🔎
Retrieval-Augmented Generation (RAG)
NIST AI RMFOWASP RAGAISVS C10NIST 800-53
Integrates external knowledge sources and retrieval mechanisms with generative models to enhance reasoning and output accuracy. (NIST: Data, Knowledge; OWASP: RAG; AISVS: C10)
Subcomponents
Security Implications
RAG systems are vulnerable to data poisoning, retrieval manipulation, and knowledge source compromise. Validate retrieved data and monitor connector integrity.
Implementation Considerations
Apply retrieval validation, source whitelisting, and output filtering. Monitor for anomalous retrieval patterns. Reference: OWASP RAG, AISVS C10.
Related Components
NIST 800-53 Rev 5 Controls
🗂️ Framework References