🔎

Retrieval-Augmented Generation (RAG)

NIST AI RMFOWASP RAGAISVS C10NIST 800-53

Integrates external knowledge sources and retrieval mechanisms with generative models to enhance reasoning and output accuracy. (NIST: Data, Knowledge; OWASP: RAG; AISVS: C10)

Subcomponents
  • Retriever Module
    Fetches relevant documents or data from external sources.
  • Knowledge Connector
    Connects to databases, APIs, or vector stores for retrieval.
  • RAG Pipeline
    Orchestrates retrieval and generation steps for each query.
Security Implications
RAG systems are vulnerable to data poisoning, retrieval manipulation, and knowledge source compromise. Validate retrieved data and monitor connector integrity.
Implementation Considerations
Apply retrieval validation, source whitelisting, and output filtering. Monitor for anomalous retrieval patterns. Reference: OWASP RAG, AISVS C10.
Related Components
NIST 800-53 Rev 5 Controls
🗂️ Framework References