Get in Touch

Course Outline

Offline EXO Deployment

  • Using EXO_OFFLINE to prevent runtime internet access
  • Pre-loading models into EXO_MODELS_READ_ONLY_DIRS from trusted internal mirrors
  • Verifying model weight integrity using SHA-256 checksums and signed model cards
  • Running EXO in air-gapped networks without dependencies on HuggingFace

Dashboard and API Access Control

  • Installing and configuring reverse proxies (nginx, Caddy) with TLS termination
  • Implementing role-based access control for the EXO dashboard and REST API
  • Storing secrets for API authentication using macOS keychain or Linux pass
  • Restricting administrative endpoints to specific source IP ranges

Cluster Isolation and Network Security

  • Segmenting EXO clusters using EXO_LIBP2P_NAMESPACE and VLANs
  • Configuring host firewalls (macOS application firewall, iptables, nftables) for EXO ports
  • Preventing unauthorized device discovery and rogue node injection
  • Encrypting libp2p traffic between nodes when RDMA is unavailable

Model Governance and Provenance

  • Building an internal model registry with approved model lists and metadata
  • Tagging and versioning quantized weights (4-bit, 8-bit) alongside source checkpoints
  • Enforcing loading of only specific HuggingFace repos or internal artifacts
  • Documenting model lineage, license terms, and acceptable use policies

Audit Logging and Compliance

  • Configuring EXO log forwarding to immutable audit trails (SIEM, WORM storage)
  • Correlating API call logs with user identity and timestamp
  • Capturing events for model instance creation, deletion, and inference requests
  • Generating periodic compliance reports for internal and external auditors

Threat Modeling and Incident Response

  • Identifying threats such as data exfiltration via model outputs, prompt injection, and side-channel leaks
  • Implementing prompt monitoring and content filtering pipelines
  • Creating incident response runbooks for cluster compromise scenarios
  • Isolating affected nodes, preserving forensic logs, and rebuilding clean environments

Physical Security and Hardware Boundaries

  • Securing Thunderbolt ports against unauthorized RDMA cable connections
  • Utilizing secure enclaves and Apple Silicon hardware attestation where applicable
  • Controlling physical access to clustered Macs and shared storage
  • Documenting hardware lifecycle and decommissioning procedures

Regulatory Considerations

  • Mapping EXO deployments to GDPR, HIPAA, and SOC 2 requirements
  • Maintaining data residency by keeping inference on-premise
  • Documenting vendor supply-chain risks (MLX, EXO, model weights)
  • Preparing for AI governance frameworks such as EU AI Act Article 53

Requirements

  • Experience with EXO or other local LLM runtimes
  • Understanding of Unix filesystem permissions and networking ACLs
  • Familiarity with TLS/SSL certificate management and encryption fundamentals

Audience

  • Security engineers
  • Compliance officers
  • AI infrastructure administrators managing sensitive data
 14 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories