Encryption Algorithm
Specification
Utilize encryption algorithms following industry standards for protecting data, based on the data classification and associated risks.
Threat coverage
Architectural relevance
Lifecycle
Data collection, Data curation, Data storage
Training
Evaluation, Validation/Red Teaming, Re-evaluation
Orchestration, AI Services supply chain, AI applications
Operations, Maintenance, Continuous monitoring, Continuous improvement
Archiving, Data deletion
Ownership / SSRM
PI
Shared Cloud Service Provider-Model Provider (Shared CSP-MP)
The CSP and MP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Model
Shared Cloud Service Provider-Model Provider (Shared CSP-MP)
The CSP and MP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Orchestrated
Shared Orchestrated Service Provider-Application Provider (Shared OSP-AP)
The OSP and AP are jointly responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer.
Application
Owned by the Application Provider (AP)
The Application Provider (AP) is responsible for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies in the context of the services or products they develop and offer. The AP is responsible and accountable for the implementation of the control within its own infrastructure/environment. If the control has downstream implications on the users/customers, the AP is responsible for enabling the customer and/or upstream partner in the implementation/configuration of the control within their risk management approach. The AP is accountable for carrying out the due diligence on its upstream providers (e.g MPs, Orchestrated Services) to verify that they implement the control as it relates to the service/product develop and offered by the AP. These providers build and offer end-user applications that leverage generative AI models for specific tasks such as content creation, chatbots, code generation, and enterprise automation. These applications are often delivered as software-as-a-service (SaaS) solutions. These providers focus on user interfaces, application logic, domain-specific functionality, and overall user experience rather than underlying model development. Example: OpenAI (GPTs,Assistants), Zapier, CustomGPT, Microsoft Copilot (integrated into Office products), Jasper (AI-driven content generation), Notion AI (AI-enhanced productivity tools), Adobe Firefly (AI-generated media), and AI-powered customer service solutions like Amazon Rufus, as well as any organization that develops its AI-based application internally.
Implementation guidelines
Auditing guidelines
1. Verify that the CSP maintains a documented standard for approved encryption algorithms aligned with data classification levels (e.g., confidential, regulated, sensitive) and global cryptographic standards (e.g., NIST, ISO, ENISA). 2. Confirm that algorithms used for encryption at rest and in transit (e.g., AES-256, RSA-2048, TLS 1.3) are certified or validated, and confirm that they are mapped to specific service tiers, storage types, and transmission protocols. 3. Review whether algorithm effectiveness is periodically reassessed to address known vulnerabilities, cryptographic deprecation (e.g., SHA-1), or regulatory changes, and confirm that retirement or replacement procedures are documented. 4. Validate that algorithm selection accounts for operational considerations including latency, performance, and compatibility across CSP service offerings (e.g., storage, compute, network encryption layers). 5. Confirm that algorithm usage is consistently enforced across all service layers, including encryption of control plane communications, customer data, metadata, and backup services. 6. Verify that encryption algorithms are tightly integrated with the CSP’s key management infrastructure (e.g., KMS, HSM), and that usage policies enforce isolation, access boundaries, and proper key pairing. 7. Review whether encryption algorithm use is governed through approval processes involving cryptography or platform security teams, with documentation of review cycles and escalation paths. 8. Confirm that third-party components embedded in the CSP infrastructure (e.g., firmware, load balancers, backup appliances) use encryption algorithms that comply with CSP standards and undergo regular security vetting. 9. Validate that algorithm issues identified through internal audits, penetration tests, customer escalations, or regulatory assessments are tracked and addressed within the algorithm lifecycle governance process. 10. Verify that the CSP supports downstream encryption compatibility by publishing supported algorithm suites and offering configuration options (e.g., customer-defined cipher suites), while maintaining interoperability with upstream libraries or dependencies. From CCM: 1. Identify the encryption algorithms in use. 2. Confirm that identified encryption algorithms have been reviewed and approved by appropriate management. 3. Confirm that the encryption algorithm approval process includes assessment of the appropriateness of the algorithm for the data it is protecting, any associated risks, and the algorithm's usability.
Standards mappings
No Mapping for ISO 42001 ISO 27001:2022 A.8.24 ISO 27002:2022 A.8.24
Addendum
Add a control requiring AI systems to use encryption algorithms tailored to data protection, explicitly considering data classification, associated risks, and usability of the technology, with guidance on risk-based selection and periodic review, enhancing ISO 27001 (A.8.24) and ISO 27002 (8.24) alignment for AI-specific needs.
Recital 69, page 20/144
Addendum
N/A
No Mapping
Addendum
No (implicit/explicit) reference to cryptography, encryption, or key management is made in the NIST AI 600-1 standard, let alone to the use of encryption algorithms to ensure data protection.
CRY-01 CRY-02 CRY-03 COS-08
Addendum
C5 does not require to consider data protection requirements, but requires "strong encryption"
AI-CAIQ questions (1)
Are encryption algorithms utilized following industry standards for protecting data, based on the data classification and associated risks?