{"id":29001,"date":"2024-06-11T12:00:21","date_gmt":"2024-06-11T16:00:21","guid":{"rendered":"https:\/\/netfoundry.io\/?p=29001"},"modified":"2024-09-17T22:08:23","modified_gmt":"2024-09-18T02:08:23","slug":"llm-security-development-of-ai-infused-apps","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/","title":{"rendered":"LLM Security \u2013 Development of AI-infused apps"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-securing-llm-environments-is-hard\">Securing LLM environments is hard.<\/h3>\n\n\n\n<p>It involves challenges such as protecting data privacy and confidentiality, implementing robust access control and authentication, ensuring network and infrastructure security, maintaining model integrity against tampering and adversarial attacks, establishing effective monitoring and incident response plans, and balancing security measures with performance and scalability. These measures are crucial to prevent unauthorized access, data breaches, and performance issues while complying with data protection regulations\u200b<\/p>\n\n\n\n<p>This article is a case study from an R&amp;D team of a large enterprise using a large language model (LLM) from their users\u2019 mobile, web, and thick client apps, without exposing any data or metadata to any network.&nbsp; Specifically, an Azure OpenAI powered chatbot with APIs to iPhone (iOS) mobile apps, without their Azure VNet being open to any inbound data (so the firewall is set to deny all inbound).&nbsp; Consider it a sneak preview \u2013 the full case study will be published next.<\/p>\n\n\n\n<p>Our customer\u2019s requirements went beyond security.&nbsp; They included:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>No VPNs, whitelisted IPs, or MPLS dependencies.<br><br><\/li>\n\n\n\n<li>No touching the (B2B and B2B2C) mobile phones.<br><br><\/li>\n\n\n\n<li>No backhauling all the app traffic \u2013 different microservices and APIs to different destinations, directly from the mobile app.<\/li>\n<\/ol>\n\n\n\n<p><br><strong>Spoiler alert:<\/strong> all requirements met, with an open source-based, software-only solution\u2026with the proof of concept (POC) done in one day.<br><br>If you have requirements like this, then this case study should be worth reading.&nbsp; Otherwise, this post will be boring.<\/p>\n\n\n\n\n\n\n<p><strong>The AI and LLM Security dilemma<\/strong><\/p>\n\n\n\n<p>The astounding progress of Large Language Models (LLMs) is creating two opposing forces:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>We want to leverage the Artificial Intelligence (AI) capabilities in our apps, querying public LLMs (e.g. ChatGPT, Azure OpenAI) and self-hosted LLMs (e.g. Llama, Claude).<br><br><\/li>\n\n\n\n<li>We need privacy and security. The data and prompts can contain sensitive, competitive or valuable information, including customer information.<\/li>\n<\/ol>\n\n\n\n<p><br>We have seen this movie before.&nbsp; In fact, the security force is why our internal enterprise apps are only available via private networks such as our WANs or VPNs.&nbsp; By shielding our internal enterprise apps, APIs, and data from the Internet, we minimize the attack surface.&nbsp; Unfortunately, many of the apps that we want to use AI can\u2019t be forced onto our WAN or VPN (and their connections to the cloud such as ExpressRoute or Direct Connect), or doing so would add too much latency, failure points or user experience problems.<\/p>\n\n\n\n<p><strong>Solving the AI and LLM Security dilemma<\/strong><\/p>\n\n\n\n<p>So, we need a solution to enable our apps and APIs to access the LLMs, but without exposing any of the data to the Internet, and without needing to navigate MPLS or VPN.&nbsp; Actually, this is exactly what NetFoundry\u2019s OpenZiti (open source) and NetFoundry Cloud (SaaS)&nbsp; already do for billions of sessions per year \u2013 the LLM on the server side doesn\u2019t make a difference to Ziti.&nbsp; Ziti enables us to:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Minimize the threat surface \u2013 prevent attacks from the Internet.<br><br><\/li>\n\n\n\n<li>Secure the road out too \u2013 help prevent data exfiltration.<br><br><\/li>\n\n\n\n<li>Provide great UX \u2013 no VPN or MPLS backhaul.<br><br><\/li>\n\n\n\n<li>Simplify operations\u2014no complex ACLs, WAF configurations, DNS dependencies, or other day two, bolted-on, infrastructure-dependent, cloud-specific security add-ons.<br><\/li>\n<\/ol>\n\n\n\n<p><br>In other words, the Ziti platform enables us to get both security and simplicity.&nbsp; In this case, use LLMs without network exposure and without VPN.