Access Control and Security for Monitoring Systems
Was this section helpful?
OWASP Machine Learning Security Top 10, OWASP Foundation, 2023OWASP Foundation Project (OWASP Foundation) - Provides a comprehensive list of common security vulnerabilities specific to machine learning systems, offering practical guidance for identifying and mitigating risks in MLOps, including monitoring components.
Role-Based Access Control: Features, Functions, and Implementation, David F. Ferraiolo, Janet A. Barkeley, and D. Richard Kuhn, 1995Proceedings of the 11th Annual Computer Security Applications Conference (IEEE)DOI: 10.1109/CSAC.1995.485847 - This foundational paper introduces the concepts of Role-Based Access Control (RBAC), outlining its architecture, components, and benefits for managing access permissions in complex systems.
Google Cloud Security Foundations Guide, Google Cloud, 2024 (Google Cloud) - Provides guidance on securing infrastructure, data, and access within Google Cloud, covering encryption, network isolation, secrets management, and identity management relevant to MLOps deployments.
Artificial Intelligence Risk Management Framework (AI RMF 1.0), National Institute of Standards and Technology (NIST), 2023NIST AI 100-1 (U.S. Department of Commerce) - Offers a comprehensive framework for managing risks associated with artificial intelligence, including those related to security, governance, and compliance in the context of responsible AI development and deployment.