




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
WorldDigitalTechnologyAcademy(WDTA)
LargeLanguageModelSecurityRequirementsforSupplyChain
WorldDigitalTechnologyAcademyStandard
WDTAAI-STR-03
Edition:2024-09
2
?WDTA2024-Allrightsreserved.
TheWorldDigitalTechnologyStandardWDTAAI-STR-03isdesignatedasaWDTAnorm.ThisdocumentisthepropertyoftheWorldDigitalTechnologyAcademy(WDTA)andisprotectedbyinternationalcopyrightlaws.Anyuseofthisdocument,includingreproduction,modification,distribution,orre-publication,withoutthepriorwrittenpermissionofWDTA,isprohibited.WDTAisnotliableforanyerrorsoromissionsinthisdocument.
DiscovermoreWDTAstandardsandrelatedpublicationsa
t
/.
VersionHistory*
StandardIDVersionDateChanges
WDTAAI-STR-031.02024-09InitialRelease
3
Foreword
Asthedigitalageadvances,theintegrationofartificialintelligence,particularlylargelanguagemodels(LLMs),hasbecomeacornerstoneofmoderntechnologicalecosystems.Thesemodelsarenowpivotalinshapingindustries,drivinginnovation,andtransformingthewayweinteractwithtechnology.However,withthisrapidintegrationcomesanarrayofsecuritychallengesthatmustbeaddressedtoensurethesepowerfultools'safeandresponsibledeployment.
TheWorldDigitalTechnologyAcademy(WDTA)haslongbeenattheforefrontofsettingglobalstandardsfordigitaltechnologyandinnovation.Ourcommitmenttofosteringasecureandinclusivedigitalworldisreflectedintherigorousdevelopmentofstandardsthatguidethedeploymentandmanagementofcutting-edgetechnologies.TheAISTR(Security,Trust,Responsibility)series,towhichthisdocumentbelongs,isacollectionofstandardsdesignedtoensurethatAItechnologiesareinnovative,secure,trustworthy,andethicallymanaged.ThesestandardsprovidecomprehensiveframeworksforaddressingthecomplexchallengesassociatedwithAIdeployment,focusingoncriticalaspectslikesafety,integrity,andresponsibleuse.
AstheWDTAAI-STR-03standard,the"LargeLanguageModelSecurityRequirementsforSupplyChain"outlinescomprehensivemeasuresformanagingsecurityrisksacrossthesupplychainoflargelanguagemodels.Thisstandardcoverstheentirelifecycleofthesemodels,fromdevelopmentthroughdeployment,ensuringthateachphaseisrigorouslyscrutinizedforpotentialvulnerabilities.Byadheringtotheseguidelines,organizationscaneffectivelyprotecttheirAI-drivenoperationsfromemergingthreatsandcontributetoamoresecuredigitalecosystem.
Weextendourgratitudetotheexpertsandcontributorswhohaveworkeddiligentlytodevelopthisstandard.TheirexpertiseandcommitmenttoexcellenceensurethatWDTAcontinuestobealeaderinsettingthebenchmarkfordigitalsecurity.WeencourageallstakeholdersintheAIsupplychaintoadopttheseguidelines,helpingtobuildafuturewheretechnologicaladvancementgoeshandinhandwithsecurityandethicalresponsibility.
