Key Threats
Overview of the Three Key Threats
Starting Point on the System
Potential Type of Attack and/or Key Threat
Potential Negative Impacts (Risks)
Risk Rating
Appropriate Defenses/Security Controls
Architecture - PropScreen in relation to all other systems
Tampering, Info Disclosure, Denial of Service from Insecure Software in PropScreen
Unauthorized data disclosure
Privacy policy violation
PropScreen Failing Open
Critical
Develop software in accordance with the OWASP Developer Guide (focus on section 5, especially input sanitization and supply chain management)
Asset - LLM
Denial of Service, Cost Running Attacks
Service degraded or failing for other users
Organization incurs unnecessary and wasteful cloud computing costs
High/Medium-High
Implement rate a limiting module for the requests made to PropScreen
Implement a size limiter on the maximum response size allowed by the model (covered by AWS)
Asset - Client LLM Application
Spoofing, Tampering, Info Disclosure, Elevation of Priv, leading to unauthorized access
Unauthorized data disclosure or data theft
Privacy policy violation
High
Implement a User Authentication Module before a user has the ability to interact with PropScreen
Last updated