{"id":25596,"date":"2024-12-18T06:01:02","date_gmt":"2024-12-18T14:01:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/12\/18\/news-19325\/"},"modified":"2024-12-18T06:01:02","modified_gmt":"2024-12-18T14:01:02","slug":"news-19325","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/12\/18\/news-19325\/","title":{"rendered":"Agile Business, agile security: How AI and Zero Trust work together"},"content":{"rendered":"<p><strong>Credit to Author: Mark Simos| Date: Mon, 16 Dec 2024 17:00:00 +0000<\/strong><\/p>\n<p><strong>Traditional security approaches don\u2019t work for AI.<\/strong> Generative AI technology is already transforming our world and has immense positive potential for cybersecurity and business processes, but traditional security models and controls aren\u2019t enough to manage the security risks associated with this new technology.\u202f&nbsp;&nbsp;<\/p>\n<p>We recently published a <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-product-and-services\/microsoft-dynamics-365\/pdf\/367541-ai-and-zero-trust-roadmap-final.pdf?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">new whitepaper<\/a> that examines the security challenges and opportunities from generative AI, what security must do to adapt to manage risk related to it, how a Zero Trust approach is essential to effectively secure this AI technology (and underlying data), and how different roles across your organization must work together for effective AI security.&nbsp;&nbsp;<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/4.17-cta.png\" class=\"card-img img-object-cover\" alt=\"\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/4.17-cta.webp 600w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/4.17-cta-300x300.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/4.17-cta-150x150.webp 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>AI security and Zero Trust<\/h2>\n<div class=\"mb-3\">\n<p>Agile security for agile businesses.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-product-and-services\/microsoft-dynamics-365\/pdf\/367541-ai-and-zero-trust-roadmap-final.pdf?culture=en-us&#038;country=us\" class=\"btn btn-link text-decoration-none p-0\" > \t\t\t\t\t\t\t\t<span>Read the whitepaper<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"navigating-ai-s-unique-challenges\">Navigating AI\u2019s unique challenges\u202f&nbsp;<\/h2>\n<p>AI presents new types of problems that require different thinking and different solutions.<\/p>\n<h3 class=\"wp-block-heading\" id=\"generative-ai-is-dynamic\">Generative AI is dynamic<\/h3>\n<p>At the most fundamental level, generative AI is non-deterministic computing, which means that it doesn\u2019t provide the exact same output each time you run it. For example, asking an image generation model to \u201cdraw a picture of a kitten in a security guard uniform\u201d repeatedly is unlikely to generate the exact same picture twice (though they will all be similar). Static security controls assume that vulnerabilities (in the broader definition) and their exploitation so they will look exactly the same each time will not be particularly effective at detecting and blocking attacks on AI. You need controls made for AI.\u00a0<\/p>\n<h3 class=\"wp-block-heading\" id=\"generative-ai-is-data-centric\">Generative AI is data-centric<\/h3>\n<p>Generative AI is fundamentally a data analysis and data generation technology, making the security and governance of your data incredibly important to the security of your AI applications and the reliability and trustworthiness of their outputs.&nbsp;&nbsp;<\/p>\n<p>You need to have an asset-centric and data-centric security approach that can handle dynamic changes to secure AI and the data it relies on. <strong>This means you need a Zero Trust approach to effectively secure AI<\/strong>.&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust<\/a> is simply modern security without the false assumption that a network security perimeter is enough to secure assets in it (including data). This drives a mindset shift that changes how you look at security strategy, architecture, controls, and more. Zero Trust focuses security protecting business assets inside and outside the classic network perimeter across the \u2018hybrid of everything\u2019 environments (including multiplatform, multicloud, on-premises, operational technology, Internet of Things, and more).\u00a0<\/p>\n<h3 class=\"wp-block-heading\" id=\"cyberattackers-are-using-generative-ai-against-you\">Cyberattackers are using generative AI against you<\/h3>\n<p>Another complication is that AI relies on vast amounts of data to train models, making your data a prime target for cyberattackers and elevating the importance of protecting your data. Cybercriminals are also using AI now to refine attack techniques and process the data they steal from organizations. Organizations must recognize that these threats are already happening and urgently adapt their security strategies to effectively protect their data, AI applications, business assets, and people.\u202f\u00a0<\/p>\n<p>By applying Zero Trust principles, organizations can reduce the risk related to AI while rapidly embracing the opportunities that this technology offers.