ExecutiveChairmanofWDTA
4
Acknowledgments
Co-ChairofWDTAAISTRWorkingGroup
KenHuang(CSAGCR)
JosiahBurke(Anthorphic)
LeadAuthors
JiashuiWang(AntGroup)
WeiqiangWang(AntGroup)LongLiu(AntGroup)
YuhaoJiang(AntGroup)KenHuang(CSAGCR)
AnyuWang(CSAGCR)
ZhengSong(AntGroup)
JiaweiTang(AntGroup)
YinWang(AntGroup)
ZhihuiJiang(AntGroup)LiangZheng(AntGroup)CongZhu(AntGroup)QingLuo(AntGroup)
ShiwenCui(AntGroup)
MiaoChen(ZhongguancunLaboratory)TianyuCui(ZhongguancunLaboratory)
Reviewers
LarsRuddigkeit(Microsoft)AshutoshChadha(Microsoft)AntonChuvakin(Google)
ApostolVassilev(NIST)
DongchenMa(TencentCloud)
5
ChenfuBao(Baidu)
FengLuo(ShenzhenNationalFinancialTechnologyTestingCenter)HaoshuoWang(ChinaMobileCloudCentre)
MelanXU(WorldDigitalTechnologyAcademy)TalShapira(RecoAI)
Dr.CariMiller(CenterforInclusiveChange)GovindarajPalanisamy(GlobalPaymentsInc.)Krystal(A)Jackson(FrontierModelForum)
SwapnilModak(Meta)
HeatherFrase(verAItech)
VishwasManral(PrecizeInc)PatriciaThaine(PrivateAI)
LimingZhang(Comcast)
VaibhavMalik(Cloudflare)
AshaHemrajani(NanyangTechnologicalUniversity)RonF.DelRosario(SAPISBN)
MadhaviNajana(FederalHomeLoanBankofCincinnati)GauravPuri(META)
BhuvaneswariSelvadurai(NorthwesternMutual)DanStocker(Coalfire)
MatteoMeucci(IMQMINDEDSECURITY)QiangZhang(Coalfire)
Joshuaanaguiar(Cohere)DaemonBehr(Nutanix)
6
TableofContents
1Scope 8
2NormativeReferences 8
3TermsandDefinitions 10
3.1ArtificialIntelligence 10
3.2LargeLanguageModel 10
3.3Supplier 10
3.4Softwaresupplychain 10
3.5Opensourcecommunity 11
3.6Third-partycomponent 11
3.7MachineLearningPlatform 11
3.8LargeLanguageModelInferenceFramework 11
3.9LargeLanguageModelApplicationFramework 11
3.10DistributedComputingFramework 11
3.11MachineLearningBillofMaterials 11
4OverviewofSupplyChainSecurityProtectionforLLMs 12
4.1SupplyChainSecurityforLLMs 12
4.2ObjectivesofSupplyChainSecurityManagementforLLMs 12
5SupplyChainSecurityManagementforLLMs 14
5.1RegulationManagement 14
5.2OrganizationandPersonnelManagement 14
5.3SupplierManagement 15
6SupplyChainSecurityRequirementsforLLMs 15
6.1NetworkLayer 15
6.2SystemLayerSecurityRequirements 16
6.2.1OperatingSystemSecurityRequirements 16
6.2.2SystemSoftwareSecurityRequirements 16
6.2.3RuntimeEnvironmentSecurityRequirements 17
6.3PlatformandApplicationLayerSecurityRequirements 17
6.3.1GeneralSecurityRequirementsforComponents 17
6.3.2MachineLearningPlatformandModelInferenceFrameworkSecurity
Requirements 18
6.3.3ModelApplicationFrameworkSecurityRequirements 18
7
6.3.4SecurityRequirementsforDistributedComputingFrameworks 19
6.4ModelLayerSecurityRequirements 19
6.4.1ModelAcquisitionSecurityRequirements 19
6.4.2ModelDeploymentandManagementSecurityRequirements 20
6.4.3ModelComplianceSecurityRequirements 20
6.5DataLayerSecurityRequirements 21
6.5.1DataSecurityRequirements 21
6.5.2DataComplianceSecurityRequirements 21
6.5.3DataMonitoringandManagement 22
7Summary 23
8
1Scope
Thisdocumentpresentstheframeworkofsupplychainsecurityprotectionforlargelanguagemodels(LLMs),proposesrequirementsformanagingsupplychainsecurityrisksandsupplyactivitiesinvolvedinthedevelopment,operation,andmaintenance(O&M)ofLLMs,andprovidesrelevantinformationsuchascommonsupplychainsecurityrisksandtypicalsecuritycases.
Thisdocumentcanguidesuppliersandconsumersinthesupplychainincarryingoutsecurityriskassessmentandmanagingsupplyactivities.Itcanalsoserveasafoundationforthird-partyorganizationsconductingsupplychainsecuritytestsandassessmentsforregulatoryauthorities.
2NormativeReferences
Thefollowingdocumentsconstituteessentialprovisionsofthisdocumentthroughnormativereferencesinthetext.Fordatedreferencedocuments,onlytheversioncorrespondingtothedateappliestothisdocument;forundatedreferencedocuments,thelatestversion(includingallamendments)appliestothisdocument.
