Score: 0

Securing RAG: A Risk Assessment and Mitigation Framework

Published: May 13, 2025 | arXiv ID: 2505.08728v2

By: Lukas Ammann , Sara Ott , Christoph R. Landolt and more

Potential Business Impact:

Protects private information when computers answer questions.

Business Areas:
Risk Management Professional Services

Retrieval Augmented Generation (RAG) has emerged as the de facto industry standard for user-facing NLP applications, offering the ability to integrate data without re-training or fine-tuning Large Language Models (LLMs). This capability enhances the quality and accuracy of responses but also introduces novel security and privacy challenges, particularly when sensitive data is integrated. With the rapid adoption of RAG, securing data and services has become a critical priority. This paper first reviews the vulnerabilities of RAG pipelines, and outlines the attack surface from data pre-processing and data storage management to integration with LLMs. The identified risks are then paired with corresponding mitigations in a structured overview. In a second step, the paper develops a framework that combines RAG-specific security considerations, with existing general security guidelines, industry standards, and best practices. The proposed framework aims to guide the implementation of robust, compliant, secure, and trustworthy RAG systems.

Page Count
8 pages

Category
Computer Science:
Cryptography and Security