Introduction

The rapid rise of powerful generative artificial intelligence (GenAI) applications is poised to impact internet users and businesses significantly. While offering immense potential for discovery, efficiency, and corporate growth across various industries, GenAI also introduces new challenges to security and privacy. Developments in Artificial Intelligence, Machine Learning, Large Language Models, and Diffusion Models, combined with enhanced training data availability and computing power, have fuelled the explosive growth of GenAI. Solutions like ChatGPT, ElevenLabs, and Midjourney, now more widely accessible, underscore the need for organizations to formulate plans for managing their engagement and use of AI.

To offer comprehensive guidance, OWASP has introduced a checklist designed to provide additional support and direction. This checklist serves as a valuable resource, providing detailed recommendations and insights to assist individuals and organisations in navigating the complexities associated with security and governance in the realm of Large Language Models (LLMs) and artificial intelligence.

 

Intended Audience

For leaders in executive, technology, cybersecurity, privacy, compliance, and legal roles, this checklist is your go-to guide in navigating the rapidly evolving landscape of GenAI technology. Tailored to swiftly highlight the risks and benefits of Large Language Models (LLMs), it empowers you to craft a comprehensive strategy for leveraging opportunities, addressing threats, and managing risks.

 

Checklist

Adversarial Risk

Scrutinize how competitors are investing in artificial intelligence. Although there are risks in AI adoption, there are also business benefits that may impact future market positions.

Threat Model: how attackers may accelerate exploit attacks against the organization, employees, executives, or users.

Threat models potential attacks on customers or clients through spoofing and generative AI.

Investigate the impact of current controls, such as password resets, which use voice recognition.

Update the Incident Response Plan and playbooks for LLM incidents.

AI Asset Inventory

Catalog existing AI services, tools, and owners. Designate a tag in asset management for specific inventory.

Include AI components in the Software Bill of Material (SBOM), a comprehensive list of all the software components, dependencies, and metadata associated with applications.

Catalog AI data sources and the sensitivity of the data (protected, confidential, public).

Establish if pen testing or red teaming of deployed AI solutions is required to determine the current attack surface risk.

Create an AI solution onboarding process.

Ensure skilled IT admin staff is available either internally or externally, in accordance with the SBoM.

AI Security and Privacy Training

Train all users on ethics, responsibility, and legal issues such as warranty, license, and copyright.

Update security awareness training to include GenAI related threats. Voice cloning and image cloning, as well as in anticipation of increased spear phishing attacks.

Any adopted GenAI solutions should include training for both DevOps and cybersecurity for the deployment pipeline to ensure AI safety and security assurances.

Establish Business Cases

Enhance customer experience.

Better operational efficiency.

Better knowledge management.

Enhanced innovation.

Market Research and Competitor Analysis.

Document creation, translation, summarization, and analysis.

Governance

Establish the organization’s AI RACI chart (who is responsible, who is accountable, who should be consulted, and who should be informed).

Document and assign AI risk, risk assessments, and governance responsibility within the organization.

Establish data management policies, including technical enforcement, regarding data classification and usage limitations. Models should only leverage data classified for the minimum access level of any user of the system. For example, update the data protection policy to emphasize not to input protected or confidential data into nonbusiness-managed tools.

Create an AI Policy supported by established policy (e.g., standard of good conduct, data protection, software use).

Publish an acceptable use matrix for various generative AI tools for employees to use.

Document the sources and management of any data that the organization uses from the generative LLM models.

Legal

Confirm product warranties are clear in the product development stream to assign who is responsible for product warranties with AI.

Review and update existing terms and conditions for any GenAI considerations.

Review AI EULA agreements. End-user license agreements for GenAI platforms are very different in how they handle user prompts, output rights and ownership, data privacy, compliance and liability, privacy, and limits on how output can be used.

Review existing AI-assisted tools used for code development. A chatbot’s ability to write code can threaten a company’s ownership rights to its own product if a chatbot is used to generate code for the product. For example, it could call into question the status and protection of the generated content and who holds the right to use the generated content.

