
"“Our internal systems are tightly coupled to Cisco's infrastructure: our cloud provider, our issue tracker, our LLM gateway, our development platform, our severity taxonomy [for vulnerabilities or security threats],” the company explains on its GitHub page."
"“When you essentially ‘fire’ an LLM at your IT environment, you likely rely on a gradually refined set of guardrails, permissions, and model choices to gain insights into that environment.” “That can help, but according to Cisco, it is unstructured, highly error-prone, unvalidated, gives no idea of coverage, and is, fundamentally, improvised.”"
"“The alternative Foundry Security Spec starts from an orchestration layer, where the roles, guardrails, and domain for security evaluations are defined.” “From there, a detection agent operates, systematically analyzing code per specification.” “Then, another agent validates these findings and filters out false positives.”"
"“A coverage tracker monitors whether the IT environment is being fully examined, after which an ‘auditable output’ presents and maps the findings in a verifiable manner.” “According to Cisco, the end result is a security evalua”"
Foundry Security Spec is an open-source specification for orchestrating LLMs in predictable security evaluations of IT systems. It replaces improvised, unvalidated approaches that rely on firing an LLM into an environment with ad hoc guardrails, permissions, and model choices. The spec defines an orchestration layer that sets roles, guardrails, and the domain for security evaluation. A detection agent then analyzes code according to the specification. A validation agent filters false positives. A coverage tracker monitors whether the environment is fully examined. Auditable output presents and maps findings in a verifiable manner.
Read at Techzine Global
Unable to calculate read time
Collection
[
|
...
]