Skip to content

Commit 26aa3e7

Browse files
typo
1 parent 3be8af6 commit 26aa3e7

File tree

1 file changed

+19
-22
lines changed

1 file changed

+19
-22
lines changed

content/ai_exchange/content/docs/ai_security_overview.md

Lines changed: 19 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -9,35 +9,32 @@ weight: 1
99
>Category: discussion
1010
>Permalink: https://owaspai.org/goto/toc/
1111
12-
* [AI Security Overview](docs/ai_security_overview/)
13-
        - [About the AI Exchange](https://owaspai.org/goto/about/)
14-
        - [Organize AI](https://owaspai.org/goto/organize/)
15-
        - [How to use this document](https://owaspai.org/goto/document/)
16-
        - [Essentials](https://owaspai.org/goto/essentials/)
17-
        - [Threats](https://owaspai.org/goto/threatsoverview/)
18-
                [Highlight: Threat matrix](https://owaspai.org/goto/aisecuritymatrix/)
19-
                [Highlight: Agentic AI perspective](https://owaspai.org/goto/agenticaithreats/)
20-
        - [Controls](https://owaspai.org/goto/controlsoverview/)
21-
                [Highlight: Periodic table of threats and controls](https://owaspai.org/goto/periodictable/)
22-
        - [Risk analysis](https://owaspai.org/goto/riskanalysis/)
23-
        - [How about ...](https://owaspai.org/docs/ai_security_overview/#how-about-)
24-
25-
* [Deep dive into threats and controls:](https://owaspai.org/goto/navigator/)
12+
* [AI Security Overview](/docs/ai_security_overview/)
13+
        - [About the AI Exchange](/goto/about/)
14+
        - [Organize AI](/goto/organize/)
15+
        - [How to use this document](/goto/document/)
16+
        - [Essentials](/goto/essentials/)
17+
        - [Threats](/goto/threatsoverview/)
18+
                [Highlight: Threat matrix](/goto/aisecuritymatrix/)
19+
                [Highlight: Agentic AI perspective](/goto/agenticaithreats/)
20+
        - [Controls](/goto/controlsoverview/)
21+
                [Highlight: Periodic table of threats and controls](/goto/periodictable/)
22+
        - [Risk analysis](/goto/riskanalysis/)
23+
        - [How about ...](/docs/ai_security_overview/#how-about-)
24+
25+
* [Deep dive into threats and controls:](/goto/navigator/)
2626
        - [1. General controls](/docs/1_general_controls)
27-
                [1.1 Governance controls](https://owaspai.org/goto/governancecontrols/)
28-
                [1.2 Data limitation](https://owaspai.org/goto/datalimit/)
29-
                [1.3 Limit unwanted behaviour](https://owaspai.org/goto/limitunwanted/)
27+
                [1.1 Governance controls](/goto/governancecontrols/)
28+
                [1.2 Data limitation](/goto/datalimit/)
29+
                [1.3 Limit unwanted behaviour](/goto/limitunwanted/)
3030
        - [2. Input threats and controls](/docs/2_threats_through_use/)
31-
                [Highlight: Prompt injection protection](https://owaspai.org/goto/promptinjectionsevenlayers/)
31+
                [Highlight: Prompt injection protection](/goto/promptinjectionsevenlayers/)
3232
        - [3. Development-time threats and controls](/docs/3_development_time_threats/)
3333
        - [4. Runtime conventional security threats and controls](/docs/4_runtime_application_security_threats/)
3434

3535
* [AI security testing](/docs/5_testing/)
36-
3736
* [AI privacy](/goto/aiprivacy/)
38-
3937
* [References](/docs/ai_security_references/)
40-
4138
* [Index](/docs/ai_security_index/)
4239

4340
## About the AI Exchange
@@ -578,7 +575,7 @@ Discovering potential risks that could impact the organization requires the tech
578575

579576
Question: Do you use RAG (Retrieval Augmented Generation) ?
580577
Yes: Then your retrieval repository plays a role in determining the model behaviour. This means:
581-
- You need to protect against [leaking](/goto/leakaugmentation/) or [manipulation](/goto/manipulateaugmentation/) of your augmentation data (e.g., vector database), which includes preventing that it contains externally obtained poisoned data.
578+
- You need to protect against [leaking](/goto/augmentationdataleak/) or [manipulation](/goto/augmentationdatamanipulation/) of your augmentation data (e.g., vector database), which includes preventing that it contains externally obtained poisoned data.
582579

583580
Question: Who runs the model?
584581
- The supplier: select a trustworthy supplier through [supply chain management](/goto/supplychainmanage/), to make sure the deployed model cannot be manipulated ([runtime model poisoning](/goto/runtimemodelpoison/)) - just the way you would expect any supplier to protect their running application from manipulation.

0 commit comments

Comments
 (0)