Skip to content

Technical Extensions

Deep dives on controls, infrastructure, and metrics.

Reference

Document Description
current-solutions.md Industry solutions implementing this pattern — guardrails, evaluation frameworks, safety models

Implementation Guidance

Document Description
judge-model-selection.md Judge model selection principles
bypass-prevention.md Bypass taxonomy and defence strategies
technical-controls.md Network, WAF, DLP, gateway controls
ai-endpoint-hardening.md Model endpoint, gateway, and tool server hardening
Control Families Detailed control family definitions
Agentic Controls (Extended) Extended agentic control guidance
LLM-as-Judge Implementation Detailed Judge implementation
operational-metrics.md Comprehensive metrics catalogue
control-selection-guide.md Control selection methodology
ai-specific-risks.md AI-specific risk categories
support-systems-risk.md Feeder system risk analysis
emerging-trends-impact.md Technology trend impact assessment

Operations

Document Description
soc-integration.md SOC architecture, alert taxonomy, and triage procedures
soc-content-pack.md Ready-to-deploy SIEM detection rules, correlation searches, and dashboards
anomaly-detection-ops.md Behavioural anomaly detection operations
nhi-lifecycle.md Non-human identity lifecycle management
supply-chain.md AI supply chain security controls
rag-security.md RAG pipeline security
cost-and-latency.md Cost and latency impact analysis

AI Runtime Behaviour Security, 2026 (Jonathan Gill).