ISO28001
Securitymanagementsystemsforthesupplychain-Bestpracticesforimplementingsupplychainsecurity,assessmentsandplans-Requirementsandguidance
ISO/IEC27036-2
Informationtechnology-Securitytechniques-Informationsecurityforsupplierrelationships-Part2:Requirement
ISO/IEC27036-3
Informationtechnology-Securitytechniques-Informationsecurityforsupplierrelationships-Part3:Guidelinesforinformationandcommunicationtechnologysupplychainsecurity
9
NIST800-161
SupplyChainRiskManagementPracticesforFederal
InformationSystemsandOrganizations
NISTAIRMF1.0
ArtificialIntelligenceRiskManagementFramework
ISO42001/IEC
ISO/IEC42001isaninternationalstandardthatspecifiesrequirementsforestablishing,implementing,maintaining,andcontinuallyimprovinganArtificialIntelligenceManagementSystem(AIMS)withinorganizations.ItisdesignedforentitiesprovidingorutilizingAI-basedproductsorservices,ensuringresponsibledevelopmentanduseofAIsystems.
ISO/IEC5338
Informationtechnology—Artificialintelligence—AIsystemlifecycleprocesses.
ItisaninternationalstandardthatdefinesasetofprocessesandassociatedconceptsfordescribingthelifecycleofAIsystems.ThisstandardisparticularlyfocusedonAIsystemsbasedonmachinelearningandheuristicmethods.
ItbuildsonexistingstandardslikeISO/IEC/IEEE15288andISO/IEC/IEEE12207,incorporatingAI-specificprocessesfromISO/IEC22989andISO/IEC230531.Thegoalistoprovideacomprehensiveframeworkforthedefinition,control,management,execution,andimprovementofAIsystemsthroughouttheirlifecycle.
GB/T36637-2018
Informationsecuritytechnology-Guidelinesfortheinformationandcommunicationtechnologysupplychainriskmanagement
GB/T43698-2024
Cybersecuritytechnology-Securityrequirementsforsoftwaresupplychain
10
GB/T24420-2009
Supplychainriskmanagementguideline
GB/T32921-2016
Informationsecuritytechnology-Securitycriteriononsupplierconductofinformationtechnologyproducts
3TermsandDefinitions
Thefollowingtermsanddefinitionsapplytothisdocument.
3.1ArtificialIntelligence
Artificialintelligence(AI)isamultifacetedfieldwithincomputersciencefocusedoncreatingsystemsthatcanperformtaskstypicallyrequiringhumanintelligence.AnAIsystemisamachine-basedsystemthat,forexplicitorimplicitobjectives,infers,fromtheinputitreceives,howtogenerateoutputssuchaspredictions,content,recommendations,ordecisionsthatcaninfluencephysicalorvirtualenvironments.DifferentAIsystemsvaryintheirlevelsofautonomyandadaptivenessafterdeployment.
3.2LargeLanguageModel
Large-scale,pre-trainedandfine-tunedAImodelsthatcanunderstandinstructionsandgenerateoutputsacrossmultiplemodalities,includingbutnotlimitedtohumanlanguages,programcodes,images,andaudio,basedonlargeamountsofdata.
3.3Supplier
Anorganizationorindividualdevelops,produces,augments,adapts,finetunes,provides,and/ordeployssoftwareproductsorservices.
3.4Softwaresupplychain
Anetworkchainsystemthatdeliverssoftwareproductsorservicesfromsupplierstoconsumersthroughresourcesandprocessesbasedontherelationship.
11
3.5Opensourcecommunity
Anorganizationandoperationmodefordevelopingandmaintainingopen-sourcecode.
3.6Third-partycomponent
Independentorcallablesoftwarecomponentsdevelopedbysoftwaredevelopmentorganizationsorpersonnelotherthansuppliersandconsumersusuallyconsistofbinaryorsourcecodeprogramfiles.
3.7MachineLearningPlatform
Anintegratedenvironmentthatprovidessupportandtoolsfordeveloping,training,anddeployingmachinelearningmodels.
3.8LargeLanguageModelInferenceFramework
Anintegratedenvironmentdedicatedtodeploymentandtheperformanceofmodelinference.
3.9LargeLanguageModelApplicationFramework
ApplicationdevelopmentframeworkbasedonLLMs.
3.10DistributedComputingFramework
Aframeworkforprocessinglargeamountsofdatainparallelonmultiplecomputers.
3.11MachineLearningBillofMaterials
Alistofstandardizedmodelcards,models,datasets,datacards,systemcards,andothermaterialsinvolvedinbuildinganLLMmodel.
12
4OverviewofSupplyChainSecurityProtectionforLLMs
Themainobjectiveofthisdocumentistoidentify,evaluate,andmanagethesupplychainsecurityrisksintheLLMsystemlifecycle.LLMsmaybeusedinservices,operatedinwholeorinpartbythirdparties,orasproducts,receivedfromthirdparties,butnotoperatedbythem.
4.1SupplyChainSecurityforLLMs
Thesupplychainusuallycoverstheprocurement,development,integration,andotherphasesofsoftwareandhardwareproducts.Itinvolvesproducers,suppliers,systemintegrators,serviceproviders,otherentities,andsoftenvironmentssuchastechnology,law,andstrategy.Unliketraditionalsupplychains,theLLMsupplychaincoverstheentirelifecycleoftheLLM,includingmodelandtrainingdataacquisition,trainingdatapreparation,modeltraining,fine-tuning,deployment,operationsandmaintenance(O&M),andotherstages.
SupplychainsecuritymanagementforLLMsinvolvestwotypesofsecurityrequirements.Oneisgeneralsecurityrequirementsthroughoutthelifecycle,calledSupplyChainSecurityManagementforLLMs,suchasrequirementsforprocedures,organizations,personnel,andinformationsystemsrelatedtosupplychainsecuritymanagement.TheotherissecurityrequirementsrelatedtothesystemstructureofLLMs,calledsupplychainsecurityrequirementsforLLMs,whichincluderequirementsforthenetworklayer,systemlayer,platformandapplicationlayer,modellayer,anddatalayer.
4.2ObjectivesofSupplyChainSecurityManagementforLLMs
a)Integrity:Ensurethattheproductanditssystems,components,frameworks,models,data,andusedtoolsareprotectedagainstimplantation,tampering,orunauthorizedreplacementthroughouttheentirelifecycleofLLMproducts.Thisinvolvestheimplementationofrigorouscontrolsandcontinuousmonitoringateverystageofthesupplychain.Including,addressingcommonvulnerabilitiesinmiddlewaresecuritytopreventunauthorizedaccess,safeguardingagainsttheriskofpoisoningtrainingdatausedbyengineers,andenforcingazero-trustarchitecturetomitigateinternalthreats.Bymaintainingtheintegrityofeverystage,fromdata
13
acquisitiontosupplierdeployment,consumersusingLLMscanensurethattheLLMproductsremainsecureandtrustworthy.
b)Availability:Ensurethesupplychain'savailabilityforconsumers.Suppliersmustsupplymaterialsbyagreementsconcludedandsignedwithconsumerswithoutinterruptionbyhumanornaturalfactors.Additionally,theyshouldensurethatthesupplycanbepredictablyrecoveredtoanacceptablestateundercertainconditionsifitweretopartiallyfail.
c)Confidentiality:Ensurethatinformationtransmittedalongthesupplychainisnotdisclosedtounauthorizedpersons,includinginformationabouttheconsumersthemselves.
d)Controllability:Guaranteeconsumers'meaningfulcontroloverthesupplychain.Ensureconsumershaveanunderstandingofinformationinallphasesofthesupplychain,transparencyandcredibilityofsuppliers/serviceprovidersatalllevels,managementofdataflow,andtraceabilityofthesupplychain.
e)Reliability:Ensurethesecurity,highavailability,andDisastertoleranceofLLMproductsandrelevantsystems,components,frameworks,models,anddata.
f)Visibility:Ensuresupplychainsteps,changes,updates,anddeletionswitheverystepofthechangearetrackable,haveclearownership,andcanbetracedbackasneeded.Forexample,ifamodelisupdatedwithnewtrainingdata,thetrainingdataandthemodelbeforeandafterthetrainingshouldbedocumentedandtraceable.
