Revamping Third Party Vendor Assessments for the Age of Large Language Models
Maria Schwenger
GenAI & Cyber Strategist | Board Member | Tech Author & Public Speaker | Digital Transformation
Introduction?
The increasing adoption of Large Language Models (LLMs) in the supply chain presents a new challenge for traditional Third-Party Vendor Security Assessments (TPVRAs). This blog explores how to adapt existing TPVRAs to gather critical information about the integration of LLMs within the organizational ecosystem and its associated risks. A subsequent blog will outline the specifics of updating Master Service Agreements (MSAs) to address LLM supply chain risks, providing a comprehensive approach to governing the risk of the LLMs in the supply chain.
To help you get started, Appendix 1 includes a sample set of questions specifically tailored to assessing LLM usage within vendor products. This "strawman" approach can be adapted to your specific environment and needs. While it's a work in progress and requires further refinement, it serves as a springboard for developing a more comprehensive LLM assessment framework through community collaboration.
The LLM Conundrum in the Supply Chain
The opaque nature of vendor products can make it difficult to ascertain if they leverage LLMs. Traditional TPVRAs focus on infrastructure security, software vulnerabilities, network security posture, data protection practices, and integration overhead. This focus, however, often overlooks the potential risks associated with embedded LLMs, which may not be explicitly disclosed by vendors. Existing TPVRAs might not explicitly ask about the inner workings of vendor products, potentially missing the assessment of LLM components.?
The inclusion of LLMs can bring inherited risks, potentially impacting the entire ecosystem. Below are some of the main concerns:
Adapting Your TPVRA Arsenal for LLM Detection
To effectively assess LLM-related risks within your supply chain, we need to adapt existing TPVRA practices. Consider the following possible modifications to your existing TPVRA strategy:
Beyond Detection: Mitigating LLM Risks in the Supply Chain
Once organizations identify LLM usage within their supply chain, they should adopt a proactive and multi-faceted approach that may include:?
Benefits of a LLM-Aware TPVRA
The main advantage of incorporating LLM questions into the TPVRA is to enable us to address model risks early and more effectively. By integrating LLM awareness into our TPVRA, we can achieve:?
The Future of LLM TPVRAs: Collaboration and Innovation
Adapting TPVRAs for LLM detection and evaluation is an ongoing and iterative process. Collaboration with vendors, security experts, and industry bodies is key to developing robust assessment methodologies. As the LLM landscape evolves, so too should our TPVRA strategy. By staying vigilant and continuously innovating, we can ensure a secure and reliable LLM-powered supply chain.
This blog provides an initial framework for adapting your TPVRAs. The specific questions and techniques employed will depend on your unique risk tolerance, the nature of your business and vendor relationships. As the LLM ecosystem matures, new tools and best practices will emerge. By proactively adapting your TPVRA strategy, you can stay ahead of the curve and navigate the exciting, yet risk-laden, world of LLMs within your supply chain.
Appendix 1
Sample LLM Risk Assessment for Third-Party Vendors
Overview
This assessment evaluates potential vendors providing Generative AI (GenAI) technologies like large language models for text generation, code generation, image creation, etc. The use of GenAI carries risks around data privacy, security, intellectual property, and ethical concerns that must be carefully reviewed before a decision is made to contact specific vendors.?
These are some key areas that should be reviewed when assessing GenAI vendors. However, the specific criteria and weighting would depend on each organization's unique requirements/industry and risk tolerances. The assessment can be further customized based on the specific GenAI use case being pursued.
The following FlowChart presents a conceptual model for assessing third-party vendors that employ LLMs, emphasizing the requirement for a dynamic and adaptive evaluation process that accounts for the distinctive risks and considerations surrounding LLMs. This proposed approach aims to inspire innovation and flexibility in LLM risk assessment, while ensuring alignment with company policies and regulatory requirements.
Assessment Areas Questionnaire
Each of the risk areas below can be evaluated across multiple dimensions - the vendor's processes, the underlying model/system characteristics, output control features, documentation and transparency, and conformance to standards and regulations.
领英推荐
Additional Generative AI Criteria?
Thi section covers some of the key aspects that differentiate generative AI from other software products and services with emphasis on data practices, model governance, output controls, and monitoring processes. The level of diligence may depend on the risk profile of the use case as well.?
Here are some additional details that can be assessed specifically for Generative AI vendors and technologies:
Assessment Results?
Based on the criteria evaluated above, the overall risk level is: ?
(Please provide a detailed assessment of the vendor's overall risk level)
If moving forward, some potential mitigations for key risks include:?
(Please describe the potential mitigations for key risks)
For each line item above, please, document:?
Below are a few examples specific to GenAI risks that focus on mitigating potential issues like biased data, unexplainable models, harmful output, and the need for human oversight.
Based on this assessment, the recommendation is: (Please provide a recommendation based on this assessment)
[ ] Proceed with this vendor, but with the following conditions… (Please, list all conditions)
Founder & CEO | Mentor
9 个月Quite informative, thank you MARIA N. SCHWENGER
Student at Khulna University
9 个月You might find this intriguing report on global third-party risk worth checking out: https://securityscorecard.com/reports/third-party-cyber-risk
Technology Project Manager | IoT | DevSecOps | Application Security | Cloud Security | Data Security | Solution Architect
9 个月Great insight, Thanks for publishing detailed information
Co-Founder & CTO at Vendict. Security Questionnaires done in minutes
9 个月Interesting and very useful! Many are talking about the AI risk, but I don’t see a lot of practical advice like here