Sensitive Data Transfer
Specification
Define, implement and evaluate processes, procedures and technical measures that ensure any transfer of personal or sensitive data is protected from unauthorized access and only processed within scope as permitted by the respective laws and regulations.
Threat coverage
Architectural relevance
Lifecycle
Resource provisioning, Team and expertise
Design, Guardrails
Evaluation, Validation/Red Teaming
Orchestration, AI Services supply chain
Operations, Maintenance, Continuous monitoring
Data deletion, Archiving
Ownership / SSRM
PI
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Model
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Orchestrated
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Application
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Implementation guidelines
Auditing guidelines
1. Examine the CSP’s procedures and technical requirements for securing and legally transferring personal and sensitive data. Establish that this process and key controls comply with the CSP’s data privacy and security policy. 2. Establish whether the CSP has documented the roles and responsibilities for this process. 3. Select a range of personal and sensitive data transfers to confirm that each transfer adhered to the CSP’s policy, procedures, and controls. Confirm that all relevant evidence was formally documented. 4. Verify that data transfers are protected from unauthorized access using encryption, secure communication channels, and access controls. 5. Verify compliance with relevant data protection laws (e.g., GDPR, CCPA) and organizational policies throughout the data transfer and processing activities. 6. Verify that regular assessments and audits are conducted to evaluate the effectiveness of data transfer and processing measures and identify potential risks. 7. Verify that all processes, procedures, and technical measures related to data transfer and processing are thoroughly documented and regularly updated to reflect changes in laws and regulations. 8. Obtain a sample of the technical measures implemented by the CSP to determine if those measures adhere to the CSP’s data privacy and security policy. 9. Determine how the CSP ensures that all third-party providers protect the transfer of personal or sensitive data. 10. Verify implementation of encryption protocols (e.g., TLS 1.2+) for all network paths that transfer sensitive data. 11. Assess technical measures enforcing geographical data residency requirements, including documentation of data storage locations. 12. Review access control mechanisms for infrastructure components that handle sensitive data transfers, verifying the principle of least privilege implementation. 13. Evaluate network monitoring capabilities for detecting unauthorized sensitive data transfers. 14. Verify implementation of secure API gateways and other transfer boundary protections. 15. Assess documentation and technical implementation of data transfer logging and monitoring for compliance verification.
Standards mappings
42001: A.2.2 AI Policy 42001: A.2.4. Review of AI Policy 42001: A.2.3 Alignment with other organizational policies 42001: A.7.3 Acquisition of data 27001: A.5.1 Policies for information security 27001: A.5.14 - Information transfer 27001: A.5.36 - Monitor Compliance 27001: A.5.37 Documented operating procedures 27001: A.7.10 - Storage media 27002: 5.1 Policies for information security 27002: 5.14 - Information transfer 27002: 5.37 Documented operating procedures 27002: 7.10 - Storage media
Addendum
N/A
Article 10 (2) (e) Article 23
Addendum
Data transfer is mentioned but specific technical protection measures for data transfer are missing.
MP-4.1-001 MP-4.1-009
Addendum
NIST AI 600-1 does not specifically mention the DSP-10 topic of the "transfer" of personal or sensitive data being protected from unauthorized use.
COS-08
Addendum
N/A
AI-CAIQ questions (1)
Are processes, procedures, and technical measures defined, implemented, and evaluated that ensure any transfer of personal or sensitive data is protected from unauthorized access and only processed within scope as permitted by the respective laws and regulations?