CSA AI Controls Matrix v1.0.3
AI security standard extending CSA CCM with 243 control objectives across 18 domains including the new Model Security (MDS) domain. Covers AI-specific risks including adversarial ML, training data governance, model integrity, and responsible AI. Used alongside CCM for cloud AI assessments.
| Clause | Title | SP 800-53 Controls |
|---|---|---|
| A&A-01 | Audit and Assurance Policy and Procedures | |
| A&A-02 | Independent Assessments | |
| A&A-03 | Risk Based Planning Assessment | |
| A&A-04 | Requirements Compliance | |
| A&A-05 | Audit Management Process | |
| A&A-06 | Remediation | |
| AIS-01 | Application and Interface Security Policy and Procedures | |
| AIS-02 | Application Security Baseline Requirements | |
| AIS-03 | Application Security Metrics | |
| AIS-04 | Secure Application Development Lifecycle | |
| AIS-05 | Application Security Testing | |
| AIS-06 | Secure Application Deployment | |
| AIS-07 | Application Vulnerability Remediation | |
| AIS-08 | Input Validation | |
| AIS-09 | Output Validation | |
| AIS-10 | API Security | |
| AIS-11 | Agents Security Boundaries | |
| AIS-12 | Source Code Managemement | |
| AIS-13 | AI Sandboxing | |
| AIS-14 | AI Cache Protection | |
| AIS-15 | Prompt Differentation | |
| BCR-01 | Business Continuity Management Policy and Procedures | |
| BCR-02 | Risk Assessment and Impact Analysis | |
| BCR-03 | Business Continuity Strategy | |
| BCR-04 | Business Continuity Planning | |
| BCR-05 | Documentation | |
| BCR-06 | Business Continuity Exercises | |
| BCR-07 | Communication | |
| BCR-08 | Backup | |
| BCR-09 | Disaster Response Plan | |
| BCR-10 | Response Plan Exercise | |
| BCR-11 | Equipment Redundancy | |
| CCC-01 | Change Management Policy and Procedures | |
| CCC-02 | Quality Testing | |
| CCC-03 | Change Management Technology | |
| CCC-04 | Change Authorization | |
| CCC-05 | Change Agreements | |
| CCC-06 | Change Management Baseline | |
| CCC-07 | Detection of Baseline Deviation | |
| CCC-08 | Exception Management | |
| CCC-09 | Change Restoration | |
| CEK-01 | Encryption and Key Management Policy and Procedures | |
| CEK-02 | CEK Roles and Responsibilities | |
| CEK-03 | Data Encryption | |
| CEK-04 | Encryption Algorithm | |
| CEK-05 | Encryption Change Management | |
| CEK-06 | Encryption Change Cost Benefit Analysis | |
| CEK-07 | Encryption Risk Management | |
| CEK-08 | Customer Key Management Capability | |
| CEK-09 | Encryption and Key Management Audit | |
| CEK-10 | Key Generation | |
| CEK-11 | Key Purpose | |
| CEK-12 | Key Rotation | |
| CEK-13 | Key Revocation | |
| CEK-14 | Key Destruction | |
| CEK-15 | Key Activation | |
| CEK-16 | Key Suspension | |
| CEK-17 | Key Deactivation | |
| CEK-18 | Key Archival | |
| CEK-19 | Key Compromise | |
| CEK-20 | Key Recovery | |
| CEK-21 | Key Inventory Management | |
| DCS-01 | Off-Site Equipment Disposal Policy and Procedures | |
| DCS-02 | Off-Site Transfer Authorization Policy and Procedures | |
| DCS-03 | Secure Area Policy and Procedures | |
| DCS-04 | Secure Media Transportation Policy and Procedures | |
| DCS-05 | Assets Classification | |
| DCS-06 | Assets Cataloguing and Tracking | |
| DCS-07 | Controlled Physical Access Points | |
| DCS-08 | Equipment Identification | |
| DCS-09 | Secure Area Authorization | |
| DCS-10 | Surveillance System | |
| DCS-11 | Adverse Event Response Training | |
| DCS-12 | Cabling Security | |
| DCS-13 | Environmental Systems | |
| DCS-14 | Secure Utilities | |
| DCS-15 | Equipment Location | |
| DSP-01 | Security and Privacy Policy and Procedures | |
| DSP-02 | Secure Disposal | |
| DSP-03 | Data Inventory | |
