Life Buzz News

Generative AI in Security: Risks and Mitigation Strategies

By Megan Crouse

Generative AI in Security: Risks and Mitigation Strategies

Microsoft's Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.

Generative AI became tech's fiercest buzzword seemingly overnight with the release of ChatGPT. Two years later, Microsoft is using OpenAI foundation models and fielding questions from customers about how AI changes the security landscape.

Siva Sundaramoorthy, senior cloud solutions security architect at Microsoft, often answers these questions. The security expert provided an overview of generative AI -- including its benefits and security risks -- to a crowd of cybersecurity professionals at ISC2 in Las Vegas on Oct. 14.

During his speech, Sundaramoorthy discussed concerns about GenAI's accuracy. He emphasized that the technology functions as a predictor, selecting what it deems the most likely answer -- though other answers might also be correct depending on the context.

Cybersecurity professionals should consider AI use cases from three angles: usage, application, and platform.

"You need to understand what use case you are trying to protect," Sundaramoorthy said.

He added: "A lot of developers and people in companies are going to be in this center bucket [application] where people are creating applications in it. Each company has a bot or a pre-trained AI in their environment."

SEE: AMD revealed its competitor to NVIDIA's heavy-duty AI chips last week as the hardware war continues.

Once the usage, application, and platform are identified, AI can be secured similarly to other systems -- though not entirely. Certain risks are more likely to emerge with generative AI than with traditional systems. Sundaramoorthy named seven adoption risks, including:

AI presents a unique threat map, corresponding to the three angles mentioned above:

Attackers can use strategies such as prompt converters -- using obfuscation, semantic tricks, or explicitly malicious instructions to get around content filters -- or jailbreaking techniques. They could potentially exploit AI systems and poison training data, perform prompt injection, take advantage of insecure plugin design, launch denial-of-service attacks, or force AI models to leak data.

"What happens if the AI is connected to another system, to an API that can execute some type of code in some other systems?" Sundaramoorthy said. "Can you trick the AI to make a backdoor for you?"

Sundaramoorthy uses Microsoft's Copilot often and finds it valuable for his work. However, "The value proposition is too high for hackers not to target it," he said.

Other pain points security teams should be aware of around AI include:

Additionally, Sundaramoorthy explained that generative AI can fail in both malicious and benign ways. A malicious failure might involve an attacker bypassing the AI's safeguards by posing as a security researcher to extract sensitive information, like passwords. A benign failure could occur when biased content unintentionally enters the AI's output due to poorly filtered training data.

Despite the uncertainty surrounding AI, there are some tried-and-trusted ways to secure AI solutions in a reasonably thorough manner. Standard organizations such as NIST and OWASP provide risk management frameworks for working with generative AI. MITRE publishes the ATLAS Matrix, a library of known tactics and techniques attackers use against AI.

Furthermore, Microsoft offers governance and evaluation tools that security teams can use to assess AI solutions. Google offers its own version, the Secure AI Framework.

Organizations should ensure user data does not enter training model data through adequate data sanitation and scrubbing. They should apply the principle of least privilege when fine-tuning a model. Strict access control methods should be used when connecting the model to external data sources.

Ultimately, Sundaramoorthy said, "The best practices in cyber are best practices in AI."

What about not using AI at all? Author and AI researcher Janelle Shane, who spoke at the ISC2 Security Congress opening keynote, noted one option for security teams is not to use AI due to the risks it introduces.

Sundaramoorthy took a different tack. If AI can access documents in an organization that should be insulated from any outside applications, he said, "That is not an AI problem. That is an access control problem."

Previous articleNext article

POPULAR CATEGORY

corporate

8473

tech

9566

entertainment

10288

research

4647

misc

10963

wellness

8011

athletics

10827