코스 개요

Foundations: Threat Models for Agentic AI

  • Types of agentic threats: misuse, escalation, data leakage, and supply-chain risks
  • Adversary profiles and attacker capabilities specific to autonomous agents
  • Mapping assets, trust boundaries, and critical control points for agents

Governance, Policy, and Risk Management

  • Governance frameworks for agentic systems (roles, responsibilities, approval gates)
  • Policy design: acceptable use, escalation rules, data handling, and auditability
  • Compliance considerations and evidence collection for audits

Non-Human Identity & Authentication for Agents

  • Designing identities for agents: service accounts, JWTs, and short-lived credentials
  • Least-privilege access patterns and just-in-time credentialing
  • Identity lifecycle, rotation, delegation, and revocation strategies

Access Controls, Secrets, and Data Protection

  • Fine-grained access control models and capability-based patterns for agents
  • Secrets management, encryption-in-transit and at-rest, and data minimization
  • Protecting sensitive knowledge sources and PII from unauthorized agent access

Observability, Auditing, and Incident Response

  • Designing telemetry for agent behavior: intent tracing, command logs, and provenance
  • SIEM integration, alerting thresholds, and forensic readiness
  • Runbooks and playbooks for agent-related incidents and containment

Red-Teaming Agentic Systems

  • Planning red-team exercises: scope, rules of engagement, and safe failover
  • Adversarial techniques: prompt injection, tool misuse, chain-of-thought manipulation, and API abuse
  • Conducting controlled attacks and measuring exposure and impact

Hardening and Mitigations

  • Engineering controls: response throttles, capability gating, and sandboxing
  • Policy and orchestration controls: approval flows, human-in-the-loop, and governance hooks
  • Model and prompt-level defenses: input validation, canonicalization, and output filters

Operationalizing Safe Agent Deployments

  • Deployment patterns: staging, canary, and progressive rollout for agents
  • Change control, testing pipelines, and pre-deploy safety checks
  • Cross-functional governance: security, legal, product, and ops playbooks

Capstone: Red-Team / Blue-Team Exercise

  • Execute a simulated red-team attack against a sandboxed agent environment
  • Defend, detect, and remediate as the blue team using controls and telemetry
  • Present findings, remediation plan, and policy updates

Summary and Next Steps

요건

  • Solid background in security engineering, system administration, or cloud operations
  • Familiarity with AI/ML concepts and large language model (LLM) behavior
  • Experience with identity & access management (IAM) and secure system design

Audience

  • Security engineers and red-teamers
  • AI operations and platform engineers
  • Compliance officers and risk managers
  • Engineering leads responsible for agent deployments
 21 시간

참가자 수


참가자당 가격

예정된 코스

관련 카테고리