I recommend following the specifications of zero-trust infrastructure, least privilege, and last need to know for the security architecture of this kind of cluster. In brief, these three guidelines mean that access verification is required at all times, only minimal authorizations are assigned, and people only see what they are supposed to see.
The analysis algorithms used within the cluster (generally shallow learning, or deep learning in the case of generative AI) can be designed outside the clusters by developers and then transferred over on a regulated basis. Adjustments in the ML/AI algorithms serve to improve data interpretation and generate more accurate results: Setting the information in the right context is the big challenge with artificial intelligence.
I believe this approach, and modified, advanced architecture concepts can be used to harness the added value of AI for everyone. I also see this as a big opportunity for companies, prompting a rethink and reconceptualization of IT infrastructure for greater security and to prepare for future challenges even as the value added by AI is unlocked for employees. This means information security is not just present in the background, but also a tangible part of the company’s development. And I think that’s a wonderful idea.