Further reading
To learn more about the topics that were covered in this chapter, take a look at the following resources:
- [1] NIST definition of DiD: https://csrc.nist.gov/glossary/term/defense_in_depth
- [2] Constitutional AI from Anthropic: https://arxiv.org/abs/2212.08073
- [3] Wikipedia – HSMs: https://en.wikipedia.org/wiki/Hardware_security_module
- [4] Wikipedia – TPM: https://en.wikipedia.org/wiki/Trusted_Platform_Module
- [5] NIST reference monitor: https://csrc.nist.gov/glossary/term/reference_monitor
- [6] Secure Software Development Framework: https://csrc.nist.gov/projects/ssdf
- [7] GDPR: https://gdpr-info.eu/
- [8] Health and Human Services: https://www.hhs.gov/hipaa/index.html
- [9] PCI Standards: https://www.pcisecuritystandards.org/
- [10] NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- [11] SOX compliance: https://en.wikipedia.org/wiki/Sarbanes%E2%80%93Oxley_Act
- [12] EO 14028: https://www.whitehouse...