i><span data-contrast=\"auto\">(number of words per question\/answer). Secondly, the use of a more recent model (GPT-4 rather than GPT 3.5 for example).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#3 &#8211; <\/span><\/b><b><i><span data-contrast=\"auto\">Optional <\/span><\/i><\/b><b><span data-contrast=\"auto\">&#8211; Re-training the model <\/span><\/b><span data-contrast=\"auto\">gives it a context. This will have a positive impact on the reliability of responses. Using a wide range of training data can help to cover more scenarios and reduce bias, which helps AI to better understand and generate appropriate responses. Similarly, eliminating errors and inconsistencies in training data can reduce the likelihood of the AI learning and repeating these same errors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Risk #3: Data leakage<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24540 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/12-Data-leakage-and-the-key-to-remediation--e1730908754355.jpg\" alt=\"\" width=\"998\" height=\"721\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/12-Data-leakage-and-the-key-to-remediation--e1730908754355.jpg 998w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/12-Data-leakage-and-the-key-to-remediation--e1730908754355-264x191.jpg 264w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/12-Data-leakage-and-the-key-to-remediation--e1730908754355-54x39.jpg 54w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/12-Data-leakage-and-the-key-to-remediation--e1730908754355-768x555.jpg 768w\" sizes=\"auto, (max-width: 998px) 100vw, 998px\" \/>\u00a0<\/span><i style=\"color: initial;\"><span data-contrast=\"auto\">Data leakage and the key to remediation<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">To deal with leaks of sensitive data, we recommend the following measures:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#1 &#8211; Ensuring compliance with data protection<\/span><\/b><span data-contrast=\"auto\"> laws and protocols by involving<\/span><b><span data-contrast=\"auto\"> the Data Protection Officer <\/span><\/b><span data-contrast=\"auto\">(DPO) in projects accessing Large Language Model platforms is important to protect personal and sensitive data. By adhering to these standards, organizations not only protect individual privacy but also strengthen their defense against data breaches and misuse.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#2 &#8211; Manage rights and access <\/span><\/b><span data-contrast=\"auto\">to all components interacting with the model. Understanding which data can be accessed by the model is not trivial. Auditing and recertifying this data over time helps to limit potential discrepancies.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#3 &#8211; Reduce the verbosity of the model <\/span><\/b><span data-contrast=\"auto\">by limiting the number of output <\/span><i><span data-contrast=\"auto\">tokens<\/span><\/i><span data-contrast=\"auto\">. The less verbose a model is, the lower the probability that it will inadvertently share confidential data.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#4 &#8211; Anonymize the data<\/span><\/b><span data-contrast=\"auto\">, or make it generic, if the use case allows. For example, AI will be able to work on population trends without an explicit name being cited. As well as greatly reducing the risk of data leakage, this will reduce the standards to be complied with (e.g. RGPD).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#5 &#8211; Limit the amount of sensitive data used<\/span><\/b><span data-contrast=\"auto\">. Here we need to think about what data is necessary and sufficient for the model to work. The data can be processed beforehand to remove or modify sensitive data and thus reduce exposure (e.g. data anonymization).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\" aria-level=\"3\"><span data-contrast=\"none\">Cross-disciplinary mitigations<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:40,&quot;335559739&quot;:0}\">\u00a0<\/span><\/h3>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Certain measures apply to all the risks listed above. Two of them are fundamental.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#1 &#8211; Integrate security into projects <\/span><\/b><span data-contrast=\"auto\">via, for example, contextualized security analysis. This enables organizations to preventively identify and mitigate potential vulnerabilities, ensuring that only secure and verified projects access generative AI applications. <\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><b><span data-contrast=\"auto\">#2 &#8211; Document each application <\/span><\/b><span data-contrast=\"auto\">to establish an operational framework that not only facilitates easier supervision and management, but also reduces the risk of unauthorized or malicious use. <\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" aria-level=\"2\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The development of AI applications is accelerated by the platforms available. However, the sophistication it brings is not without risk.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Recognizing these challenges, the priority is to establish robust governance for the platform. This involves delineating roles and responsibilities, ensuring a structured approach to managing and mitigating risks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Governance extends beyond the platform itself. Securing the myriads of AI application use cases is just as important. It&#8217;s about ensuring that the application of this AI technology is both responsible and aligned with ethical standards, guarding against misuse and unintended consequences.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This calls for a model of shared responsibility, where all stakeholders &#8211; developers, users and governance bodies &#8211; work together to maintain the integrity and security of AI applications.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\" aria-level=\"1\"><span data-contrast=\"none\">References<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:0}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/synthedia.substack.com\/p\/microsoft-azure-ai-users-base-rose\"><span data-contrast=\"none\">https:\/\/synthedia.substack.com\/p\/microsoft-azure-ai-users-base-rose<\/span><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/www.usine-digitale.fr\/article\/amazon-fait-son-entree-sur-le-marche-de-l-ia-generative-avec-bedrock.N2121081\"><span data-contrast=\"none\">https:\/\/www.usine-digitale.fr\/article\/amazon-fait-son-entree-sur-le-marche-de-l-ia-generative-avec-bedrock.N2121081\u00a0<\/span><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><a href=\"https:\/\/www.theguardian.com\/technology\/2024\/jan\/20\/dpd-ai-chatbot-swears-calls-itself-useless-and-criticises-firm\"><span data-contrast=\"none\">https:\/\/www.theguardian.com\/technology\/2024\/jan\/20\/dpd-ai-chatbot-swears-calls-itself-useless-and-criticises-firm<\/span><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li><a href=\"https:\/\/openai.com\/blog\/march-20-chatgpt-outage\"><span data-contrast=\"none\">https:\/\/openai.com\/blog\/march-20-chatgpt-outage<\/span><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1.