Get in Touch

Course Outline

Offline EXO Deployment for Government

  • Utilizing EXO_OFFLINE to prevent runtime internet access during operations.
  • Pre-loading models into EXO_MODELS_READ_ONLY_DIRS from trusted internal mirrors to ensure secure model deployment.
  • Verifying the integrity of model weights using SHA-256 checksums and signed model cards to maintain data accuracy and security.
  • Running EXO in air-gapped networks without HuggingFace dependencies to enhance operational security for government environments.

Dashboard and API Access Control for Government

  • Installing and configuring reverse proxies (nginx, Caddy) with TLS termination to secure web services for government use.
  • Implementing role-based access control for the EXO dashboard and REST API to ensure appropriate user permissions and data protection.
  • Using macOS keychain or Linux pass to securely store secrets required for API authentication in government systems.
  • Restricting administrative endpoints to specific source IP ranges to limit unauthorized access and enhance security for government operations.

Cluster Isolation and Network Security for Government

  • Segmenting EXO clusters using EXO_LIBP2P_NAMESPACE and VLANs to isolate network traffic and enhance security in government networks.
  • Configuring host firewalls (macOS application firewall, iptables, nftables) to control access to EXO ports and prevent unauthorized connections.
  • Preventing unauthorized device discovery and rogue node injection to maintain the integrity of government systems.
  • Encrypting libp2p traffic between nodes when RDMA is not available to ensure secure communication within government clusters.

Model Governance and Provenance for Government

  • Building an internal model registry with approved model lists and metadata to support governance and compliance in government operations.
  • Tagging and versioning quantized weights (4-bit, 8-bit) alongside source checkpoints to maintain a clear audit trail of models used in government systems.
  • Enforcing that only specific HuggingFace repositories or internal artifacts can be loaded to ensure the use of trusted sources for government applications.
  • Documenting model lineage, license terms, and acceptable use policies to support transparency and accountability in government operations.

Audit Logging and Compliance for Government

  • Configuring EXO log forwarding to immutable audit trails (SIEM, WORM storage) to ensure reliable and tamper-proof record-keeping for government oversight.
  • Correlating API call logs with user identity and timestamp to provide a clear audit trail of system interactions for government compliance.
  • Capturing events such as model instance creation, deletion, and inference requests to maintain comprehensive records for government operations.
  • Generating periodic compliance reports for internal and external auditors to ensure adherence to regulatory requirements in government environments.

Threat Modeling and Incident Response for Government

  • Identifying potential threats such as data exfiltration through model outputs, prompt injection, and side-channel leaks to protect government systems.
  • Implementing prompt monitoring and content filtering pipelines to detect and prevent malicious activities in government operations.
  • Creating incident response runbooks for cluster compromise scenarios to ensure a rapid and effective response to security incidents in government environments.
  • Isolating affected nodes, preserving forensic logs, and rebuilding clean environments to mitigate the impact of security breaches in government systems.

Physical Security and Hardware Boundaries for Government

  • Securing Thunderbolt ports against unauthorized RDMA cable connections to prevent physical access threats in government facilities.
  • Using secure enclaves and Apple Silicon hardware attestation where applicable to enhance the security of government systems.
  • Controlling physical access to clustered Macs and shared storage to ensure that only authorized personnel can interact with government equipment.
  • Documenting hardware lifecycle and decommissioning procedures to maintain the integrity and security of government assets.

Regulatory Considerations for Government

  • Mapping EXO deployments to GDPR, HIPAA, and SOC 2 requirements to ensure compliance with relevant regulations in government operations.
  • Maintaining data residency by keeping inference on-premise to protect sensitive government information.
  • Documenting vendor supply-chain risks (MLX, EXO, model weights) to identify and mitigate potential security vulnerabilities in government systems.
  • Preparing for AI governance frameworks such as the EU AI Act Article 53 to ensure ongoing compliance with evolving regulatory standards for government use.

Requirements

  • Experience with EXO or a similar local LLM runtime for government applications
  • Understanding of Unix filesystem permissions and network access control lists (ACLs)
  • Familiarity with TLS/SSL certificate management and fundamental encryption techniques

Audience

  • Security engineers responsible for securing government systems
  • Compliance officers ensuring adherence to regulatory standards
  • AI infrastructure administrators managing sensitive data in a government context
 14 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories