Security & Access Controls
AI Products must enforce secure, governed, and auditable access.
Because AI Products expose powerful capabilities, they require controls that go beyond generic API security — including entitlements, usage boundaries, and abuse prevention.
Why Security & Access Controls Matter
- Prevent misuse → unauthorized or malicious use of AI Products can cause harm.
- Compliance → regulations may require identity verification and access restrictions.
- Trust → consumers need confidence that their data and interactions are secure.
- Governance → security interfaces must align with organizational and regulatory policies.
Core Security Requirements
1. Authentication
- AI Products must authenticate consumers before granting access.
- Supported mechanisms may include:
- OAuth2 / OIDC
- API keys (with rotation policies)
- Mutual TLS
- Service accounts for automation
2. Authorization & Entitlements
- Must declare who is allowed to use the product and for what purposes.
- Policies may follow:
- RBAC (Role-Based Access Control)
- ABAC (Attribute-Based Access Control)
- PBAC (Policy-Based Access Control)
- ReBAC (Relationship-Based Access Control)
- OBAC (Organization-Based Access Control)
- Entitlements should align with AI Product governance declarations (e.g., prohibited uses).
3. Rate Limiting & Quotas
- Prevent denial-of-service or excessive resource usage.
- Define per-consumer or per-tenant quotas.
4. Data Protection
- Encrypt all data in transit (TLS) and at rest.
- Support anonymization/pseudonymization where appropriate.
- Declare whether inputs/outputs are logged or stored.
5. Abuse & Misuse Detection
- Monitor for adversarial attacks (prompt injection, evasion).
- Detect abnormal usage patterns (e.g., bulk scraping, disallowed tasks).
- Provide automated alerts or shutdown mechanisms for abusive use.
Governance Integration
- Access Policies must align with the AI Product’s declared risk classification and prohibited uses (see AI Product Definition).
- Audit Logs → All access requests and decisions must be logged.
- Review Processes → Periodic review of access policies and entitlements.
Example
LLM Service AI Product
- Authentication: OAuth2 with service-to-service tokens.
- Authorization: PBAC → policies restricting use to enterprise workflows.
- Rate Limiting: 100 requests/minute per user.
- Data Protection: TLS 1.3, outputs logged for 30 days, inputs anonymized.
- Abuse Detection: Prompt injection detection + auto-block if misuse exceeds threshold.
- Governance: Audit logs stored in compliance system, reviewed quarterly.
Summary
- Security and access control are mandatory characteristics of AI Products.
- Must include authentication, authorization, quotas, encryption, and abuse detection.
- Policies must align with governance, risk classification, and prohibited use declarations.
Principle: An AI Product without secure, governed, and auditable access is not a true product — it is an ungoverned asset.