14
5SupplyChainSecurityManagementforLLMs
5.1RegulationManagement
a)Formulatesupplychainsecuritymanagementpoliciesandprocedures,includingbutnotlimitedtoriskmanagementregulations,processes,andmechanismsforsoftwaresupplyphasessuchasprocurement,delivery,andO&M.
b)Formulateregulationsforcontinuousriskmonitoring,riskassessment,andincidentresponseforthesoftwaresupplychain.Theseregulationscancontainemergencyresponseprocedures,operationhaltingprocedures,systemrecoveryprocedures,timelynoticestobackwardandforwardsupplychainmembers,andothercontent.
c)Conductsupplychainriskassessmentsregularly,formulateplans,andtakemeasurestoeliminateorreducerisks.TheseassessmentsshouldcoverallstagesoftheLLMsupplychain,identifyingpotentialvulnerabilitieslikethird-partyrisksordataintegrityissues.Usetheresultstodeveloptargetedmitigationstrategiesandupdatesecuritypolicies,ensuringcontinuousprotectionagainstemergingthreats.
d)EstablishgovernanceframeworksforLLMdevelopmentthatenforcecompliancewithsecuritystandardsandindustrybestpracticesthroughoutthesupplychain.
5.2OrganizationandPersonnelManagement
a)Proposesecurityrequirementsforsupplychainsecuritymanagementpersonnel,includingbutnotlimitedtoadministrators,architecturalengineers,AIengineers,DataScientists,ordinaryemployees,andthird-partypersonnel.
b)Formulatesecuritytrainingplansandcarryoutregularsupplychainsecuritytraining.Thetrainingshouldinclude,withoutbeinglimitedto,softwareassetidentificationandanalysis,integrityguarantee,guardrails,andsoftwarevulnerabilityandbackdooranalysis.
c)Conductsecurityawarenessandskilltrainingforallinternalemployeeswithadditionalspecializedtrainingforthoseinvolvedinsupplychainandsecuritymanagementsuchas
15
procurement,informationsystemdevelopmentandmanagement,andproductO&Mbasedoncorrespondingsecurityrequirements.
5.3SupplierManagement
a)Developsupplierselectionstrategiesandregulationsandconductsecurityassessmentsofsuppliersforself-developedsoftware,customizedsoftware,off-the-shelfsoftware,anddifferentaspectsofothersoftwareaswell,includingbutnotlimitedtothebackground,capability,qualification,andcontinuousandsecureprovisionofproductsorservices.MaintainaninventoryofallAIsolutionsandassets,includingbutnotlimitedtoAIsourcesuppliers,supplychainmembers,modeltypes,internalowners,lastsecurityreviews,etc.
b)Suppliersmustensureandattesttotheauthenticity,accuracy,andintegrityoftheinformationtransmittedalongthesoftwaresupplychainandtakemeasurestoavoidtamperingandleakage.
c)Requiresupplierstocooperateinsecuritymonitoringandinspectionofthesoftwaresupplychain,includingthroughperiodicoron-demandindependentaudits.
6SupplyChainSecurityRequirementsforLLMs
6.1NetworkLayer
a)Segmentnetworkstoisolatecriticaldataandsystemsfromexternalandinternalnetworks:Implementnetworksegmentationtoreduceattacksurfaces,ensuringthatsensitiveinformationisinaccessiblefromunauthorizednetworkzones/unauthorizedresources,aligningwiththeZeroTrustprincipleofleastprivilege.
b)Enforcesecureencryptionforallnetworkcommunications:Applyrobustencryptionprotocolsfordataintransittomaintainconfidentialityandintegrity,ensuringnocommunicationistrustedbydefault,evenwithininternalnetworks.
c)Implementstrictaccesscontrolswithcontinuousmonitoring:Deploysecurityaccesscontrolsthatenforcetheleastprivilegeforaccessingcriticalinformationandservices,with
16
continuousloggingandmonitoringofaccesseventstodetectandrespondtopotentialthreatsinrealtime.
d)Continuouslymonitorandanalyzenetworktrafficforanomalies:Utilizeadvancedmonitoringsolutionstoscrutinizenetworkactivitiescontinuously,swiftlyidentifyingandmitigatingabnormalbehaviorspertheMITREATT&CKandAtlasframework.
e)Regularlyauditandmaintainnetworksecurityconfigurations:Conductcontinuoussecurityauditsandproactivemaintenanceonnetworkdevicessuchasrouters,switches,andfirewalls,ensuringthatpatchesandupdatesarepromptlyappliedtomitigatevulnerabilities,inlinewithZeroTrust'semphasisonongoingsecuritypostureassessment.
6.2SystemLayerSecurityRequirements
ThesystemlayermainlytargetsthesupplychainsecurityrequirementsfortheunderlyingLLMoperatingsystem,systemsoftware,andruntimeenvironment.
