← Back to ATLAS MatrixTactic 4 of 15
AI Model Access
The adversary is trying to gain access to AI models and their capabilities.
4 Techniques
MITRE ATLAS Framework
Attack Techniques
Explore the specific techniques adversaries use during the ai model access phase of AI attacks.
1
AML.T0040
Access AI Model
Adversaries may attempt to gain access to AI models.
Examples:
- •Accessing model APIs
- •Gaining model repository access
- •Compromising model hosting services
Mitigations:
- ✓Model access controls
- ✓API security
- ✓Authentication and authorization
References:
2
AML.T0047
Access AI Model
Adversaries may attempt to gain access to AI models.
Examples:
- •Accessing model APIs
- •Gaining model repository access
- •Compromising model hosting services
Mitigations:
- ✓Model access controls
- ✓API security
- ✓Authentication and authorization
References:
3
AML.T0041
Access AI Model
Adversaries may attempt to gain access to AI models.
Examples:
- •Accessing model APIs
- •Gaining model repository access
- •Compromising model hosting services
Mitigations:
- ✓Model access controls
- ✓API security
- ✓Authentication and authorization
References:
4
AML.T0044
Access AI Model
Adversaries may attempt to gain access to AI models.
Examples:
- •Accessing model APIs
- •Gaining model repository access
- •Compromising model hosting services
Mitigations:
- ✓Model access controls
- ✓API security
- ✓Authentication and authorization