Back to the MIT repository
2. Privacy & Security3 - Other

Risks from AI systems (Risks of computing infrastructure security)

The computing infrastructure underpinning AI training and operations, which relies on diverse and ubiquitous computing nodes and various types of computing resources, faces risks such as malicious consumption of computing resources and cross-boundary transmission of security threats at the layer of computing infrastructure.

Source: MIT AI Risk Repositorymit692

ENTITY

1 - Human

INTENT

3 - Other

TIMING

3 - Other

Risk ID

mit692

Domain lineage

2. Privacy & Security

186 mapped risks

2.2 > AI system security vulnerabilities and attacks

Mitigation strategy

1. Establish a Zero Trust Architecture (ZTA) and Network Microsegmentation: Implement a Zero Trust model to rigorously verify every access request, regardless of origin, and apply microsegmentation to isolate computing nodes, data pipelines, and model deployment infrastructure. This minimizes the attack surface for lateral movement and contains cross-boundary threats. 2. Enforce Robust Identity and Access Management (IAM): Apply least-privilege policies to all human operators and automated AI agents, ensuring they have the minimum permissions necessary to perform their functions. Mandate strong authentication, such as Multi-Factor Authentication (MFA), for all privileged access to computing resources to prevent unauthorized consumption. 3. Implement Continuous Monitoring and Hardening: Deploy continuous behavior analytics across training pipelines and inference endpoints to track model performance, data quality, and resource usage in real-time. Additionally, maintain up-to-date patching of all operating systems, firmware, and security-enforcing devices to address exploitable vulnerabilities in the computing infrastructure layer.