Technical Extensions¶
Deep dives on controls, infrastructure, and metrics.
Reference¶
| Document | Description |
|---|---|
| current-solutions.md | Industry solutions implementing this pattern — guardrails, evaluation frameworks, safety models |
Implementation Guidance¶
| Document | Description |
|---|---|
| judge-model-selection.md | Judge model selection principles |
| bypass-prevention.md | Bypass taxonomy and defence strategies |
| technical-controls.md | Network, WAF, DLP, gateway controls |
| ai-endpoint-hardening.md | Model endpoint, gateway, and tool server hardening |
| Control Families | Detailed control family definitions |
| Agentic Controls (Extended) | Extended agentic control guidance |
| LLM-as-Judge Implementation | Detailed Judge implementation |
| operational-metrics.md | Comprehensive metrics catalogue |
| control-selection-guide.md | Control selection methodology |
| ai-specific-risks.md | AI-specific risk categories |
| support-systems-risk.md | Feeder system risk analysis |
| emerging-trends-impact.md | Technology trend impact assessment |
Operations¶
| Document | Description |
|---|---|
| soc-integration.md | SOC architecture, alert taxonomy, and triage procedures |
| soc-content-pack.md | Ready-to-deploy SIEM detection rules, correlation searches, and dashboards |
| anomaly-detection-ops.md | Behavioural anomaly detection operations |
| nhi-lifecycle.md | Non-human identity lifecycle management |
| supply-chain.md | AI supply chain security controls |
| rag-security.md | RAG pipeline security |
| cost-and-latency.md | Cost and latency impact analysis |
AI Runtime Behaviour Security, 2026 (Jonathan Gill).