AI Security Considerations
MLOps AI Security
Security ML Code
Analysis Tools
Machine Resource Management
MLOps Data
Security Data Collection
Security Data Verification
AI Infrastructure
Serving Infrastructure
Monitoring
Third Party Products
Certifications
MLOps Cycle
External Security Framework
Unmanaged Clients: Zero trust endpoints
API Providers: Secure connection configuration
Applications API Consumption: Secure Configuration, Device Availability & Recovery
Managed Clients (Company Devices & BYOD)
EDP-based filtering protection
Threat protection
Patch Management
DLP data in use
MDM/MAM Security
Secure Config & Endpoint Lockdown
Email and navigation control protection
Certified Device
Physical Devices / Controllers (IoT)
Secure Configuration
Secure Platform
Device Identification
Data Protection
Software Update
Device Availability & Recovery
Infrastructure Security Framework
Boundary Security
Boundary vertical filtering
Boundary IDS/IPS
Isolation Zone
L4/L7 Gateway
DLP in-motion
DOS/DDoS
Advance Malware Detection
BOT Defense
Boundary Application Filtering
Email protection
Endpoint Security as a Service
Boundary Protection Availability & Recovery
Network Security
Internal Horizontal Filtering
Internal Network IDS/IPS
Network Access Control
Wireless Protection
Navigation Control Filtering
VPN Concentrators
DNS(sec)
Network Segmentation / Flow Control
Internal L4/L7 Gateway
Network Availability & Recovery
Server Security
Anti-Malware
Sensitive File Protection
Host Based filtering Protection
HIPS/HIDS & Anomaly Detection
OS Hardening
Server Availability & Recovery
Container Security
Trusted base images
Keep images up to date
Reduce the attack surface
Limit container privileges
Access Controls
Images Vulnerability Scan
Network Security for Containers
Monitor Container Activity
Container Isolation
Container Configuration Management
Security Container images in a CI/CD pipeline
Data Availability & Recovery
Data & Cryptography Security
DATA at Rest Encryption
DATA in transit Encryption
Data Obfuscation Masking
Encryption Key
PKI Certification Authority
Digital Signature
Data Discovery Classification
Credential Access
DATA Process Destroy
Data Loss Prevention
Secure Disposal of Data
Data Protection
Secure Data Backup & Recovery
Database Secure Gateway
Data Residential
Data Availability & Recovery
Application Security
Secure Development Lifecycle
Application Testing (SAST, DAST, RAST)
API/SOA, Libraries and Components Development security infrastructure
Code Obfuscation
Configuration/Parametrization Management
Application Availability & Recovery
Management of Security Framework
Identity and Access Management
Isolate Plane Management
Tier management protection
Authorization Management
IAM Auditing, analysis, reporting
Identity Management
Authentication Management
Privileged Access Management
Multi factor access
Credential Management
Policy Management
PKI Management
IAM & Access Services Availability & Recovery
Monitoring Management
Secure Configuration & Lockdown
Escalation Management
Monitoring and assessment
Event Correlation
SOC
Log Audit
Penetration Security
Vulnerability Mgmt
Technical audits
Security patch Mgmt
Availability & Recovery Testing