{"id":57817,"date":"2024-12-02T00:00:00","date_gmt":"2024-12-02T00:00:00","guid":{"rendered":"urn:uuid:bdf9bbba-2335-5903-5eea-8acfdd099314"},"modified":"2024-12-02T00:00:00","modified_gmt":"2024-12-02T00:00:00","slug":"ai-configuration-best-practices-to-address-ai-security-risks","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/","title":{"rendered":"AI Configuration Best Practices to address AI Security Risks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"description\" content=\"Learn best practices for AI configuration in order to have better AI security.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"cloud,how to,artificial intelligence (ai),privacy &amp; risks,articles, news, reports,cyber threats\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2024-12-02\"> <meta property=\"article:tag\" content=\"artificial intelligence (ai)\"> <meta property=\"article:section\" content=\"how to\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/ai-configuration-best-practices.html\"> <title>AI Configuration Best Practices for Better AI Security | Trend Micro (US)<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/ai-configuration-best-practices.html\"><br \/>\n<meta property=\"og:title\" content=\"AI Configuration Best Practices for Better AI Security\"><br \/>\n<meta property=\"og:description\" content=\"Learn best practices for AI configuration in order to have better AI security.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/about\/customer-stories\/ai-configuration-best-practices\/ai-configuration-best-practices-tn.jpg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"AI Configuration Best Practices for Better AI Security\"><br \/>\n<meta name=\"twitter:description\" content=\"Learn best practices for AI configuration in order to have better AI security.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/about\/customer-stories\/ai-configuration-best-practices\/ai-configuration-best-practices-tn.jpg\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"48.677840661733\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layers *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"1300092684\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"8.7567567567568\">\n<div class=\"article-details\" role=\"heading\" readability=\"36.972972972973\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Artificial Intelligence (AI)<\/p>\n<p class=\"article-details__description\">AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers.<\/p>\n<p class=\"article-details__author-by\">By: Joy Ngaruro <time class=\"article-details__date\">December 02, 2024<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<div class=\"article-details__icons\"> <!--Add This--> <\/p>\n<div class=\"a2a_kit a2a_default_style\" data-a2a-icon-color=\"#717172\"> <a class=\"a2a_dd addthis_link\" href=\"https:\/\/www.addtoany.com\/share\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/share-more.svg\" class=\"svg-icon\" alt=\"Share\"> <\/a> <a class=\"a2a_button_print addthis_link\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/printer.svg\" class=\"svg-icon\" alt=\"Print\"> <\/a> <\/div>\n<p> <!--Add to Folio--> <!--Subscribe--> <\/div>\n<\/div><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div>\n<div class=\"richText\" readability=\"33.087573964497\">\n<div readability=\"16.317159763314\">\n<p>AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers. According to the Mckinsey\u2019s article: <a href=\"https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mckinsey.com\/capabilities\/quantumblack\/our-insights\/the-state-of-ai<\/a> based on their Global Survey on AI, &#8216;<i>65 percent of respondents report that their organizations are regularly using gen AI, nearly double the percentage from our previous survey just ten months ago. Organizations are already seeing material benefits from gen AI use, reporting both cost decreases and revenue jumps in the business units deploying the technology.<\/i><\/p>\n<p>Although AI presents new exciting and lucrative opportunities for organizations, it is also the latest attack surface for many organizations as security often lags behind deployment of new technology.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31\">\n<div readability=\"7\">\n<p><b><span class=\"body-subhead-title\">AI Attack Tactics &amp; Security Risks:<\/span><\/b><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"34.338259109312\">\n<div readability=\"19.621862348178\">\n<p><i><b>The AI Attack Tactics<\/b><\/i><\/p>\n<p>The number of companies using GenAI is exploding, and this fast adoption to meet market demands could lead companies to overlook security best practices.<\/p>\n<p>The rapid adoption of this new technology means cloud architects, security professionals, and developers alike may not have received training or guidance on deploying GenAI services securely. Further, there have been recent attacks like<\/p>\n<ol>\n<li><a href=\"https:\/\/thehackernews.com\/2023\/10\/qubitstrike-targets-jupyter-notebooks.html\" target=\"_blank\" rel=\"noopener\">Qubitstrike campaign<\/a> where AI model notebooks exposed to the internet were exploited for harvesting of cloud provider credentials and crypto mining<\/li>\n<li><a href=\"https:\/\/www.independent.co.uk\/tech\/chatgpt-microsoft-windows-11-grandma-exploit-b2360213.html\" target=\"_blank\" rel=\"noopener\">Chatgpt Microsoft Windows 11 grandma exploit<\/a> where ChatGPT via prompt injection was tricked into revealing free windows keys for Windows 11<\/li>\n<\/ol>\n<p>Threat actors increasingly use Generative AI (GenAI) to craft targeted phishing emails. However, the same GENAI can help identify scams and security threats.&nbsp;&nbsp;<\/p>\n<p><b><i>Security Risks:<\/i><\/b><\/p>\n<p>Below are the security risks that can occur while using AI services:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><a href=\"https:\/\/genai.owasp.org\/llm-top-10\/\" target=\"_blank\" rel=\"noopener\">OWASP Top Ten for LLMs and Generative AI Apps<\/a><\/span>\n<ul>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm01-prompt-injection\/\" target=\"_blank\" rel=\"noopener\">Prompt Injection<\/a> which can lead to disclosure of sensitive information and reputational damage.