6.2.1OperatingSystemSecurityRequirements
a)Updatetheoperatingsystemregularlyandinstallsecuritypatchespromptlytopreventsystemsecurityvulnerabilityattacks.
b)Establishasystemupdatemechanismandverificationprocesstoensurethatsecuritypatchesareinstalledpromptlyandaccurately.
c)Implementaccesscontrolmeasurestomanagetheaccessofusersandprogramstooperatingsystemfunctions,includingbutnotlimitedtouserauthentication,authorization,andauditing.
d)Establishoperatingsystemsecuritymonitoringandprotectioncapabilitiestomonitorandpreventsuspiciousactivitiesorsecurityincidentsontime.
6.2.2SystemSoftwareSecurityRequirements
a)Installsystemsoftwarefromtrustedsourcesandverifyitsintegrityandauthenticity.
b)Updatesystemsoftwareregularlyandinstallsecuritypatchesintimetopreventsecurityvulnerabilityattacks.
17
c)Digitalsignaturetechnologyshouldbeusedtoverifysoftwaresecurity.
d)Configuresystemsoftwareaccordingtosecuritybestpracticestoavoidsecurityrisksfromdefaultconfigurations.
e)Regularauditsandcompliancechecksofdevicesecurityconfigurationareconducted.
6.2.3RuntimeEnvironmentSecurityRequirements
a)Usevirtualizationorcontainertechnologytocreateasecure,independent,andisolatedoperatingenvironmentforeachapplicationtoreducepossiblesecurityrisksandimpact.
b)Deploycomprehensivemonitoringandanomalydetectionsystems,includingbutnotlimitedtoresourceusage,performancemetrics,andsecurityevents.
c)Recordallcriticalruntimeactivitylogsandconductregularauditstopreventunauthorizedaccessandtampering.
d)Audittheruntimeenvironmentregularlytoidentifyandfixsecurityconfigurationerrorspromptly.
e)Theprocessingandstorageofsensitivedatashallbeconductedinatrustedcomputingenvironment.
6.3PlatformandApplicationLayerSecurityRequirements
Theplatformandapplicationlayerincludesmachinelearningframeworksandotherthird-partycomponentsandisthecriticalsupportenvironmentforoperatinglargelanguagemodels.
6.3.1GeneralSecurityRequirementsforComponents
a)Managethird-partycomponentsstrictlyintermsoftheirsourceandversiontoensuretimelyupdatesandpropersecurity.
b)Conductregularsecuritychecksonthird-partycomponentsandupgradethempromptlytothelatestsecureversions.
18
c)Ensureimportedthird-partycomponentsundergosecurityreviews,includingcodeauditsanddependencyanalysis,topreventtheintroductionofcomponentswithsecurityrisks.
d)Performfileparsinginasandboxorsimilarlyisolatedenvironmenttopreventsecurityrisksfrompotentialmemorycorruptionvulnerabilitiesintextparsingcomponents.
e)Necessarylicensesandauthorizationsshouldbeobtainedbeforeusingthird-partycomponents.Ensurethatthecomponentsareusedlegallyandincompliancewithallrelevant
copyrightandusageagreements.
f)Establishandmaintainasoftwarebillofmaterialsregularly.
6.3.2MachineLearningPlatformandModelInferenceFrameworkSecurityRequirements
Modelinferenceframeworksneedtobeusedduringmodeldeploymentandruntime.Atthisstage,themodelshallbeconsideredasanexecutableprogramandattentionshallbepaidtocodeexecutionrisksduringmodelinference.
a)Conductsecurityanalysisandchecksonthemodelfilesbeforerunningthemodel.
b)Continuouslyvalidatemodelintegrityofaninferencingmodel.Anyauto-updatestomodelartifactsneedtobetracked.Implementatleastthetwo-personintegrityruletoanymodelartifactupdatestopreventunauthorizedactions.
c)Whenusingthird-partymodels,carefullyenableparametersthattrustremotecode,suchas'trust_remote_code'intransformerslibrary,toreducetheriskofmaliciouscodeexecution.
d)Usetrustedmodelfilestoavoidsecurityrisksarisingfromtheexecutionofmaliciouscode.
6.3.3ModelApplicationFrameworkSecurityRequirements
a)KeysforinvokingLLMinterfacesshallnotbestoredincode.
b)UseguardrailsandotherdetectivecontrolsinLLMapplicationstoimprovesteerabilityandreduceriskssuchaspromptinjection.
