{"id":4705,"date":"2023-09-24T20:08:34","date_gmt":"2023-09-24T23:08:34","guid":{"rendered":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/"},"modified":"2023-09-24T20:08:34","modified_gmt":"2023-09-24T23:08:34","slug":"software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov","status":"publish","type":"post","link":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/","title":{"rendered":"Software Must Be Secure by Design, and Artificial Intelligence Is No &#8230; &#8211; CISA (.gov)"},"content":{"rendered":"<p>An official website of the United States government<br \/>Here\u2019s how you know<br \/>                 <strong>Official websites use .gov<\/strong>                 <br \/> A <strong>.gov<\/strong> website belongs to an official government organization in the United States.               <br \/>                 <strong>Secure .gov websites use HTTPS<\/strong>                 <br \/> A <strong>lock<\/strong> (<span class=\"icon-lock\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"52\" height=\"64\" viewbox=\"0 0 52 64\" class=\"usa-banner__lock-image\" role=\"img\" aria-labelledby=\"banner-lock-title banner-lock-description\"><title id=\"banner-lock-title\">Lock<\/title><desc id=\"banner-lock-description\">A locked padlock<\/desc><path fill=\"#000000\" fill-rule=\"evenodd\" d=\"M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z\"\/><\/svg><\/span>) or <strong>https:\/\/<\/strong> means you\u2019ve safely connected to the .gov website. Share sensitive information only on official, secure websites.               <br \/>Search<br \/><em>By Christine Lai, AI Security Lead and Dr. Jonathan Spring, Senior Technical Advisor<\/em><br \/>Discussions of artificial intelligence (AI) often swirl with mysticism regarding how an AI system functions. The reality is far more simple: AI is a type of software system.<br \/>And like any software system, AI must be <a href=\"\/securebydesign\" title=\"Secure by Design\">Secure by Design<\/a>. This means that manufacturers of AI systems must consider the security of the customers as a core business requirement, not just a technical feature, and prioritize security throughout the whole lifecycle of the product, from inception of the idea to planning for the system\u2019s end-of-life. It also means that AI systems must be secure to use out of the box, with little to no configuration changes or additional cost.<br \/>The specific ways to make AI systems Secure by Design can differ from other types of software, and some best practices for safety and security practices are still being fully defined. Additionally, the manner in which adversaries may choose to use (or misuse) AI software systems will undoubtedly continue to evolve \u2013 issues that we will explore in a future blog post. However, fundamental <a href=\"https:\/\/www.nist.gov\/cyberframework\/getting-started\/quick-start-guide\" title=\"Security Practices\">security practices<\/a> still apply to AI software.<br \/>AI is software that does fancy data processing. It generates predictions, recommendations, or decisions based on statistical reasoning (precisely, this is true of machine learning types of AI). Evidence-based statistical policy making or statistical reasoning is a powerful tool for improving human lives. <a href=\"https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK470182\/\" title=\"Evidence-based\">Evidence-based<\/a>\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Evidence-based_medicine\" title=\"Evidence based medicine\">medicine<\/a> understands this well. If AI software automates aspects of the human process of science, that makes it very powerful, but it remains software all the same.<br \/>CEOs, policymakers, and academics are grappling with how to design <a href=\"https:\/\/github.com\/trailofbits\/publications\/blob\/master\/papers\/toward_comprehensive_risk_assessments.pdf\" title=\"Design safe\">safe<\/a> and <a href=\"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\" title=\"And fair\">fair<\/a> AI systems, and how to <a href=\"https:\/\/www.judiciary.senate.gov\/committee-activity\/hearings\/oversight-of-ai-rules-for-artificial-intelligence\" title=\"Establish guardrails\">establish guardrails<\/a> for the most powerful AI systems. Whatever the outcome of these conversations, <strong>AI software must be Secure by Design.<\/strong><br \/>AI software design, AI software development, AI data management, AI software deployment, AI system integration, AI software testing, AI vulnerability management, AI incident management, AI product security, and AI end-of-life management \u2013 for example \u2013 all should apply existing community-expected security practices and policies for broader software design, software development, etc. AI engineering continues to take on too much <a href=\"https:\/\/en.wikipedia.org\/wiki\/Technical_debt\" title=\"technical debt\">technical debt<\/a> where they have avoided applying these practices.