Secure by Design Newsletter - Vol.1 Issue 4

Romana Vasyleha
Romana Vasyleha
Oct 15, 2024

Where AI-Powered Software is Going, We Need Secure, Paved Roads

Organizations are rushing to build AI applications using Retrieval-Augmented Generation (RAG) and agentic architectures that integrate enterprise and customer data with large language models (LLMs). This article explores how a composable security approach allows developers to move quickly while embedding AI security guardrails to defend against attacks like prompt injection and risks like sensitive data leakage.

๐Ÿ”— Learn more


๐Ÿ‘ฅ Everything Authorization

Access controls are at the heart of secure systems. But how do you choose the right model for your architecture? Whether you're navigating RBAC, ReBAC, or ABAC, we've got the resources to help you level up your authorization strategy.

  • RBAC vs ReBAC vs ABAC โ€” Learn the differences and when to use each.
    ๐Ÿ”— Read more

  • How to ABAC: Banking Edition โ€” See how attribute-based access control can be applied in highly regulated industries like banking.
    ๐Ÿ”— Read more

  • Access Controls from A to Z โ€” A comprehensive guide to access control strategies that can fit any need.
    ๐Ÿ”— Read more


๐Ÿง‘โ€๐Ÿ’ป Your Next Big Security Upgrade is Just a Few Clicks Way

Check out these exciting product updates that will make your security setup more robust and flexible:

  • Sanitize API โ€” Easily cleanse sensitive data to maintain compliance and reduce risk.
    ๐Ÿ”— Explore more

  • Vault Notifications โ€” Stay on top of your stored secrets with real-time notifications.
    ๐Ÿ”— Learn more


Stay tuned for more updates and strategies in the next edition of Secure by Design!

This blog post was updated on Jan 9, 2025

Get updates in your inbox and subscribe to our newsletter

background landmass

Outsmart our AI. Win $10k

Join our AI Escape Room Challenge to test your prompt injection skills.

Register Now