19
c)Whenusingcodeinterpretersorothercodeexecutiontools,employsecureisolationtechniquessuchascontainersorsandboxes.
d)Filepathchecksshouldbeperformedtopreventpathtraversalvulnerabilitieswhenusingfileprocessingtools.
e)Accesscontrolmeasuresshouldbetakentopreventunauthorizedoperationswhenusingdatabaseprocessingtools.
6.3.4SecurityRequirementsforDistributedComputingFrameworks
Theprimaryriskfordistributedcomputingframeworkscomesfromtheneedforpermissionchecksbetweenrootnodesandchildnodesinmanydistributedframeworks,allowingdevicesonthesamenetworktoconnectdirectlytonodesandsendcommands.
a)Establishnetworkisolationtopreventpotentialexternalattackersfromaccessingdistributedcomputingnodes.Usesfirewallsandintrusiondetectionsystemstomonitorandcontroltrafficfromchildnodes.Decryptdatareceivedfromtherootnodeandencryptanydatasentbacktotherootnode.
b)Employanauthorityverificationmechanismbetweentherootandchildnodestopreventmaliciousnodeconnectionsorcommandexecution.Userole-basedaccesscontroltoensurethatonlyauthorizedchildnodescancommunicatewiththerootnode.
c.)RootNodesensurethattheentiredistributedframeworkadherestocybersecuritystandardssuchasNIST,CIS,ISO,andothers.Childnodescomplywiththerootnode’ssecuritypoliciesandstandards.
6.4ModelLayerSecurityRequirements
6.4.1ModelAcquisitionSecurityRequirements
a)Obtainmodelfilesfromtrustedthirdpartiesandauthorizedmodelrepositories.
b)Conductintegritychecksonmodelfilesobtainedfromthirdpartiestoensuretheyhavenotbeentamperedwithduringstorageandtransmission.
20
c)Performsecuritychecks,includingpicklescanning,onmodelfilesobtainedfromthirdparties,topreventtheexecutionofmaliciouscodeorothersecurityrisks.
6.4.2ModelDeploymentandManagementSecurityRequirements
a)Deploytoolsto
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年湖南省懷化市單招職業(yè)適應(yīng)性測試題庫學(xué)生專用
- 八年級上冊語文部編版課時(shí)練《20蟬》03含答案
- 2024四川省酒業(yè)集團(tuán)有限責(zé)任公司下屬子公司招聘34人筆試參考題庫附帶答案詳解
- 《故鄉(xiāng)》教學(xué)設(shè)計(jì)-2024-2025學(xué)年九年級語文上冊同步特色備課資源(統(tǒng)編版)
- 《 離子反應(yīng)》教學(xué)設(shè)計(jì) 2023-2024學(xué)年高一上學(xué)期化學(xué)人教版(2019)必修第一冊
- 《第四單元 建立網(wǎng)站 第14課 完善與發(fā)布網(wǎng)站 二、自我評價(jià)網(wǎng)站》教學(xué)設(shè)計(jì)教學(xué)反思-2023-2024學(xué)年初中信息技術(shù)人教版七年級上冊
- 5《圖片的加工》教學(xué)設(shè)計(jì)、教材分析與教學(xué)反思2024年滇人版初中信息技術(shù)七年級下冊
- 《故都的秋》《荷塘月色》《我與地壇(節(jié)選)》聯(lián)讀教學(xué)設(shè)計(jì) 2024-2025學(xué)年統(tǒng)編版高中語文必修上冊
- 2025年湖南工商職業(yè)學(xué)院單招職業(yè)適應(yīng)性測試題庫及參考答案
- 2025年湖北省十堰市單招職業(yè)傾向性測試題庫附答案
- 藥品經(jīng)營質(zhì)量管理規(guī)范
- 爆破工程師培訓(xùn)
- 2024年云南省公務(wù)員考試《行測》真題及答案解析
- 教科版初中物理八年級下冊知識梳理
- 《飛科電器公司盈利能力存在的問題及完善對策(7800字論文)》
- 零星維修工程項(xiàng)目施工方案1
- 楚辭離騷的原文全文完整注音版、拼音版標(biāo)準(zhǔn)翻譯譯文及注釋
- 湖北省荊州市2024年七年級上學(xué)期期中數(shù)學(xué)試題【附答案】
- 刑事訴訟法課件
- 預(yù)防校園欺凌主題班會課件(共36張課件)
- 肩袖損傷病例討論
評論
0/150
提交評論