Securing the RAG ingestion pipeline: Filtering mechanisms

Looking at the workflow shown in Figure 1 for the ingestion of data into a knowledge base, an ingestion request is started by invoking the Bedrock API. From that point:

Source: AWS Security Blog

 


Date:

Categorie(s):