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm02-insecure-output-handling\" target=\"_blank\" rel=\"noopener\">Insecure Output Handling<\/a> which can lead to cross-site scripting and remote code injection<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm03-training-data-poisoning\/\" target=\"_blank\" rel=\"noopener\">Training Data Poisoining<\/a> &#8211; poisoned information may be surfaced to users or create other risks like performance degradation, downstream software exploitation and reputational damage<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm04-model-denial-of-service\/\" target=\"_blank\" rel=\"noopener\">Model Denial of Service<\/a> which affects the availability of AI service such that there is a decline in the quality to users as well as unexpected high resource costs for the owner of the AI service.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm06-sensitive-information-disclosure\/\" target=\"_blank\" rel=\"noopener\">Sensitive Information Disclosure<\/a> as LLM have the potential of revealing sensitive information, proprietary algorithms, or other confidential details through their output. This can occur when LLM are trained with sensitive e.g. Personally identifiable information (PII) and making that data public<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm08-excessive-agency\" target=\"_blank\" rel=\"noopener\">Excessive Agency<\/a> is the vulnerability that enables damaging actions to be performed in response to unexpected\/ambiguous outputs from an LLM<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm09-overreliance\/\" target=\"_blank\" rel=\"noopener\">Overreliance<\/a> can occur when an LLM produces erroneous information and provides it in an authoritative manner. When people or systems trust this information without oversight or confirmation it can result in a security breach, misinformation, miscommunication, legal issues, and reputational damage.<\/span><\/li>\n<li><span class=\"rte-circle-bullet\"><a href=\"https:\/\/genai.owasp.org\/llmrisk\/llm10-model-theft\/\" target=\"_blank\" rel=\"noopener\">Model Theft<\/a>&#8211; This occurs when competitors or attackers steal training models&nbsp; (valuable&nbsp; intellectual property) and\/or training data to create similar generative AI services<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35\">\n<div readability=\"15\">\n<p>The impact of these issues could be detrimental to organizations which fail to implement security controls on their GenAI products.<\/p>\n<p>Failure to implement security controls on GenAI products could have a detrimental impact on organizations, including loss of customer trust, litigation, reputation damage, and lost revenue.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31\">\n<div readability=\"7\">\n<p><span class=\"body-subhead-title\">How to guard against AI Security Issues?<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"32.5\">\n<div readability=\"10\">\n<p>Configuration of AI Cloud services according to best practices ensures security of AI services by preventing the security issues mentioned above.<\/p>\n<p>Here are some of the AI best practices recommended by Trend Micro:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\">\n<div>\n<p><span class=\"body-subhead-title\">AWS AI Best Practices<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"41.489981785064\">\n<div readability=\"28.647844565877\">\n<p><i>Configure Sensitive Information Filters for Amazon Bedrock Guardrails<\/i><\/p>\n<p>Amazon Bedrock guardrails are security measures designed to ensure safe and responsible use of AI services provided by Amazon Bedrock. They help manage data privacy, prevent misuse, and maintain compliance with regulations. Guardrails can detect sensitive information such as Personally Identifiable Information (PII) in input prompts or foundation model (FM) responses. You can also configure sensitive information specific to your use case or organization by defining it with regular expressions (regex). Amazon Bedrock guardrails offer two behavior modes to filter sensitive information.<\/p>\n<p>This best practice helps customers identify any Bedrock resources that do not have guardrails configured. Guardrails are an important security measure to filter our sensitive information from both AI responses and user input. Customer should not train AI on sensitive data; however guardrails should be used as an extra layer of security to ensure any sensitive data accidentally included in training models is filtered in responses. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/aws\/Bedrock\/guardrails-with-pii-mask-block.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<p><i>Disable Direct Internet Access for Notebook Instances<\/i><\/p>\n<p>This best practice ensures that your Amazon SageMaker Studio notebook instances are not allowed to communicate with the Internet through Direct Internet Access feature. For added security control, make sure that the Amazon SageMaker domain associated with your notebook instances is configured to use the <u>VPC only <\/u>network access type. When &#8220;VPC Only&#8221; is enabled, all SageMaker Studio traffic is routed through your secure VPC subnets, with internet access disabled by default. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/aws\/SageMaker\/notebook-direct-internet-access.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31\">\n<div readability=\"7\">\n<p><span class=\"body-subhead-title\">Microsoft Azure AI Best Practices:<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"41.353846153846\">\n<div readability=\"28.553846153846\">\n<p><i>Disable Public Network Access to OpenAI Service Instances<\/i><\/p>\n<p>When an Azure OpenAI service instance is publicly accessible, all networks, including the Internet, can access the instance, increasing the risk of unauthorized access, potential security breaches, and compliance violations. To limit access to selected, trusted networks, you must configure network access rules for your OpenAI instances. This allows only authorized traffic from your Azure virtual networks (VNets) or trusted IP addresses to interact with the OpenAI instances, preventing unauthorized access attempts and protecting your AI workloads and data. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/azure\/AIServices\/disable-all-network-access.