Your Strategy
Security must take place on two levels: First, the data sources themselves must have strict access controls. Second, an LLM gateway must ensure that no sensitive information (PII) leaves the organization or appears unauthorized in the chat.Best Practices
- ▸Isolation: Use separate vector databases for different levels of confidentiality.
- ▸Filtering: Implement automated filters for injections (input) and PII leaks (output).
- ▸Alignment: Use RLHF-optimized models that are trained not to disclose system prompts.