Disclosure of Data Sub-processors
Specification
Define, implement and evaluate processes, procedures and technical measures to disclose the details of any personal or sensitive data access by sub-processors to the data owner prior to initiation of that processing.
Threat coverage
Architectural relevance
Lifecycle
Resource provisioning, Team and expertise
Design, Guardrails
Evaluation, Validation/Red Teaming
Orchestration, AI Services supply chain
Operations, Maintenance, Continuous monitoring
Data deletion
Ownership / SSRM
PI
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Model
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Orchestrated
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Application
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Implementation guidelines
Auditing guidelines
1. Policies, Roles and Contracts: Examine the CSP’s documented policies, procedures, and contractual requirements requiring sub-processors to disclose access to PII before processing begins; identify and address any areas where contractual controls are insufficient, and ensure appropriate risk mitigation is in place; verify that roles and responsibilities for managing disclosures and approvals are defined and documented; review contracts with sub-processors and customers to ensure they mandate equivalent privacy and security standards; and include disclosure of subcontractors, and enforce data minimization (only necessary PII shared). 2. Sample-Based Validation: Select a sample of data transfers to sub-processors and validate that disclosures were made before processing and controls and reporting comply with CSP’s policies. 3. Disclosure Records and Record-Keeping: Verify that the CSP maintains complete records of all sub-processor disclosures, including: what was disclosed, when, to whom, the authority/legal basis, and confirm that these records are maintained and auditable throughout the service lifecycle. 4. Customer Notification and Legal Requests: Confirm the CSP has documented processes to notify customers of any legally binding disclosure requests, reject non-legally binding requests unless customers consent, ensure timely notification in compliance with contractual and legal obligations, and notify customers of any changes to sub-processors that may affect PII processing. 5. Sub-processor Management and Infrastructure Transparency: Review the CSP’s documentation and disclosures regarding their infrastructure sub-processors who may access PII through provided services, Verify that agreements and communications with customers make transparent how the CSP’s infrastructure and sub-processors handle PII. 6. Customer Transparency Mechanisms: Assess whether the CSP has implemented technical capabilities (e.g., logging, monitoring, dashboards) to enable customers to track data access and flows, meet their own sub-processor disclosure obligations, and review customer-facing documentation explaining how the CSP’s infrastructure supports transparency and disclosure requirements.
Standards mappings
42001: A.10.3 Suppliers 42001: A.2.3 Alignment with other organizational policies 27001: A.5.20 - Addressing information security within supplier agreement 27001: A.5.21 Managing information security in the information and communication technology (ICT) supply chain 27002: 5.20 - Addressing information security within supplier agreement 27002: 5.21 Managing information security in the information and communication technology (ICT) supply chain
Addendum
N/A
Article 23 Article 24 Article 25 Article 28
Addendum
While EU AI Act covers supply chain responsibilities and transparency, specific timing requirement for "prior to initiation" is missing.
No Mapping
Addendum
NIST AI 600-1 does not cover DSP-14 topics of "prior to initiation of that processing."
SSO-01 SSO-02 BC-06
Addendum
For such topics, there is the GDPR in the EU. The GDPR is translated to local regulations for every country in the EU. This is an explicit target of GDPR.
AI-CAIQ questions (1)
Are processes, procedures, and technical measures defined, implemented, and evaluated to disclose the details of any personal or sensitive data access by sub-processors to the data owner before initiating that processing?