Glossary

RAG Security

Security considerations specific to Retrieval-Augmented Generation pipelines: vector-store access control, corpus integrity, embedding inversion, indirect prompt injection.

Context and detail

Architecture risks. Defensive controls. OWASP LLM08 reference.

Related terms

  • Embedding Inversion — Recovering source text or sensitive features from vector embeddings without direct access to the original content.
  • Vector Store — A database optimized for similarity search over high-dimensional embeddings. Foundational component of RAG pipelines.

See how rag security maps to your AI posture.

The free AI Posture Check produces a per-dimension score and maps your gaps to OWASP LLM Top 10, NIST AI RMF, and ISO 42001.

Take the AI Posture Check