Review any risks to intellectual property. Intellectual property generated by a chatbot could be in jeopardy if improperly obtained data was used during the generative process, which is subject to copyright, trademark, or patent protection. If AI products use infringing material, it creates a risk for the outputs of the AI, which may result in intellectual property infringement.

Review any contracts with indemnification provisions. Indemnification clauses try to put the responsibility for an event that leads to liability on the person who was more at fault for it or who had the best chance of stopping it. Establish guardrails to determine whether the provider of the AI or its user caused the event, giving rise to liability.

Review liability for potential injury and property damage caused by AI systems.

Review insurance coverage. Traditional (D&O) liability and commercial general liability insurance policies are likely insufficient to fully protect AI use.

Identify any copyright issues. Human authorship is required for copyright. An organization may also be liable for plagiarism, propagation of bias, or intellectual property infringement if LLM tools are misused.

Ensure agreements are in place for contractors and appropriate use of AI for any development or provided services.

Restrict or prohibit the use of generative AI tools for employees or contractors where enforceable rights may be an issue or where there are IP infringement concerns.

Assess and AI solutions used for employee management or hiring could result in disparate treatment claims or disparate impact claims.

Make sure the AI solutions do not collect or share sensitive information without proper consent or authorization.

Regulatory

Determine State specific compliance requirements.

Determine compliance requirements for restricting electronic monitoring of employees and employment-related automated decision systems (Vermont).

Determine compliance requirements for consent for facial recognition and the AI video analysis required (Illinois, Maryland).

Review any AI tools in use or being considered for employee hiring or management.

Confirm the vendor’s compliance with applicable AI laws and best practices.

Ask and document any products using AI during the hiring process. Ask how the model was trained, how it is monitored, and track any corrections made to avoid discrimination and bias.

Ask and document what accommodation options are included.

Ask and document whether the vendor collects confidential data.

Ask how the vendor or tool stores and deletes data and regulates the use of facial recognition and video analysis tools during pre-employment.

Review other organization-specific regulatory requirements with AI that may raise compliance issues. The Employee Retirement Income Security Act of 1974, for instance, has fiduciary duty requirements for retirement plans that a chatbot might not be able to meet.

Using or Implementing Large Language Model Solutions

Threat Model: LLM components and architecture trust boundaries.

Data Security: Verify how data is classified and protected based on sensitivity, including personal and proprietary business data. (How are user permissions managed, and what safeguards are in place?)

Access Control: Implement least privilege access controls and implement defense-in-depth measures.

Training Pipeline Security: Require rigorous control around training data governance, pipelines, models, and algorithms.

Input and Output Security: Evaluate input validation methods, as well as how outputs are filtered, sanitized, and approved.

Monitoring and Response: Map workflows, monitoring, and responses to understand automation, logging, and auditing. Confirm audit records are secure.

Include application testing, source code review, vulnerability assessments, and red teaming in the production release process.

Consider vulnerabilities in the LLM model solutions (Rezilion OSFF Scorecard).

Look into the effects of threats and attacks on LLM solutions, such as prompt injection, the release of sensitive information, and process manipulation.

Investigate the impact of attacks and threats to LLM models, including model poisoning, improper data handling, supply chain attacks, and model theft.

Supply Chain Security: Request third-party audits, penetration testing, and code reviews for third-party providers. (both initially and on an ongoing basis)

Infrastructure Security: How often does the vendor perform resilience testing? What are their SLAs in terms of availability, scalability, and performance?

Update incident response playbooks and include an LLM incident in tabletop exercises.

Identify or expand metrics to benchmark generative cybersecurity AI against other approaches to measure expected productivity improvements.

References

LLM AI Security & Governance Checklist – https://owasp.org/www-project-top-10-for-large-language-model-applications/llm-top-10-governance-doc/LLM_AI_Security_and_Governance_Checklist.pdf