Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Offline EXO Deployment for Government
- Utilizing EXO_OFFLINE to prevent runtime internet access during operations.
- Pre-loading models into EXO_MODELS_READ_ONLY_DIRS from trusted internal mirrors to ensure secure model deployment.
- Verifying the integrity of model weights using SHA-256 checksums and signed model cards to maintain data accuracy and security.
- Running EXO in air-gapped networks without HuggingFace dependencies to enhance operational security for government environments.
Dashboard and API Access Control for Government
- Installing and configuring reverse proxies (nginx, Caddy) with TLS termination to secure web services for government use.
- Implementing role-based access control for the EXO dashboard and REST API to ensure appropriate user permissions and data protection.
- Using macOS keychain or Linux pass to securely store secrets required for API authentication in government systems.
- Restricting administrative endpoints to specific source IP ranges to limit unauthorized access and enhance security for government operations.
Cluster Isolation and Network Security for Government
- Segmenting EXO clusters using EXO_LIBP2P_NAMESPACE and VLANs to isolate network traffic and enhance security in government networks.
- Configuring host firewalls (macOS application firewall, iptables, nftables) to control access to EXO ports and prevent unauthorized connections.
- Preventing unauthorized device discovery and rogue node injection to maintain the integrity of government systems.
- Encrypting libp2p traffic between nodes when RDMA is not available to ensure secure communication within government clusters.
Model Governance and Provenance for Government
- Building an internal model registry with approved model lists and metadata to support governance and compliance in government operations.
- Tagging and versioning quantized weights (4-bit, 8-bit) alongside source checkpoints to maintain a clear audit trail of models used in government systems.
- Enforcing that only specific HuggingFace repositories or internal artifacts can be loaded to ensure the use of trusted sources for government applications.
- Documenting model lineage, license terms, and acceptable use policies to support transparency and accountability in government operations.
Audit Logging and Compliance for Government
- Configuring EXO log forwarding to immutable audit trails (SIEM, WORM storage) to ensure reliable and tamper-proof record-keeping for government oversight.
- Correlating API call logs with user identity and timestamp to provide a clear audit trail of system interactions for government compliance.
- Capturing events such as model instance creation, deletion, and inference requests to maintain comprehensive records for government operations.
- Generating periodic compliance reports for internal and external auditors to ensure adherence to regulatory requirements in government environments.
Threat Modeling and Incident Response for Government
- Identifying potential threats such as data exfiltration through model outputs, prompt injection, and side-channel leaks to protect government systems.
- Implementing prompt monitoring and content filtering pipelines to detect and prevent malicious activities in government operations.
- Creating incident response runbooks for cluster compromise scenarios to ensure a rapid and effective response to security incidents in government environments.
- Isolating affected nodes, preserving forensic logs, and rebuilding clean environments to mitigate the impact of security breaches in government systems.
Physical Security and Hardware Boundaries for Government
- Securing Thunderbolt ports against unauthorized RDMA cable connections to prevent physical access threats in government facilities.
- Using secure enclaves and Apple Silicon hardware attestation where applicable to enhance the security of government systems.
- Controlling physical access to clustered Macs and shared storage to ensure that only authorized personnel can interact with government equipment.
- Documenting hardware lifecycle and decommissioning procedures to maintain the integrity and security of government assets.
Regulatory Considerations for Government
- Mapping EXO deployments to GDPR, HIPAA, and SOC 2 requirements to ensure compliance with relevant regulations in government operations.
- Maintaining data residency by keeping inference on-premise to protect sensitive government information.
- Documenting vendor supply-chain risks (MLX, EXO, model weights) to identify and mitigate potential security vulnerabilities in government systems.
- Preparing for AI governance frameworks such as the EU AI Act Article 53 to ensure ongoing compliance with evolving regulatory standards for government use.
Requirements
- Experience with EXO or a similar local LLM runtime for government applications
- Understanding of Unix filesystem permissions and network access control lists (ACLs)
- Familiarity with TLS/SSL certificate management and fundamental encryption techniques
Audience
- Security engineers responsible for securing government systems
- Compliance officers ensuring adherence to regulatory standards
- AI infrastructure administrators managing sensitive data in a government context
14 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.