<\/p>\n<h2 class=\"wp-block-heading\" id=\"key-strategies-to-help-manage-ai-security-risks\">Key strategies to help manage AI security risks\u202f&nbsp;<\/h2>\n<p>These strategies from the whitepaper illustrate how to manage the risks associated with AI. \u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Provide guidance to users<\/strong>. Cyberattackers are using AI to improve the quality and volume of scam emails and phone calls (sometimes called phishing or business email compromise) that will be experienced by nearly anyone in the organization. Organizations must urgently start educating everyone (starting with financial roles and other high-business-impacting roles) so that they understand that they are likely to see these highly convincing fake communications and what to do about it. People will need to understand the basics of how AI works, the risks that it poses, and what they can do about it (such as how to spot it, how to report it to security teams, or how to enhance business processes to independently verify important transactions).\u00a0<\/li>\n<li><strong>Protect AI applications and data<\/strong>.<strong> <\/strong>Cybercriminals are actively targeting AI systems. Early integration of security in AI development is crucial to avoid costly fixes later.&nbsp;&nbsp;<\/li>\n<li><strong>Adopt AI security capabilities<\/strong>. While AI is not a magical silver bullet that can replace talented human experts and existing tools, AI technology can significantly enhance security operations (SecOps) by empowering people to get more out of their data and tools (quickly writing up reports, analyzing business impact of attacks, guiding newer analysts through investigation, and more).&nbsp;&nbsp;<\/li>\n<li><strong>Policy and standards<\/strong>.<strong> <\/strong>Organizations need written security standards and processes to guide their team\u2019s decisions and demonstrate they are following due diligence to regulators. These standards should cover security, privacy, and ethical considerations\u2014you can use <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/06\/21\/microsofts-framework-for-building-ai-systems-responsibly\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s Responsible AI Standard<\/a> as a reference to guide this work.&nbsp;&nbsp;<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/AI-Imperatives.webp\" alt=\"Diagram showing multiple dimensions of AI security risk.\" class=\"wp-image-136883 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/12\/AI-Imperatives.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"zero-trust-and-ai-a-symbiotic-relationship\">\u202fZero Trust and AI: A symbiotic relationship\u202f<\/h2>\n<p>We have found that there is a symbiotic relationship between Zero Trust and Generative AI where:\u00a0<\/p>\n<ul class=\"wp-block-list\">\n<li>AI requires a Zero Trust approach to effectively protect data and AI applications.&nbsp;&nbsp;<\/li>\n<li>AI-powered capabilities can help accelerate Zero Trust by analyzing vast data signals, extracting key insights, guiding humans through key processes, and automating repetitive manual tasks. This allows your teams to cut through the noise, responding to threats faster, and continuously learn and grow their expertise.<\/li>\n<\/ul>\n<p>The Zero Trust approach to security helps you keep up with continuously changing threats as well as the rapid evolution of technology that AI represents. I will wrap this blog with a quote from the <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-product-and-services\/microsoft-dynamics-365\/pdf\/367541-ai-and-zero-trust-roadmap-final.pdf?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">new whitepaper<\/a>:<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;By integrating security early and embracing Zero Trust principles, organizations can take advantage of AI while mitigating risks, much like brakes on a car enable people to safely travel faster.&#8221;<\/em><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"learn-more-about-the-zero-trust-approach\">Learn more about the Zero Trust approach<\/h2>\n<p>To learn more about how Zero Trust can guide this approach, visit the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Model<\/a> webpage and explore additional resources at the<strong> <\/strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Guidance Center<\/a>. Check out <a href=\"https:\/\/aka.ms\/markslist\">Mark&#8217;s List<\/a> for additional resources. <\/p>\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button btn-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-product-and-services\/microsoft-dynamics-365\/pdf\/367541-ai-and-zero-trust-roadmap-final.pdf?culture=en-us&amp;country=us\" target=\"_blank\" rel=\"noreferrer noopener\">Download our whitepaper to help your organization navigate its secure AI journey.&nbsp;<\/a><\/div>\n<\/p><\/div>\n<p>For more security resources and links, you can visit our <a href=\"https:\/\/www.linkedin.com\/pulse\/marks-list-mark-simos\/\">LinkedIn<\/a>. You can also bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with security news and follow <a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a> on LinkedIn and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>).<\/p>\n<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/16\/agile-business-agile-security-how-ai-and-zero-trust-work-together\/\">Agile Business, agile security: How AI and Zero Trust work together<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/16\/agile-business-agile-security-how-ai-and-zero-trust-work-together\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Simos| Date: Mon, 16 Dec 2024 17:00:00 +0000<\/strong><\/p>\n<p>We recently published a new whitepaper that examines the security challenges and opportunities from generative AI.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/12\/16\/agile-business-agile-security-how-ai-and-zero-trust-work-together\/\">Agile Business, agile security: How AI and Zero Trust work together<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25596","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25596"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25596\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}