Training data pipeline security assessment - Model provenance verification - Dependency analysis (ML frameworks, libraries) - CI/CD pipeline security for model training and deployment