| DSP-04 | Data Classification | |
| DSP-05 | Data Flow Documentation | |
| DSP-06 | Data Ownership and Stewardship | |
| DSP-07 | Data Protection by Design and Default | |
| DSP-08 | Data Privacy by Design and Default | |
| DSP-09 | Data Protection Impact Assessment | |
| DSP-10 | Sensitive Data Transfer | |
| DSP-11 | Personal Data Access, Reversal, Rectification and Deletion | |
| DSP-12 | Limitation of Purpose in Personal Data Processing | |
| DSP-13 | Personal Data Sub-processing | |
| DSP-14 | Disclosure of Data Sub-processors | |
| DSP-15 | Limitation of Production Data Use | |
| DSP-16 | Data Retention and Deletion | |
| DSP-17 | Sensitive Data Protection | |
| DSP-18 | Disclosure Notification | |
| DSP-19 | Data Location | |
| DSP-20 | Data Provenance and Transparency | |
| DSP-21 | Data Poisoning Prevention & Detection | |
| DSP-22 | Privacy Enhancing Technologies | |
| DSP-23 | Data Integrity Check | |
| DSP-24 | Data Differentiation and Relevance | |
| GRC-01 | Governance Program Policy and Procedures | |
| GRC-02 | Risk Management Program | |
| GRC-03 | Organizational Policy Reviews | |
| GRC-04 | Policy Exception Process | |
| GRC-05 | Information Security Program | |
| GRC-06 | Governance Responsibility Model | |
| GRC-07 | Information System Regulatory Mapping | |
| GRC-08 | Special Interest Groups | |
| GRC-09 | Acceptable Use of the AI Service | |
| GRC-10 | AI Impact Assessment | |
| GRC-11 | Bias and Fairness Assessment | |
| GRC-12 | Ethics Committee | |
| GRC-13 | Explainability Requirement | |
| GRC-14 | Explainability Evaluation | |
| GRC-15 | Human supervision | |
| HRS-01 | Background Screening Policy and Procedures | |
| HRS-02 | Acceptable Use of Technology Policy and Procedures | |
| HRS-03 | Clean Desk Policy and Procedures | |
| HRS-04 | Remote and Home Working Policy and Procedures | |
| HRS-05 | Asset returns | |
| HRS-06 | Employment Termination | |
| HRS-07 | Employment Agreement Process | |
| HRS-08 | Employment Agreement Content | |
| HRS-09 | Personnel Roles and Responsibilities | |
| HRS-10 | Non-Disclosure Agreements | |
| HRS-11 | Security Awareness Training | |
| HRS-12 | Personal and Sensitive Data Awareness and Training | |
| HRS-13 | Compliance User Responsibility | |
| HRS-14 | AI Competency Training | |
| HRS-15 | AI Acceptable Use | |
| I&S-01 | Infrastructure and Virtualization Security Policy and Procedures | |
| I&S-02 | Capacity and Resource Planning | |
| I&S-03 | Network Security | |
| I&S-04 | OS Hardening and Base Controls | |
| I&S-05 | Production and Non-Production Environments | |
| I&S-06 | Segmentation and Segregation | |
| I&S-07 | Migration to Hosted Environments | |
| I&S-08 | Network Architecture Documentation | |
| I&S-09 | Network Defense | |
| IAM-01 | Identity and Access Management Policy and Procedures | |
| IAM-02 | Strong Password Policy and Procedures | |
| IAM-03 | Identity Inventory | |
| IAM-04 | Separation of Duties | |
| IAM-05 | Least Privilege | |
| IAM-06 | User Access Provisioning | |
| IAM-07 | User Access Changes and Revocation | |
| IAM-08 | User Access Review | |
| IAM-09 | Segregation of Privileged Access Roles | |
| IAM-10 | Management of Privileged Access Roles | |
| IAM-11 | Customers' Approval for Agreed Privileged Access Roles | |
| IAM-12 | Safeguard Logs Integrity | |
| IAM-13 | Uniquely Identifiable Users | |
| IAM-14 | Strong Authentication | |
| IAM-15 | Passwords and Secrets Management | |
| IAM-16 | Authorization Mechanisms | |
| IAM-17 | Knowledge Access Control - Need to Know | |
| IAM-18 | Output Modification and Special Authorization | |
| IAM-19 | Agent Access Restriction | |