&nbsp; It is the same Ziti platform that leaders such as <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/private-multi-access-edge-compute-mec\/partner-programs#network-functions\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a>, <a href=\"https:\/\/www.edgeir.com\/liveview-and-netfoundry-launch-video-surveillance-platform-with-embedded-zero-trust-networking-security-20220505\" target=\"_blank\" rel=\"noreferrer noopener\">LiveView<\/a>, and <a href=\"https:\/\/www.yahoo.com\/lifestyle\/intrusion-partners-netfoundry-support-u-173000011.html\" target=\"_blank\" rel=\"noreferrer noopener\">Intrusion<\/a> use to securely deliver billions of sessions per year for use cases such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/developer.ibm.com\/articles\/building-a-multicloud-zero-trust-network-with-ziti-and-kubernetes\/\" target=\"_blank\" rel=\"noreferrer noopener\">IBM solution<\/a> for zero trust multi-cloud networking<br><br><\/li>\n\n\n\n<li>IoT and Edge, such as <a href=\"https:\/\/www.capgemini.com\/insights\/research-library\/the-telecommunications-industry-embraces-cloud-native-engineering\/\">c<\/a><a href=\"https:\/\/www.capgemini.com\/insights\/research-library\/the-telecommunications-industry-embraces-cloud-native-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\">onnected cars<\/a>, <a href=\"https:\/\/www.arrow.com\/ais\/resource-library\/blog\/zero-trust-reference-architecture-for-edge-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Arrow servers<\/a>, and the <a href=\"https:\/\/www.linkedin.com\/posts\/gzino_security-iot-edgexfoundry-activity-7064994872973291520-Z5xi\/\" target=\"_blank\" rel=\"noreferrer noopener\">EdgeX platform<\/a><br><br><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.oracle.com\/cloud-infrastructure\/post\/connecting-to-oke-private-api-with-netfoundry-networking\" target=\"_blank\" rel=\"noreferrer noopener\">Oracle solution<\/a> for zero trust APIs<\/li>\n<\/ul>\n\n\n\n<p><br>Note: you can skip this post and try the solution yourself \u2013 it is all software so you can <a href=\"https:\/\/nfconsole.io\/signup?selfServicePlan=teams&amp;stepName=chosePlan&amp;stepNum=1\" target=\"_blank\" rel=\"noreferrer noopener\">spin up a free sandbox in minutes<\/a> via NetFoundry Cloud, or dive right into the <a href=\"https:\/\/github.com\/openziti\" target=\"_blank\" rel=\"noreferrer noopener\">open source<\/a>.<\/p>\n\n\n\n<p><strong>iPhone app to Azure AI: requirements<\/strong><\/p>\n\n\n\n<p>Our customer had these basic requirements:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Develop an Azure AI (private version of ChatGPT-4) based chatbot.<br><br><\/li>\n\n\n\n<li>Incorporate the chatbot into their current mobile application, published as an iOS (iPhone) app.<br><br><\/li>\n\n\n\n<li>Ensure a private, secure connection between the iPhone app and Azure AI. Azure enables private networking within Azure between the customer VNet and Azure AI.&nbsp; However, in the \u201cshared responsibility model\u201d which Azure uses (and all the cloud providers use), the connection to Azure is the responsibility of our customer to secure.<br><\/li>\n<\/ol>\n\n\n\n<p><br>Azure does enable their customers to provision private MPLS circuits from customer data centers to Azure, via meet me sites.&nbsp; However, in this case:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Backhauling the mobile app sessions to the WAN and then the data center and then Azure would add latency and failure points to every application session.<br><br><\/li>\n\n\n\n<li>Adding VPN clients to all the mobile phones (most of which are not controlled by our customers) was not viable. The mobile app leverages multiple environments \u2013 only some of the APIs need to go to the Azure chatbot \u2013 making VPN backhaul even more unattractive.<br><br><\/li>\n\n\n\n<li>The mobile app is already deployed at scale. The cloud MPLS solutions (ExpressRoute, Direct Connect, etc.) are complex, creating high operational costs at scale.&nbsp; For the privacy of our customers, here is a <a href=\"https:\/\/www.linkedin.com\/pulse\/how-invoke-private-rest-apis-amazon-api-gateway-name-ssl-srivastava\/\">p<\/a><a href=\"https:\/\/www.linkedin.com\/pulse\/how-invoke-private-rest-apis-amazon-api-gateway-name-ssl-srivastava\/\" target=\"_blank\" rel=\"noreferrer noopener\">ublic example<\/a> of what it looks like (using AWS as the example:<br><br><\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/AWS-example.png\"><img loading=\"lazy\" decoding=\"async\" width=\"991\" height=\"516\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/AWS-example.png\" alt=\"\" class=\"wp-image-29017\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/AWS-example.png 991w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/AWS-example-300x156.png 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/AWS-example-768x400.png 768w\" sizes=\"auto, (max-width: 991px) 100vw, 991px\" \/><\/a><\/figure>\n\n\n\n<p><strong>iPhone app to Azure AI: solution<\/strong><\/p>\n\n\n\n<p>Here is what our customer did.&nbsp; It turned out to be relatively simple because it is an all-software solution.&nbsp; In fact, the proof of concept was successful in one day:<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/llm-security-development-of-ai-infused-apps.jpg\"><img decoding=\"async\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/llm-security-development-of-ai-infused-apps-1.svg\" alt=\"NetFoundry | LLM Security\u2013Development of AI-infused Apps\" class=\"wp-image-32786\" style=\"width:839px;height:auto\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Our customer used the Azure reference architecture on the Azure side, with a private Ziti router (from the Azure marketplace) in their VNet. Our customer then changed their firewall to deny all inbound traffic (the Ziti router opens outbound sessions only, yet still handles traffic originating from either the server or the client).