|国家预印本平台
首页|Securing RAG: A Risk Assessment and Mitigation Framework

Securing RAG: A Risk Assessment and Mitigation Framework

Securing RAG: A Risk Assessment and Mitigation Framework

来源:Arxiv_logoArxiv
英文摘要

Retrieval Augmented Generation (RAG) has emerged as the de facto industry standard for user-facing NLP applications, offering the ability to integrate data without re-training or fine-tuning Large Language Models (LLMs). This capability enhances the quality and accuracy of responses but also introduces novel security and privacy challenges, particularly when sensitive data is integrated. With the rapid adoption of RAG, securing data and services has become a critical priority. This paper first reviews the vulnerabilities of RAG pipelines, and outlines the attack surface from data pre-processing and data storage management to integration with LLMs. The identified risks are then paired with corresponding mitigations in a structured overview. In a second step, the paper develops a framework that combines RAG-specific security considerations, with existing general security guidelines, industry standards, and best practices. The proposed framework aims to guide the implementation of robust, compliant, secure, and trustworthy RAG systems.

Lukas Ammann、Sara Ott、Christoph R. Landolt、Marco P. Lehmann

安全科学

Lukas Ammann,Sara Ott,Christoph R. Landolt,Marco P. Lehmann.Securing RAG: A Risk Assessment and Mitigation Framework[EB/OL].(2025-05-13)[2025-06-06].https://arxiv.org/abs/2505.08728.点此复制

评论