\u00a0 As the pressure to adopt AI software system increases, developers will be pressured to take on technical debt rather than implement Secure by Design principles. Since AI is the \u201c<a href=\"https:\/\/research.google\/pubs\/pub43146.pdf\" title=\"high interest credit card\">high interest credit card\u201d<\/a> of technical debt, it is particularly dangerous to choose shortcuts rather than Secure by Design.<br \/>Some aspects of AI, such as data management, have important operational differences with expected practices for other software types. Some security practices will need to be augmented to account for AI considerations. The AI engineering community should start by applying existing security best practices. Secure by Design practices are a foundation on which other guardrails and safety principles depend. Therefore, the AI engineering community should be encouraged to integrate or apply these Secure-by-Design practices starting today.<br \/><a href=\"\/sites\/default\/files\/2023-06\/principles_approaches_for_security-by-design-default_508c.pdf\" title=\"Secure by Design\">Secure by Design<\/a> \u201cmeans that technology products are built in a way that reasonably protects against malicious cyber actors successfully gaining access to devices, data, and connected infrastructure.\u201d Secure by Design software is designed securely from inception to end-of-life. System development life cycle <a href=\"https:\/\/csrc.nist.gov\/projects\/risk-management\/about-rmf\" title=\"Risk Management\">risk management<\/a> and <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/defense_in_depth\" title=\"defense in depth\">defense in depth<\/a> certainly applies to AI software. The larger discussions about AI often lose sight of the workaday shortcomings in AI engineering as <a href=\"https:\/\/cset.georgetown.edu\/publication\/adversarial-machine-learning-and-cybersecurity\/\" title=\"related to\">related to<\/a> cybersecurity operations and existing cybersecurity policy. For example, systems processing AI model file formats should protect against untrusted code execution attempts and should use memory-safe languages. The AI engineering community must institute <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3442167.3442177\" title=\"Vulnerability Identifiers\">vulnerability identifiers<\/a> like <a href=\"https:\/\/www.cve.org\/\" title=\"Common Vulnerabilities and Exposures\">Common Vulnerabilities and Exposures<\/a> (CVE) IDs. Since AI is software, AI models \u2013 and their dependencies, including data \u2013 should be <a href=\"https:\/\/github.com\/spdx\/spdx-3-model\/tree\/main\/model\/AI\" title=\"Captured\">captured<\/a><a href=\"https:\/\/cyclonedx.org\/capabilities\/mlbom\/\" title=\"In\">in<\/a><a href=\"\/sbom\" title=\"Software Bills of Materials\">software bills of materials<\/a>. The AI system should also respect <a href=\"https:\/\/www.fpc.gov\/resources\/fipps\/\" title=\"Fundamental Privacy Principles\">fundamental privacy principles<\/a> by default<u>.<\/u><br \/>CISA understands that once these standard engineering, Secure-by-Design and security operations practices are integrated into AI engineering, there are still remaining AI-specific assurance issues. For example, adversarial inputs that <a href=\"https:\/\/spectrum.ieee.org\/slight-street-sign-modifications-can-fool-machine-learning-algorithms\" title=\"force misclassification\">force misclassification<\/a> can cause cars to <a href=\"https:\/\/keenlab.tencent.com\/en\/2019\/03\/29\/Tencent-Keen-Security-Lab-Experimental-Security-Research-of-Tesla-Autopilot\/\" title=\"misbehave on road courses\">misbehave on road courses<\/a> or hide objects from <a href=\"https:\/\/towardsdatascience.com\/avoiding-detection-with-adversarial-t-shirts-bb620df2f7e6\" title=\"security camera software\">security camera software<\/a>. These adversarial inputs that force misclassifications are practically different from standard input validation or security detection bypass, even if they\u2019re conceptually similar. The security community maintains a taxonomy of common weaknesses and their mitigations \u2013 for example, improper input validation is <a href=\"https:\/\/cwe.mitre.org\/data\/definitions\/20.html\" title=\"CWE-20\">CWE-20<\/a><u>.