Security is where federal AI projects die. Not in the model, not in the pipeline — in the control mapping, the SSP, and the assessor's questions about non-determinism and data lineage. The posts below are the ones we send to teams who just got a preliminary IATT and realized the auditor doesn't know what a token is.
Read them in order: NIST 800-53 gives you the control language, the prompt-injection post gives you the threat model, and the ATO playbook gives you the sequencing that turns six months into ten weeks.