← Frameworks / AI Security

CSA AI Controls Matrix v1.0.3

AI security standard extending CSA CCM with 243 control objectives across 18 domains including the new Model Security (MDS) domain. Covers AI-specific risks including adversarial ML, training data governance, model integrity, and responsible AI. Used alongside CCM for cloud AI assessments.

Clause Title SP 800-53 Controls
A&A-01 Audit and Assurance Policy and Procedures
A&A-02 Independent Assessments
A&A-03 Risk Based Planning Assessment
A&A-04 Requirements Compliance
A&A-05 Audit Management Process
A&A-06 Remediation
AIS-01 Application and Interface Security Policy and Procedures
AIS-02 Application Security Baseline Requirements
AIS-03 Application Security Metrics
AIS-04 Secure Application Development Lifecycle
AIS-05 Application Security Testing
AIS-06 Secure Application Deployment
AIS-07 Application Vulnerability Remediation
AIS-08 Input Validation
AIS-09 Output Validation
AIS-10 API Security
AIS-11 Agents Security Boundaries
AIS-12 Source Code Managemement
AIS-13 AI Sandboxing
AIS-14 AI Cache Protection
AIS-15 Prompt Differentation
BCR-01 Business Continuity Management Policy and Procedures
BCR-02 Risk Assessment and Impact Analysis
BCR-03 Business Continuity Strategy
BCR-04 Business Continuity Planning
BCR-05 Documentation
BCR-06 Business Continuity Exercises
BCR-07 Communication
BCR-08 Backup
BCR-09 Disaster Response Plan
BCR-10 Response Plan Exercise
BCR-11 Equipment Redundancy
CCC-01 Change Management Policy and Procedures
CCC-02 Quality Testing
CCC-03 Change Management Technology
CCC-04 Change Authorization
CCC-05 Change Agreements
CCC-06 Change Management Baseline
CCC-07 Detection of Baseline Deviation
CCC-08 Exception Management
CCC-09 Change Restoration
CEK-01 Encryption and Key Management Policy and Procedures
CEK-02 CEK Roles and Responsibilities
CEK-03 Data Encryption
CEK-04 Encryption Algorithm
CEK-05 Encryption Change Management
CEK-06 Encryption Change Cost Benefit Analysis
CEK-07 Encryption Risk Management
CEK-08 Customer Key Management Capability
CEK-09 Encryption and Key Management Audit
CEK-10 Key Generation
CEK-11 Key Purpose
CEK-12 Key Rotation
CEK-13 Key Revocation
CEK-14 Key Destruction
CEK-15 Key Activation
CEK-16 Key Suspension
CEK-17 Key Deactivation
CEK-18 Key Archival
CEK-19 Key Compromise
CEK-20 Key Recovery
CEK-21 Key Inventory Management
DCS-01 Off-Site Equipment Disposal Policy and Procedures
DCS-02 Off-Site Transfer Authorization Policy and Procedures
DCS-03 Secure Area Policy and Procedures
DCS-04 Secure Media Transportation Policy and Procedures
DCS-05 Assets Classification
DCS-06 Assets Cataloguing and Tracking
DCS-07 Controlled Physical Access Points
DCS-08 Equipment Identification
DCS-09 Secure Area Authorization
DCS-10 Surveillance System
DCS-11 Adverse Event Response Training
DCS-12 Cabling Security
DCS-13 Environmental Systems
DCS-14 Secure Utilities
DCS-15 Equipment Location
DSP-01 Security and Privacy Policy and Procedures
DSP-02 Secure Disposal
DSP-03 Data Inventory
DSP-04 Data Classification
DSP-05 Data Flow Documentation
DSP-06 Data Ownership and Stewardship
DSP-07 Data Protection by Design and Default
DSP-08 Data Privacy by Design and Default
DSP-09 Data Protection Impact Assessment
DSP-10 Sensitive Data Transfer
DSP-11 Personal Data Access, Reversal, Rectification and Deletion
DSP-12 Limitation of Purpose in Personal Data Processing
DSP-13 Personal Data Sub-processing
DSP-14 Disclosure of Data Sub-processors
DSP-15 Limitation of Production Data Use
DSP-16 Data Retention and Deletion
DSP-17 Sensitive Data Protection
DSP-18 Disclosure Notification
DSP-19 Data Location
DSP-20 Data Provenance and Transparency
DSP-21 Data Poisoning Prevention & Detection
DSP-22 Privacy Enhancing Technologies
DSP-23 Data Integrity Check
DSP-24 Data Differentiation and Relevance
GRC-01 Governance Program Policy and Procedures
GRC-02 Risk Management Program
GRC-03 Organizational Policy Reviews
GRC-04 Policy Exception Process
GRC-05 Information Security Program
GRC-06 Governance Responsibility Model
GRC-07 Information System Regulatory Mapping
GRC-08 Special Interest Groups
GRC-09 Acceptable Use of the AI Service
GRC-10 AI Impact Assessment
GRC-11 Bias and Fairness Assessment
GRC-12 Ethics Committee
GRC-13 Explainability Requirement
GRC-14 Explainability Evaluation
GRC-15 Human supervision
HRS-01 Background Screening Policy and Procedures
HRS-02 Acceptable Use of Technology Policy and Procedures
HRS-03 Clean Desk Policy and Procedures
HRS-04 Remote and Home Working Policy and Procedures