<br><br><\/li>\n\n\n\n<li>They used <a href=\"https:\/\/github.com\/openziti\/ziti-sdk-swift\" target=\"_blank\" rel=\"noreferrer noopener\">Ziti\u2019s Swift SDK<\/a> in their mobile app. This code results in strong identification, authentication, and authorization, with delivery across their private Ziti overlay network, including mutual TLS (mTLS) and encryption.<br><br><\/li>\n\n\n\n<li>The private Ziti overlay network in the middle is hosted by NetFoundry as part of the NetFoundry Cloud SaaS. Our customer could have self-hosted with OpenZiti (open source).<br><br><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-related-case-studies-and-use-cases\"><strong>Related case studies and use cases<\/strong><\/h3>\n\n\n\n<p>Enabling mobile and web apps to leverage AI in a simple and secure manner is hot off the press.&nbsp; We\u2019ll share more details when the case studies are fully public.&nbsp; In the meantime, here are similar use cases:<\/p>\n\n\n\n<p><br><strong>Private API gateway access for distributed endpoints<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/medium.com\/@rcarrascosps\/a-ray-of-light-how-to-consume-a-mulesoft-dark-service-api-with-the-netroundry-io-nodejs-sdk-1c3246d3ae9e\" target=\"_blank\" rel=\"noreferrer noopener\">Here is a case study<\/a> of consuming a MuleSoft API in the Oracle Cloud from a Digital Ocean cloud.&nbsp; The result is direct connections over a private overlay with private IP addresses and without any dependencies on MPLS or VPN.&nbsp; Here are some other examples: <a href=\"https:\/\/blogs.oracle.com\/cloud-infrastructure\/post\/connecting-to-oke-private-api-with-netfoundry-networking\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a> (Oracle); <a href=\"https:\/\/developer.ibm.com\/articles\/building-a-multicloud-zero-trust-network-with-ziti-and-kubernetes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Multicloud<\/a> (IBM); <a href=\"https:\/\/netfoundry.io\/products\/deployment-options\/\">Hybrid cloud<\/a> (CERM); <a href=\"https:\/\/medium.com\/@rcarrascosps\/from-c-to-z-cdac185c1aef\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a> (SPS)<br><\/p>\n\n\n\n<p><br><strong>Securing access to Kubernetes \u2013 taking the Kubectl API off the Internet<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/ozone.one\/ozone-zitifies-private-kubernetes-deployments-with-netfoundry\/\">Here is how Ozone<\/a> used Ziti to manage their customers\u2019 Kubernetes environments without requiring any inbound access:<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/securing-access-to-kubernetes-taking-the-kubectl-api-off-the-internet.jpg\"><img decoding=\"async\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/06\/securing-access-to-kubernetes-taking-the-kubectl-api-off-the-internet.svg\" alt=\"NetFoundry | Securing access to Kubernetes \u2013 taking the Kubectl API off the Internet\" class=\"wp-image-32808\" style=\"width:844px;height:auto\"\/><\/a><\/figure>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Similarly, by adding the Ziti code to APIs like the Kubernetes API <a href=\"https:\/\/github.com\/openziti-test-kitchen\/kubeztl\" target=\"_blank\" rel=\"noreferrer noopener\">(see example here)<\/a>, K8s APIs are made unreachable.&nbsp; Here are some more API and multi-cloud examples: <a href=\"https:\/\/blogs.oracle.com\/cloud-infrastructure\/post\/connecting-to-oke-private-api-with-netfoundry-networking\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a> (Oracle); <a href=\"https:\/\/developer.ibm.com\/articles\/building-a-multicloud-zero-trust-network-with-ziti-and-kubernetes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Multicloud<\/a> (IBM); Hybrid cloud (CERM); <a href=\"https:\/\/medium.com\/@rcarrascosps\/from-c-to-z-cdac185c1aef\" target=\"_blank\" rel=\"noreferrer noopener\">Kubernetes<\/a> (SPS)<\/p>\n\n\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-llm-security-summary\">LLM Security Summary<\/h3>\n\n\n\n<p>We can now use Artificial Intelligence (AI) capabilities in our web and mobile apps, querying public LLMs (e.g. ChatGPT, Azure OpenAI) and self-hosted LLMs (e.g. Llama, Claude), and yet maintain security and privacy.&nbsp; The customer example above is specific to an iPhone iOS app querying an OpenAI-powered chatbot, but the same architecture works for other LLMs and other clouds.&nbsp; You can start today:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/netfoundry.io\/products\/deployment-options\/\">NetFoundry Cloud<\/a> (hosted SaaS), free for up to 10 endpoints\u2026be up and running in minutes<br><\/li>\n\n\n\n<li><a href=\"https:\/\/openziti.github.io\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">OpenZiti<\/a> open source zero trust networking platform<br><\/li>\n\n\n\n<li><a href=\"https:\/\/netfoundry.io\/lets-talk\/\">Instantly schedule<\/a> a demo or briefing<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Securing LLM environments is hard. It involves challenges such as protecting data privacy and confidentiality, implementing robust access control and authentication, ensuring network and infrastructure security, maintaining model integrity against tampering and adversarial attacks, establishing effective monitoring and incident response plans, and balancing security measures with performance and scalability. These measures are crucial to prevent [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":30248,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[470],"tags":[551,552,550,553],"class_list":["post-29001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","tag-ai","tag-ai-security","tag-llm","tag-zero-trust-llm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>LLM Zero Trust Security<\/title>\n<meta name=\"description\" content=\"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LLM Security \u2013 Development of AI-infused apps\" \/>\n<meta property=\"og:description\" content=\"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T16:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T02:08:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Guthrie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Guthrie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/\"},\"author\":{\"name\":\"Mike Guthrie\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/6e7b1c206427af71adc3268f77d4154e\"},\"headline\":\"LLM Security \u2013 Development of AI-infused apps\",\"datePublished\":\"2024-06-11T16:00:21+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/\"},\"wordCount\":1314,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-security\u2013development-of-ai-infused-apps.jpg\",\"keywords\":[\"AI\",\"AI Security\",\"LLM\",\"Zero Trust LLM\"],\"articleSection\":[\"AI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/\",\"name\":\"LLM Zero Trust Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-security\u2013development-of-ai-infused-apps.jpg\",\"datePublished\":\"2024-06-11T16:00:21+00:00\",\"dateModified\":\"2024-09-18T02:08:23+00:00\",\"description\":\"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-security\u2013development-of-ai-infused-apps.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/netfoundry-security\u2013development-of-ai-infused-apps.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | LLM Security \u2013 Development of AI-infused apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/ai\\\/llm-security-development-of-ai-infused-apps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LLM Security \u2013 Development of AI-infused apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/6e7b1c206427af71adc3268f77d4154e\",\"name\":\"Mike Guthrie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"caption\":\"Mike Guthrie\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/mike-guthrie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"LLM Zero Trust Security","description":"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/","og_locale":"en_US","og_type":"article","og_title":"LLM Security \u2013 Development of AI-infused apps","og_description":"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.","og_url":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-06-11T16:00:21+00:00","article_modified_time":"2024-09-18T02:08:23+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-empower-zero-trust-designed-in.jpg","type":"image\/jpeg"}],"author":"Mike Guthrie","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Mike Guthrie","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/"},"author":{"name":"Mike Guthrie","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/6e7b1c206427af71adc3268f77d4154e"},"headline":"LLM Security \u2013 Development of AI-infused apps","datePublished":"2024-06-11T16:00:21+00:00","dateModified":"2024-09-18T02:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/"},"wordCount":1314,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-security\u2013development-of-ai-infused-apps.jpg","keywords":["AI","AI Security","LLM","Zero Trust LLM"],"articleSection":["AI"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/","url":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/","name":"LLM Zero Trust Security","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-security\u2013development-of-ai-infused-apps.jpg","datePublished":"2024-06-11T16:00:21+00:00","dateModified":"2024-09-18T02:08:23+00:00","description":"Explore LLM Security and AI Security in developing AI-infused apps, focusing on mTLS for secure, authenticated communication in IoT environments.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-security\u2013development-of-ai-infused-apps.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/07\/netfoundry-security\u2013development-of-ai-infused-apps.jpg","width":1536,"height":804,"caption":"NetFoundry | LLM Security \u2013 Development of AI-infused apps"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/ai\/llm-security-development-of-ai-infused-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"LLM Security \u2013 Development of AI-infused apps"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/6e7b1c206427af71adc3268f77d4154e","name":"Mike Guthrie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","caption":"Mike Guthrie"},"url":"https:\/\/netfoundry.io\/author\/mike-guthrie\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/29001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=29001"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/29001\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/30248"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=29001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=29001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=29001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}