Practice-1 · Access: Free
Practice‑1: Identity‑Aware AI Security Practice
Version 1.0.0
Linked hypothesis: SPH-1
Practice‑1: Identity‑Aware AI Security Practice
Practice Summary
Who this is for
This practice is for CISOs, CIOs, CDOs, enterprise architects, security engineering teams, and platform teams responsible for deploying AI capabilities that touch business‑critical systems and data.
What this practice helps you do
This practice shows how to implement SPH‑1 (Identity‑Aware AI Security) by:
- Inventorying AI capabilities that touch sensitive data (copilots, chatbots, RAG systems, workflow agents).
- Mapping human and non‑human identities and entitlements that those AI capabilities use.
- Designing and implementing:
- Identity‑aware retrieval (AI only sees data the calling identity is allowed to see).
- Identity‑aware abstraction (what level of detail is revealed to which audiences).
- Identity‑aware authorization enforcement via IGA and policy engines.
What’s in the interactive workbook
The interactive workbook (free in Version 1) includes:
Module 1 – AI capability and data‑surface mapping
Identify AI systems, the data they touch, and existing controls.Module 2 – Identity model and non‑human identities
Document how human and non‑human identities are represented today and where governance gaps exist.Module 3 – Identity‑aware retrieval patterns
Design retrieval layers that apply authorization‑first patterns for copilots, chatbots, RAG, and agents.Module 4 – Identity‑aware abstraction for insight agents
Define read/transform/reveal rules and detail tiers for enterprisewide insight agents.Module 5 – Integration with IGA, policy engines, and security tooling
Connect AI capabilities to existing IGA platforms, policy engines, DLP/DSPM, and SOC tooling.
This workbook assumes familiarity with SPH‑1 and basic identity/security concepts. It goes deeper than the hypothesis and Practice Summary and is optimized for practitioners and agents.