HRS-05 Asset returns
HRS-06 Employment Termination
HRS-07 Employment Agreement Process
HRS-08 Employment Agreement Content
HRS-09 Personnel Roles and Responsibilities
HRS-10 Non-Disclosure Agreements
HRS-11 Security Awareness Training
HRS-12 Personal and Sensitive Data Awareness and Training
HRS-13 Compliance User Responsibility
HRS-14 AI Competency Training
HRS-15 AI Acceptable Use
I&S-01 Infrastructure and Virtualization Security Policy and Procedures
I&S-02 Capacity and Resource Planning
I&S-03 Network Security
I&S-04 OS Hardening and Base Controls
I&S-05 Production and Non-Production Environments
I&S-06 Segmentation and Segregation
I&S-07 Migration to Hosted Environments
I&S-08 Network Architecture Documentation
I&S-09 Network Defense
IAM-01 Identity and Access Management Policy and Procedures
IAM-02 Strong Password Policy and Procedures
IAM-03 Identity Inventory
IAM-04 Separation of Duties
IAM-05 Least Privilege
IAM-06 User Access Provisioning
IAM-07 User Access Changes and Revocation
IAM-08 User Access Review
IAM-09 Segregation of Privileged Access Roles
IAM-10 Management of Privileged Access Roles
IAM-11 Customers' Approval for Agreed Privileged Access Roles
IAM-12 Safeguard Logs Integrity
IAM-13 Uniquely Identifiable Users
IAM-14 Strong Authentication
IAM-15 Passwords and Secrets Management
IAM-16 Authorization Mechanisms
IAM-17 Knowledge Access Control - Need to Know
IAM-18 Output Modification and Special Authorization
IAM-19 Agent Access Restriction
IPY-01 Interoperability and Portability Policy and Procedures
IPY-02 Application Interface Availability
IPY-03 Secure Interoperability and Portability Management
IPY-04 Data Portability Contractual Obligations
LOG-01 Logging and Monitoring Policy and Procedures
LOG-02 Audit Logs Protection
LOG-03 Security Monitoring and Alerting
LOG-04 Audit Logs Access and Accountability
LOG-05 Audit Logs Monitoring and Response
LOG-06 Clock Synchronization
LOG-07 Logging Scope
LOG-08 Log Records
LOG-09 Log Protection
LOG-10 Encryption Monitoring and Reporting
LOG-11 Transaction/Activity Logging
LOG-12 Access Control Logs
LOG-13 Failures and Anomalies Reporting
LOG-14 Input Monitoring
LOG-15 Output Monitoring
MDS-01 Training Pipeline Security
MDS-02 Model Artifact Scanning
MDS-03 Model Documentation
MDS-04 Model Documentation Requirements
MDS-05 Model Documentation Validation
MDS-06 Adversarial Attack Analysis
MDS-07 Robustness against Adversarial Attack / Model Hardening
MDS-08 Model Integrity Checks
MDS-09 Model Signing/Ownership Verification
MDS-10 Model Continuous Monitoring
MDS-11 Model Failure
MDS-12 Open Model Risk Assessment
MDS-13 Secure Model Format
SEF-01 Security Incident Management Policy and Procedures
SEF-02 Service Management Policy and Procedures
SEF-03 Incident Response Plans
SEF-04 Incident Response Testing
SEF-05 Incident Response Metrics
SEF-06 Event Triage Processes
SEF-07 Security Breach Notification
SEF-08 Points of Contact Maintenance
SEF-09 Incident Response
STA-01 Supply Chain Risk Management Policies and Procedures
STA-02 SSRM Policy and Procedures
STA-03 SSRM Supply Chain
STA-04 SSRM Guidance
STA-05 SSRM Control Ownership
STA-06 SSRM Documentation Review
STA-07 SSRM Control Implementation
STA-08 Supply Chain Inventory
STA-09 Supply Chain Risk Management
STA-10 Primary Service and Contractual Agreement
STA-11 Supply Chain Agreement Review
STA-12 Supply Chain Compliance Assessment
STA-13 Supply Chain Service Agreement Compliance
STA-14 Supply Chain Governance Review
STA-15 Supply Chain Data Security Assessment
STA-16 Service Bill of Material (BOM)
TVM-01 Threat and Vulnerability Management Policy and Procedures
TVM-02 Malware and Malicious Instructions Protection Policy and Procedures
TVM-03 Vulnerability Identification
TVM-04 Detection Updates
TVM-05 External Library Vulnerabilities
TVM-06 Penetration Testing
TVM-07 Vulnerability Remediation Schedule
TVM-08 Vulnerability Prioritization
TVM-09 Vulnerability Management Reporting
TVM-10 Vulnerability Management Metrics
TVM-11 Guardrails
TVM-12 Threat Analysis and Modelling
TVM-13 Threat Response
UEM-01 Endpoint Devices Policy and Procedures
UEM-02 Application and Service Approval
UEM-03 Compatibility
UEM-04 Endpoint Inventory
UEM-05 Endpoint Management
UEM-06 Automatic Lock Screen
UEM-07 Operating Systems
UEM-08 Storage Encryption
UEM-09 Anti-Malware Detection and Prevention
UEM-10 Software Firewall
UEM-11 Data Loss Prevention
UEM-12 Remote Locate
UEM-13 Remote Wipe
UEM-14 Third-Party Endpoint Security Posture