Security resource

RAG Security Audit Checklist - Multi-Tenant Retrieval Safety

Most RAG implementations ship with retrieval vulnerabilities-tenant data leakage, embedding inversion risks, and document poisoning vectors. This checklist covers the security controls we audit before launching RAG-powered features.

Pre-audit scope definition

Define what's in scope before auditing.

  • Document sources: file uploads, integrations, APIs, scrapers, user-generated content.
  • Vector store technology: pgvector, Pinecone, Weaviate, Qdrant, Chroma, or custom.
  • Embedding model: OpenAI, Cohere, local models-and where embeddings are computed.
  • Multi-tenant model: shared collection with metadata filtering, tenant-specific collections, or hybrid.
  • Retrieval flow: who can query, how results are filtered, what context reaches the LLM.

Vector database security

  • Tenant isolation: Metadata filtering applied BEFORE similarity search, not after.
  • Collection/namespace separation: High-sensitivity tenants in dedicated collections.
  • Access control: API keys scoped to tenant, not shared across the platform.
  • Encryption at rest: Vector data encrypted, not just source documents.
  • Backup isolation: Tenant data doesn't leak across backup boundaries.

Retrieval safety controls

  • Pre-retrieval filtering: tenant_id, access_level, classification enforced before vector search.
  • Result validation: Retrieved chunks validated against user permissions before LLM context.
  • Chunk metadata integrity: Metadata can't be spoofed or modified by uploaders.
  • Cross-tenant query testing: Adversarial queries attempting to retrieve other tenants' data.
  • Cache isolation: Retrieval caches keyed by tenant, not shared globally.

Document ingestion security

  • Source validation: Documents from trusted sources only, with provenance tracking.
  • Content scanning: Malware, hidden text, steganography detection before embedding.
  • Metadata sanitization: User-supplied metadata validated and escaped.
  • Poisoning detection: Anomaly detection for documents that contradict existing corpus.
  • Deletion propagation: Source document deletion removes all derived chunks and embeddings.

Embedding security

  • Inversion risk assessment: Can embeddings be reversed to reconstruct source text?
  • PII in embeddings: Sensitive data stripped before embedding, not just from display.
  • Model versioning: Re-embedding strategy when switching models.
  • Embedding API security: Rate limiting, authentication, tenant scoping on embedding endpoints.
  • Local vs. remote: Sensitive documents embedded locally, not sent to third-party APIs.

Multi-tenant RAG controls

  • Row-Level Security: RLS policies on vector tables enforcing tenant_id at database level.
  • Middleware enforcement: tenant_id injected from authenticated session, never from user input.
  • Query logging: All retrieval queries logged with tenant, user, query, and results.
  • Noisy neighbor protection: Per-tenant rate limits and resource quotas.
  • Tenant offboarding: Complete data deletion including embeddings, chunks, and logs.

Prompt injection via RAG

  • Indirect injection testing: Upload documents with hidden instructions, verify they don't execute.
  • Context isolation: Retrieved content clearly delimited from system instructions.
  • Citation validation: LLM responses cite actual retrieved chunks, not hallucinated sources.
  • Output filtering: Responses checked for PII, credentials, or system prompt leakage.
  • Retrieval limiting: Cap on retrieved chunks prevents context flooding attacks.

Monitoring & observability

  • Retrieval telemetry: Query latency, result count, similarity scores logged per request.
  • Anomaly detection: Alerts on unusual query patterns, cross-tenant access attempts.
  • Cost tracking: Embedding and retrieval costs attributed to tenants.
  • Audit trail: Who queried what, when, and what was returned-immutable logs.
  • Drift detection: Retrieval quality degradation alerts (precision/recall metrics).

Compliance & evidence

  • Data residency: Vector stores and embeddings comply with geographic requirements.
  • Retention policies: Embeddings and chunks follow same retention as source documents.
  • Right to deletion: GDPR/CCPA deletion requests propagate to all derived data.
  • Third-party risk: Embedding API providers assessed for security and compliance.
  • Penetration test evidence: RAG-specific test cases documented with findings.

Download the RAG security workbook

Get the editable PDF/Notion version with severity scoring, owner assignments, and evidence templates.

Ungated content above. Email optional for template. No spam.

Related resources

Need help auditing your RAG system?

We build RAG systems and audit them for security. If you want a senior engineer to run this checklist against your implementation and deliver remediation guidance, let's talk.

FAQ

What is this for?

Teams launching RAG-powered features who need to audit retrieval security, tenant isolation, and data pipeline safety before production or enterprise deals.

FAQ

Do I need to hire you to use it?

No. It's ungated so your internal teams can execute. Work with us if you want a senior engineer to run the audit and deliver remediation.

FAQ

How is this different from the AI Security Checklist?

This checklist focuses specifically on RAG systems-vector stores, retrieval pipelines, embedding security, and document ingestion. The AI Security Checklist covers broader platform security.