AICM AtlasCSA AI Controls Matrix
DSP · Data Security and Privacy Lifecycle Management
DSP-09Cloud & AI Related

Data Protection Impact Assessment

Specification

Conduct a Data Protection Impact Assessment (DPIA) to evaluate the origin, nature, particularity and severity of the risks upon the processing of personal data, according to any applicable laws, regulations and industry best practices.

Threat coverage

Model manipulation
Data poisoning
Sensitive data disclosure
Model theft
Model/Service Failure
Insecure supply chain
Insecure apps/plugins
Denial of Service
Loss of governance

Architectural relevance

Physical infrastructure
Network
Compute
Storage
Application
Data

Lifecycle

Preparation

Data collection, Data curation, Team and expertise

Development

Design, Guardrails

Evaluation

Evaluation, Validation/Red Teaming

Deployment

Orchestration, AI Services supply chain

Delivery

Operations, Maintenance, Continuous monitoring

Retirement

Data deletion, Archiving

Ownership / SSRM

PI

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Model

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Orchestrated

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Application

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Implementation guidelines

[All Actors]
1. Conduct a Data-Protection Impact Assessment (DPIA) for every personal-data processing activity the actor controls, evaluating likelihood and severity of risks such as bias, re-identification, unauthorized access, or adversarial misuse.

2. Document the processing purpose, data flows, lawful basis, risk findings and mitigation measures, and retain the DPIA report for audit or regulatory review.

3. Review and update the DPIA at least annually or whenever a material change occurs (new data source, new model version, new recipient, major scale-up, etc.).

4. Verify that processing remains compliant with applicable laws and standards (e.g., GDPR, CCPA, ISO 27701, HIPAA) and record evidence of that verification.

[Shared among: AP, AIC, OSP]
1. Provide user-facing transparency (notices, dashboards) and consent or opt-out mechanisms whenever the DPIA identifies heightened impact on data subjects, and propagate those choices through downstream services.

Auditing guidelines

1. Examine procedures related to DPIA risk assessment and determine whether, once a requirement has been established, the CSP identifies and grades the associated risks, reports, and prioritizes the remediation of risks and non-compliance activities. 

2. Examine whether the DPIA process and templates align with the CSP’s risk methodology and taxonomy.

3. Determine if the risks' origin, nature, particularity, and severity are evaluated according to the applicable laws, regulations, and industry best practices for the CSP.

4. Establish whether the CSP has documented the roles and responsibilities for this process.

5. Select a sample of DPIAs and examine evidence to confirm that each assessment was performed to identify associated risks. Further, verify that any action plans were determined and carried out appropriately. Confirm that all relevant evidence was formally documented.

6. Verify that AI systems used in PII processing are included in the DPIA evaluation process.

7. Verify identification and assessment of risks specific to AI systems, such as bias, transparency, and accountability.

8. Verify that the DPIA includes evaluating profiling based on AI systems' data.

9. Verify that records inform the DPIA process for AI systems and are kept up-to-date.

10. Determine if the DPIA includes third-party providers and how identified risks are remediated.

11. Verify that the CSP has procedures to provide information regarding data storage locations, cross-border data flows, and infrastructure security controls when requested by customers conducting DPIAs. 

3. Assess if the CSP offers documentation on technical measures implemented at the infrastructure level to support customers' DPIA requirements. 

4. Review whether the CSP has a process to notify customers of significant infrastructure changes that might affect existing DPIAs.

Standards mappings

ISO 42001No Gap
42001: A.2.3 Alignment with other organizational policies
42001: A.5.2 AI system impact assessment process
42001: A.5.3 Documentation of AI system impact assessments
42001: A.5.4 Assessing AI system impact on individuals or groups of individuals
42001: A.7.5 Data Provenance
27001: 6.1.1 General - Planning
27001: 8.2 - Information security risk assessment
27001: 8.3 - Information security risk treatment
27001: A.5.34 - Privacy and protection of personal identifiable information (PII)
27002: 5.34 - Privacy and protection of personal identifiable information (PII)
Addendum

N/A

EU AI ActNo Gap
Article 9
Article 27
Addendum

N/A

NIST AI 600-1Full Gap
No Mapping
Addendum

Include need for performing a Data Protection Impact Assessment (DPIA).

BSI AIC4No Gap
BC-06
Addendum

N/A

AI-CAIQ questions (1)

DSP-09.1

Are Data Protection Impact Assessments (DPIAs) conducted to evaluate the origin, nature, particularity, and severity of the risks upon the processing of personal data, according to any applicable laws, regulations, and industry best practices?