Data Exfiltration Susceptibility

From The Foundation for Best Practices in Machine Learning
Technical Best Practices > Security > Data Exfiltration Susceptibility

Data Exfiltration Susceptibility

Control

Document and assess the susceptibility of the Model to data Exfiltration Attacks through - (i) the leakage of (parts of) input data through Model Output; (ii) Model memorization of training data that may be exposed through Model output; (iii) the inclusion by design of (some) training data in stored Model artifacts; and/or (iv) repeated querying of the Model.


Aim

To (a) warrant and control the risk of Model data theft; and (b) highlight associated risks that might occur in the Product Lifecycle.


Additional Information