| IPY-01 | Interoperability and Portability Policy and Procedures | |
| IPY-02 | Application Interface Availability | |
| IPY-03 | Secure Interoperability and Portability Management | |
| IPY-04 | Data Portability Contractual Obligations | |
| LOG-01 | Logging and Monitoring Policy and Procedures | |
| LOG-02 | Audit Logs Protection | |
| LOG-03 | Security Monitoring and Alerting | |
| LOG-04 | Audit Logs Access and Accountability | |
| LOG-05 | Audit Logs Monitoring and Response | |
| LOG-06 | Clock Synchronization | |
| LOG-07 | Logging Scope | |
| LOG-08 | Log Records | |
| LOG-09 | Log Protection | |
| LOG-10 | Encryption Monitoring and Reporting | |
| LOG-11 | Transaction/Activity Logging | |
| LOG-12 | Access Control Logs | |
| LOG-13 | Failures and Anomalies Reporting | |
| LOG-14 | Input Monitoring | |
| LOG-15 | Output Monitoring | |
| MDS-01 | Training Pipeline Security | |
| MDS-02 | Model Artifact Scanning | |
| MDS-03 | Model Documentation | |
| MDS-04 | Model Documentation Requirements | |
| MDS-05 | Model Documentation Validation | |
| MDS-06 | Adversarial Attack Analysis | |
| MDS-07 | Robustness against Adversarial Attack / Model Hardening | |
| MDS-08 | Model Integrity Checks | |
| MDS-09 | Model Signing/Ownership Verification | |
| MDS-10 | Model Continuous Monitoring | |
| MDS-11 | Model Failure | |
| MDS-12 | Open Model Risk Assessment | |
| MDS-13 | Secure Model Format | |
| SEF-01 | Security Incident Management Policy and Procedures | |
| SEF-02 | Service Management Policy and Procedures | |
| SEF-03 | Incident Response Plans | |
| SEF-04 | Incident Response Testing | |
| SEF-05 | Incident Response Metrics | |
| SEF-06 | Event Triage Processes | |
| SEF-07 | Security Breach Notification | |
| SEF-08 | Points of Contact Maintenance | |
| SEF-09 | Incident Response | |
| STA-01 | Supply Chain Risk Management Policies and Procedures | |
| STA-02 | SSRM Policy and Procedures | |
| STA-03 | SSRM Supply Chain | |
| STA-04 | SSRM Guidance | |
| STA-05 | SSRM Control Ownership | |
| STA-06 | SSRM Documentation Review | |
| STA-07 | SSRM Control Implementation | |
| STA-08 | Supply Chain Inventory | |
| STA-09 | Supply Chain Risk Management | |
| STA-10 | Primary Service and Contractual Agreement | |
| STA-11 | Supply Chain Agreement Review | |
| STA-12 | Supply Chain Compliance Assessment | |
| STA-13 | Supply Chain Service Agreement Compliance | |
| STA-14 | Supply Chain Governance Review | |
| STA-15 | Supply Chain Data Security Assessment | |
| STA-16 | Service Bill of Material (BOM) | |
| TVM-01 | Threat and Vulnerability Management Policy and Procedures | |
| TVM-02 | Malware and Malicious Instructions Protection Policy and Procedures | |
| TVM-03 | Vulnerability Identification | |
| TVM-04 | Detection Updates | |
| TVM-05 | External Library Vulnerabilities | |
| TVM-06 | Penetration Testing | |
| TVM-07 | Vulnerability Remediation Schedule | |
| TVM-08 | Vulnerability Prioritization | |
| TVM-09 | Vulnerability Management Reporting | |
| TVM-10 | Vulnerability Management Metrics | |
| TVM-11 | Guardrails | |
| TVM-12 | Threat Analysis and Modelling | |
| TVM-13 | Threat Response | |
| UEM-01 | Endpoint Devices Policy and Procedures | |
| UEM-02 | Application and Service Approval | |
| UEM-03 | Compatibility | |
| UEM-04 | Endpoint Inventory | |
| UEM-05 | Endpoint Management | |
| UEM-06 | Automatic Lock Screen | |
| UEM-07 | Operating Systems | |
| UEM-08 | Storage Encryption | |
| UEM-09 | Anti-Malware Detection and Prevention | |
| UEM-10 | Software Firewall | |
| UEM-11 | Data Loss Prevention | |
| UEM-12 | Remote Locate | |
| UEM-13 | Remote Wipe | |
| UEM-14 | Third-Party Endpoint Security Posture |