How to build a secure RAG pipeline on AWS
Security controls for retrieval, embeddings, secrets, model access, logging, and network boundaries.
Writing
These pieces are designed to teach something useful, show how I think, and create a public record of practical work in AI security, cloud architecture, and compliance.
Security controls for retrieval, embeddings, secrets, model access, logging, and network boundaries.
The common reasons AI products break under ISO 27001 and SOC 2 scrutiny, and the design moves that help.
How to think about data residency, threat surface, model operations, and where each option fits.
What should be true about access, asset boundaries, recovery, evidence, and change control.
The failure modes I see most often in fast-moving engineering teams and how to address them early.