Gen AI systems are gullible, and can easily be tricked into responding in ways that are contrary to an enterprise's policies or leak confidential information. Bharani Subramaniam and I describe how we can counter this by adding guardrails at the boundaries of the request/response flow. We also conclude our discussion of RAG with an overview of how all the RAG component patterns fit together.