- Applying Guardrails on system prompts
- Routing the input to and output from my app through scanners to block or redact harmful and malicious content
- Applying scanners through policies that map to internal usage restrictions, local/national/international regulations, and standards such as OWASP Top 10 for LLMs.
- Creating new policies or modify existing policy components to adapt to changing threat landscapes.