NSA Releases Best Practices for Secure AI Deployment (Download)
Image source: NSA

NSA Releases Best Practices for Secure AI Deployment (Download)

The Cybersecurity Information Sheet (CSI) has been released by the NSA in partnership with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, among others.

The U.S. National Security Agency, working alongside the Artificial Intelligence Security Center and both domestic and international allies, has unveiled fresh directives concerning the establishment of secure and robust artificial intelligence (AI) systems.

The NSA disclosed in the Cybersecurity Information Sheet (CSI) that the objective of the document is to assist organizations in effectively adopting and managing AI technologies created by third parties, while also integrating measures to address security risks associated with such systems.

“AI brings unprecedented opportunity, but also can present opportunities for malicious activity. NSA is uniquely positioned to provide cybersecurity guidance, AI expertise, and advanced threat analysis,” says NSA Cybersecurity Director Dave Luber.

Attachment
PDF
CSI-DEPLOYING-AI-SYSTEMS-SECURELY.pdf
Preview

The CSI has been released by the NSA in partnership with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security, the New Zealand National Cyber Security Centre (NCSC-NZ), and United Kingdom National Cyber Security Centre (NCSC-UK).

Earlier this month, through another CSI titled "Advancing Zero Trust Maturity Throughout the Data Pillar," the NSA provided directives to enhance data security and safeguard data both at rest and in transit.

The recommendations highlighted in the CSI aim to restrict data access to authorized individuals only. The functionalities delineated in the CSI seamlessly integrate into a comprehensive Zero Trust (ZT) Framework.

“Assuming that breaches will occur, implementing the pillars of the Zero Trust Framework is how we combat that activity.  Data pillar capabilities verify all access to data — one of the key foundational elements for building improved cybersecurity — thereby reducing the impact of breaches and enabling earlier detection of even advanced malicious cyber actor activities,” said Dave Luber, NSA’s Director of Cybersecurity.

CDO Magazine
www.cdomagazine.tech