Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Publication Peer Review

Authorization Best Practices for Systems using LLMs
Authorization Best Practices for Systems using LLMs

Authorization Best Practices for Systems using LLMs

Open Until: 07/12/2024

This document targets engineers, architects, and security professionals, providing an understanding of the specific risks and challenges associated with using LLMs in system design. It aims to inform about the special considerations required and explore the pitfalls in authorization and security.


The guide outlines design patterns and best practices for integrating LLMs into broader systems. It covers high-level patterns for extending LLM capabilities, such as adding context or enabling interaction with other components and services. Recommendations, considerations, and pitfalls for each pattern are discussed to help system architects effectively navigate trade-offs.

Peer review period has ended.