White Paper

Protect LLMs with CipherTrust Transparent Encryption

Protect LLMs with CipherTrust Transparent Encryption

Pages 8 Pages

LLM deployments create new risks because prompts, responses, logs and knowledge bases may expose sensitive data, especially when using RAG. The paper explains how CipherTrust Transparent Encryption protects LLM ecosystems by encrypting data at rest, enforcing granular access control and securing backend frameworks, file systems and RAG databases. Scenario 1 secures data at rest and in transit using GuardPoints and centralized key management. Scenario 2 adds confidential computing to protect data in use through trusted execution environments, attestation and isolation. Together these controls preserve confidentiality and integrity across the full LLM lifecycle.

Join for free to read