Security# Security Guidelines The Golden Rule Assumed Interaction Model Specific Guidelines Adversarial testing Conclusion Red Teaming Overview Challenges Rating Recording the results