Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » CISO Take on Databricks AI Security Framework (DASF) for AI Risk Management
AI and Copilots

CISO Take on Databricks AI Security Framework (DASF) for AI Risk Management

Chris HughesBy Chris HughesApril 15, 2024Updated:April 29, 20245 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

As the cybersecurity industry continues to push artificial intelligence (AI), practitioners race to keep up with businesses’ explosive adoption rates. Security is seeking to maintain the delicate balance between being a business enabler, implementing sound governance, and empowering businesses to make risk-informed decisions around technology use and integration.

Luckily, several resources are coming from industry leaders such as the Cloud Security Alliance (CSA), Open Web Application Security Project (OWASP), and now Databricks regarding AI security. In this analysis, I will take a high-level look at Databricks’ recently released whitepaper, the Databricks AI Security Framework (DASF), and explain its key takeaways for cybersecurity professionals.

Ask Cloud Wars AI Agent about this analysis

Model Types

The paper opens by defining the three broad types of models used in AI: predictive machine learning (ML) models, state-of-the-art open models, and external models. Predictive models include PyTorch and HuggingFace and state-of-the-art open models include Llama-2-70b-chat. State-of-the-art open models are foundational to large language models (LLMs) and used for fine-tuning them. Lastly, external models, or third-party services, include foundation models such as OpenAI GPT, Anthropic, and others.

AI System Components and Their Risks

The paper discusses the common AI system components and their associated risks, which include raw data, data prep and cataloging, developing, evaluating, and managing models, and performing inference requests and responses.

Source: Databricks

The paper catalogs the risks associated with each aspect of the AI system components. It lays out 55 different technical security risks across 12 components commonly deployed by their customers. Each system component is associated with potential security risks and system stages, which align with the diagram above.

Let’s briefly touch on the various components, their risks, and the stage of the software development lifecycle (SDLC) they would be part of. Since the components are organized according to the stage of the system, I’ll use that to orient the discussion and cover the associated components and risks therein.

Data Operations

The first system stage identified is Data Operations. This includes the following components:

  • Raw Data
  • Data Preparation
  • Datasets
  • Catalog and Governance

This system stage boasts the highest number of potential security risks, including insufficient access controls, poor data quality, ineffective encryption, lack of logging, and data poisoning among many others. This stage involves raw data, which the DASF emphasizes is the foundation that all AI functionality builds upon. If the data is compromised in any fashion, it has downstream consequences on all other aspects of AI systems and outputs. There also needs to be controls in place to securely handle data preparation, the proper safeguarding of datasets, and the proper cataloging and governing of the broader data operations.

Model Operations

Model operations is the next system stage identified, which includes:

  • ML Algorithm
  • Evaluation
  • Model Build
  • Model Management

The DASF identifies 15 risks that apply to model operations, including model drift, malicious libraries, ML supply chain vulnerabilities, and model theft. Any nefarious activities impacting a model can impact outputs. There are also supply chain security concerns, such as the potential for malicious libraries that can impact systems, data, and models. Given the widespread use of third-party libraries and open source, this risk is of particular concern.

The DASF also calls out the significant investment required to train ML systems, especially LLMs. Facing model theft can be a significant risk, erode competitive advantage, and squander resource investments. This risk makes it clear how necessary it is to properly secure ML algorithms, the model building and training process, and also the management of models themselves.

The model deployment and serving stage includes:

  • Model Serving Inference Requests
  • Model Serving Inference Responses

Risks called out at this stage include prompt injection, model breakouts, LLM hallucinations and accidental exposure of unauthorized data to models. Prompt injection is a particular attack technique that has gained a lot of visibility. It involves users injecting text aimed at altering the behavior of an LLM and can be used to bypass safeguards and cause damage. Hallucinations are another risk that has been in the headlines, due to LLMs generating incorrect or false outputs or even leaking sensitive data that wasn’t intended to be shared. Lastly, the risk of exposure of unauthorized data to models is catching attention, as LLMs and GenAI become a key part of modern organizational infrastructure and software environments accidental exposure of data to models can pose significant risks to organizations impacting proprietary and confidential data.

Operations and Platform

Rounding out the system stages identified in DSAF is Operations and Platform. The components identified here include:

  • ML Operations
  • ML Platform

Various risks impact this stage, such as a lack of repeatable standards, poor vulnerability management, a lack of penetration testing and incident response, subpar SDLC, and a lack of compliance. Many of these risks apply to many digital enterprise environments and apply to broader application security and governance as well. Additionally, the specific mention of a lack of compliance highlights the increasingly tense intersection between the prolific growth of AI and increased pushes for regulatory compliance.

Moving Forward

AI adoption continues to grow rapidly, and the DASF represents an excellent resource that diverse stakeholders across organizations can leverage to ensure a secure and compliant approach to AI adoption. Databricks is a pioneer in this space, leading with its AI security risk workshops, thought leadership, and exceptional platform to help organizations securely use AI.


For more insights, visit the ai ecosystem channel

ai Anthropic Cloud data data science Databricks featured governance Machine Learning OpenAI risk vulnerability
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025

ServiceNow Re-Invents CRM for End-to-End Enterprise

May 8, 2025

Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT

May 7, 2025

Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’

May 7, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise
  • Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT
  • Bill McDermott Calls Out ‘Collapse of 20th-Century Software-Industrial Complex’
  • With Latest Agentic AI Products, ServiceNow Embraces Third-Party Platforms, Data Sources

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.