Back to the MIT repository
2. Privacy & Security2 - Post-deployment

Data Protection/Privacy

Vulnerable channel by which personal information may be accessed. The user may want their personal data to be kept private.

Source: MIT AI Risk Repositorymit637

ENTITY

1 - Human

INTENT

2 - Unintentional

TIMING

2 - Post-deployment

Risk ID

mit637

Domain lineage

2. Privacy & Security

186 mapped risks

2.1 > Compromise of privacy by leaking or correctly inferring sensitive information

Mitigation strategy

1. Mandate strong end-to-end encryption protocols, such as Transport Layer Security (TLS) with robust cipher suites, for all data in transit across the channel and employ AES-256 or equivalent encryption for data at rest. This foundational measure ensures that personal information is unintelligible even if the communication channel is successfully compromised. 2. Implement and strictly enforce Multi-Factor Authentication (MFA) for all users accessing the channel or underlying data stores, coupled with Role-Based Access Control (RBAC) that adheres to the principle of least privilege to limit access only to personnel absolutely necessary for defined job functions. 3. Conduct regular, scheduled vulnerability assessments and specialized penetration testing (e.g., API, web, or network testing) focused on the communication channel's security posture. Remediation plans must prioritize addressing all discovered vulnerabilities, with critical patches applied immediately upon release.