<\/u> Security detection bypass through evasion is a common issue for network defenses such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Intrusion_detection_system_evasion_techniques\" title=\"intrusion detection system (IDS) evasion\">intrusion detection system (IDS) evasion<\/a>.<br \/>AI-specific assurance issues are primarily important if the AI-enabled software system is otherwise secure. Adversaries already have well-established practices to exploit an AI system with exposed <a href=\"\/kev\" title=\"known-exploited vulnerabilities\">known-exploited vulnerabilities<\/a> in the non-AI software elements. With the example of adversarial inputs that force misclassifications above, the attacker\u2019s goal is to change the model\u2019s outputs. Compromising the underlying system also achieves this goal. Protecting machine learning models is important, but it is also important that the traditional parts of the system are isolated and secured. Privacy and data exposure concerns are more difficult to assess \u2013 given <a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-30648-8_1\" title=\"model inversion\">model inversion<\/a> and <a href=\"https:\/\/arxiv.org\/pdf\/2011.11819\" title=\"data extraction\">data extraction<\/a> attacks, a risk-neutral security policy would restrict access to any model at the same level as one would restrict access to the training data.<br \/>AI is a critical type of software, and attention on AI system assurance is well-placed. Although AI is just one among many types of software systems, AI software has come to automate processes <a href=\"https:\/\/books.google.com\/books?id=cbwvDwAAQBAJ&amp;lr=&amp;source=gbs_navlinks_s\" title=\"crucial\">crucial<\/a> to our society, from email spam filtering to credit scores, from internet information retrieval to assisting doctors find broken bones in <a href=\"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/0846537120941671\" title=\"x-ray images\">x-ray images<\/a>. As AI grows more integrated into these software systems and the software systems automate these and other aspects of our lives, the importance of AI software that is Secure by Design grows as well.\u00a0 This is why CISA will continue to urge technology providers to ensure AI systems are Secure by Design \u2013 every model, every system, every time.<br \/>\u00a0<br \/>\u00a0<\/p>\n<p><a href=\"https:\/\/news.google.com\/rss\/articles\/CBMibWh0dHBzOi8vd3d3LmNpc2EuZ292L25ld3MtZXZlbnRzL25ld3Mvc29mdHdhcmUtbXVzdC1iZS1zZWN1cmUtZGVzaWduLWFuZC1hcnRpZmljaWFsLWludGVsbGlnZW5jZS1uby1leGNlcHRpb27SAQA?oc=5\">source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An official website of the United States governmentHere\u2019s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:\/\/ means you\u2019ve safely connected to the .gov website. Share sensitive information only on official, secure&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[35],"class_list":["post-4705","post","type-post","status-publish","format-standard","hentry","category-noticias","tag-digital"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.1 (Yoast SEO v22.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov) - 4tuneagencia.digital<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov)\" \/>\n<meta property=\"og:description\" content=\"An official website of the United States governmentHere\u2019s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:\/\/ means you\u2019ve safely connected to the .gov website. Share sensitive information only on official, secure...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\" \/>\n<meta property=\"og:site_name\" content=\"4tuneagencia.digital\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-24T23:08:34+00:00\" \/>\n<meta name=\"author\" content=\"4tune\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"4tune\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\"},\"author\":{\"name\":\"4tune\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\"},\"headline\":\"Software Must Be Secure by Design, and Artificial Intelligence Is No &#8230; &#8211; CISA (.gov)\",\"datePublished\":\"2023-09-24T23:08:34+00:00\",\"dateModified\":\"2023-09-24T23:08:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\"},\"wordCount\":1056,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"keywords\":[\"Digital\"],\"articleSection\":[\"Noticias\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\",\"name\":\"Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov) - 4tuneagencia.digital\",\"isPartOf\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\"},\"datePublished\":\"2023-09-24T23:08:34+00:00\",\"dateModified\":\"2023-09-24T23:08:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/4tuneagencia.digital\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software