\" data-font=\"\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><a href=\"https:\/\/www.riskinsight-wavestone.com\/2023\/10\/quand-les-mots-deviennent-des-armes-prompt-injection-et-intelligence-artificielle\/\"><span data-contrast=\"none\">https:\/\/www.riskinsight-wavestone.com\/2023\/10\/quand-les-mots-deviennent-des-armes-prompt-injection-et-intelligence-artificielle\/<\/span><\/a><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has announced that in Q2 2024 &#8220;more than half of Fortune 500 companies will be using Azure OpenAI&#8221;. [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0 This type of platform can&#8230;<\/p>\n","protected":false},"author":1467,"featured_media":24467,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3977],"tags":[3279,4545],"coauthors":[4268,4082,4200],"class_list":["post-24514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-focus","tag-artificial-intelligence-en","tag-generative-ai"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Generative AI applications: risks and mitigations\u00a0 - RiskInsight<\/title>\n<meta name=\"description\" content=\"Microsoft has announced that in Q2 2024 &quot;more than half of Fortune 500 companies will be using Azure OpenAI&quot;. [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI applications: risks and mitigations\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Microsoft has announced that in Q2 2024 &quot;more than half of Fortune 500 companies will be using Azure OpenAI&quot;. [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-06T16:22:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T15:08:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Baptiste Cianchi, Pierre Aubret, R\u00e9mi Bossuet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Baptiste Cianchi, Pierre Aubret, R\u00e9mi Bossuet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\"},\"author\":{\"name\":\"Baptiste Cianchi\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8cd4cb4fea041c9088af86cf13882575\"},\"headline\":\"Generative AI applications: risks and mitigations\u00a0\",\"datePublished\":\"2024-11-06T16:22:04+00:00\",\"dateModified\":\"2024-11-07T15:08:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\"},\"wordCount\":1731,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp\",\"keywords\":[\"artificial intelligence\",\"generative AI\"],\"articleSection\":[\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\",\"name\":\"Generative AI applications: risks and mitigations\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp\",\"datePublished\":\"2024-11-06T16:22:04+00:00\",\"dateModified\":\"2024-11-07T15:08:49+00:00\",\"description\":\"Microsoft has announced that in Q2 2024 \\\"more than half of Fortune 500 companies will be using Azure OpenAI\\\". [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp\",\"width\":1280,\"height\":717},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generative AI applications: risks and mitigations\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8cd4cb4fea041c9088af86cf13882575\",\"name\":\"Baptiste Cianchi\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/baptiste-cianchi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Generative AI applications: risks and mitigations\u00a0 - RiskInsight","description":"Microsoft has announced that in Q2 2024 \"more than half of Fortune 500 companies will be using Azure OpenAI\". [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/","og_locale":"en_US","og_type":"article","og_title":"Generative AI applications: risks and mitigations\u00a0 - RiskInsight","og_description":"Microsoft has announced that in Q2 2024 \"more than half of Fortune 500 companies will be using Azure OpenAI\". [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/","og_site_name":"RiskInsight","article_published_time":"2024-11-06T16:22:04+00:00","article_modified_time":"2024-11-07T15:08:49+00:00","og_image":[{"width":1280,"height":717,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp","type":"image\/webp"}],"author":"Baptiste Cianchi, Pierre Aubret, R\u00e9mi Bossuet","twitter_misc":{"Written by":"Baptiste Cianchi, Pierre Aubret, R\u00e9mi Bossuet","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/"},"author":{"name":"Baptiste Cianchi","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8cd4cb4fea041c9088af86cf13882575"},"headline":"Generative AI applications: risks and mitigations\u00a0","datePublished":"2024-11-06T16:22:04+00:00","dateModified":"2024-11-07T15:08:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/"},"wordCount":1731,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp","keywords":["artificial intelligence","generative AI"],"articleSection":["Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/","name":"Generative AI applications: risks and mitigations\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp","datePublished":"2024-11-06T16:22:04+00:00","dateModified":"2024-11-07T15:08:49+00:00","description":"Microsoft has announced that in Q2 2024 \"more than half of Fortune 500 companies will be using Azure OpenAI\". [1] At the same time, AWS is offering Bedrock [2], a direct competitor to Azure OpenAI.\u00a0This type of platform can be used to create applications based on generative AI models such as LLMs (GTP-3.5, Mistral, etc.).\u00a0Nevertheless, the adoption of this technology is not without risk: from virtual assistants criticising their companies [3] to data leaks [4]; there is no shortage of examples.\u00a0To support the many deployments currently underway, you need to think quickly about your security, particularly when sensitive data is being used. In this article, we take a look at the risks and mitigations associated with using these platforms.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/11\/ai-generated-8540922_1280.webp","width":1280,"height":717},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/11\/generative-ai-applications-risks-and-mitigations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Generative AI applications: risks and mitigations\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8cd4cb4fea041c9088af86cf13882575","name":"Baptiste Cianchi","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/baptiste-cianchi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1467"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=24514"}],"version-history":[{"count":11,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24514\/revisions"}],"predecessor-version":[{"id":24570,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/24514\/revisions\/24570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/24467"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=24514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=24514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=24514"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=24514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}