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<p><i>Use System-Assigned Managed Identities for Azure Machine Learning Workspaces<\/i><\/p>\n<p>This best practice ensures that your Azure Machine Learning (ML) workspaces are using system-assigned managed identities in order to allow secure access to other Microsoft Azure protected resources such as key vaults and storage accounts. Using system-assigned managed identities for Azure ML workspaces enhances security by allowing the ML workspaces to authenticate and authorize with Azure resources without the need for explicit credentials, reducing the risk associated with credential management and providing a seamless and more secure integration with other cloud services. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/azure\/MachineLearning\/system-assigned-managed-identity.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\">\n<div>\n<p><span class=\"body-subhead-title\">GCP AI Best Practices:<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"40.837060702875\">\n<div readability=\"27.552715654952\">\n<p><i>Disable Root Access for Workbench Instances<\/i><b><\/b><\/p>\n<p>This best practice ensures that the root access to your Google Cloud Vertex AI notebook instances is disabled in order to reduce the risk of accidental or malicious system damage by limiting administrative privileges within the instances. Disabling root access to your Google Cloud Vertex AI notebook instances minimizes the risk of unauthorized modifications, enhances security by preventing potential misuse or exploitation of superuser privileges, and helps maintain a more controlled and secure AI environment. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/gcp\/VertexAI\/disable-root-access.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<p><i>Vertex AI Dataset Encryption with Customer-Managed Encryption Keys<\/i><\/p>\n<p>This best practice ensures that your Google Cloud Vertex AI datasets are encrypted using Customer-Managed Encryption Keys (CMEKs) in order to have full control over data encryption and decryption process.<\/p>\n<p>By default, Google Cloud automatically encrypts Vertex AI datasets (data items and annotations) using Google-Managed Encryption Keys (GMEK). However, for organisations with strict compliance and security requirements, CMEKs can be implemented as an additional security layer on top of existing data encryption as it provides organizations with control and management of Vertex AI dataset encryption. <a href=\"https:\/\/www.trendmicro.com\/cloudoneconformity\/knowledge-base\/gcp\/VertexAI\/enable-dataset-encryption-with-cmks.html\" target=\"_blank\" rel=\"noopener\">Learn More<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"31\">\n<div readability=\"7\">\n<p><span class=\"body-subhead-title\">About Trend Micro AI Security Posture Management<\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"richText\" readability=\"27.455399061033\">\n<div readability=\"10.49765258216\">\n<p>Trend Micro ASRM for Cloud AI Security Posture Managment detects AI services that are misconfigured and provides step by step remediation guides to fix these misconfigurations.<\/p>\n<p>It also identifies Cloud Identity risks and potential attack paths that can be exploited.<\/p>\n<p>To learn more about Trend Micro Cloud ASRM AI SPM check out these resources:<br \/><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html#tabs-4092ca-1\">https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html#tabs-4092ca-1<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/k\/ai-configuration-best-practices.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI usage is on the rise as many companies are adopting AI for productivity gains and creation of new business opportunities which provide value to their customers. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9520,9511,10734,9536],"class_list":["post-57817","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cloud","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-how-to","tag-trend-micro-research-privacyrisks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-02T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AI Configuration Best Practices to address AI Security Risks\",\"datePublished\":\"2024-12-02T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/\"},\"wordCount\":1336,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-configuration-best-practices-tn:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cloud\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : How To\",\"Trend Micro Research : Privacy&amp;Risks\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/\",\"name\":\"AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-configuration-best-practices-tn:Large?qlt=80\",\"datePublished\":\"2024-12-02T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-configuration-best-practices-tn:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-configuration-best-practices-tn:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-configuration-best-practices-to-address-ai-security-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI Configuration Best Practices to address AI Security Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/","og_locale":"en_US","og_type":"article","og_title":"AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-12-02T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AI Configuration Best Practices to address AI Security Risks","datePublished":"2024-12-02T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/"},"wordCount":1336,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cloud","Trend Micro Research : Cyber Threats","Trend Micro Research : How To","Trend Micro Research : Privacy&amp;Risks"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/","url":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/","name":"AI Configuration Best Practices to address AI Security Risks 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80","datePublished":"2024-12-02T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-configuration-best-practices-tn:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ai-configuration-best-practices-to-address-ai-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"AI Configuration Best Practices to address AI Security Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57817"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57817\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}