Must Be Secure by Design, and Artificial Intelligence Is No &#8230; &#8211; CISA (.gov)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#website\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"name\":\"4tuneagencia.digital\",\"description\":\"Marketing e Web Designer \",\"publisher\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#organization\",\"name\":\"4tuneagencia.digital\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"contentUrl\":\"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png\",\"width\":250,\"height\":250,\"caption\":\"4tuneagencia.digital\"},\"image\":{\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100\",\"name\":\"4tune\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g\",\"caption\":\"4tune\"},\"sameAs\":[\"http:\/\/4tuneagencia.digital\"],\"url\":\"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov) - 4tuneagencia.digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/","og_locale":"pt_BR","og_type":"article","og_title":"Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov)","og_description":"An official website of the United States governmentHere\u2019s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:\/\/ means you\u2019ve safely connected to the .gov website. Share sensitive information only on official, secure...","og_url":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/","og_site_name":"4tuneagencia.digital","article_published_time":"2023-09-24T23:08:34+00:00","author":"4tune","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"4tune","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#article","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/"},"author":{"name":"4tune","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100"},"headline":"Software Must Be Secure by Design, and Artificial Intelligence Is No &#8230; &#8211; CISA (.gov)","datePublished":"2023-09-24T23:08:34+00:00","dateModified":"2023-09-24T23:08:34+00:00","mainEntityOfPage":{"@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/"},"wordCount":1056,"commentCount":0,"publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"keywords":["Digital"],"articleSection":["Noticias"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/","url":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/","name":"Software Must Be Secure by Design, and Artificial Intelligence Is No ... - CISA (.gov) - 4tuneagencia.digital","isPartOf":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#website"},"datePublished":"2023-09-24T23:08:34+00:00","dateModified":"2023-09-24T23:08:34+00:00","breadcrumb":{"@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/4tuneagencia.digital\/blog\/software-must-be-secure-by-design-and-artificial-intelligence-is-no-cisa-gov\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/4tuneagencia.digital\/blog\/"},{"@type":"ListItem","position":2,"name":"Software Must Be Secure by Design, and Artificial Intelligence Is No &#8230; &#8211; CISA (.gov)"}]},{"@type":"WebSite","@id":"https:\/\/4tuneagencia.digital\/blog\/#website","url":"https:\/\/4tuneagencia.digital\/blog\/","name":"4tuneagencia.digital","description":"Marketing e Web Designer ","publisher":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4tuneagencia.digital\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/4tuneagencia.digital\/blog\/#organization","name":"4tuneagencia.digital","url":"https:\/\/4tuneagencia.digital\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","contentUrl":"https:\/\/4tuneagencia.digital\/blog\/wp-content\/uploads\/2023\/09\/novo-logo-e1694954525541.png","width":250,"height":250,"caption":"4tuneagencia.digital"},"image":{"@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/7c40d2e8b9964c2390122613459c2100","name":"4tune","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/4tuneagencia.digital\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e81e8ea0176022ee4555117aee5e3092bff2a7aaa930134f8023c7d4bc2f1495?s=96&d=mm&r=g","caption":"4tune"},"sameAs":["http:\/\/4tuneagencia.digital"],"url":"https:\/\/4tuneagencia.digital\/blog\/author\/admin\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/4705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/comments?post=4705"}],"version-history":[{"count":0,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/posts\/4705\/revisions"}],"wp:attachment":[{"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/media?parent=4705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/categories?post=4705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4tuneagencia.digital\/blog\/wp-json\/wp\/v2\/tags?post=4705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}