AICM AtlasCSA AI Controls Matrix
DSP · Data Security and Privacy Lifecycle Management
DSP-14Cloud & AI Related

Disclosure of Data Sub-processors

Specification

Define, implement and evaluate processes, procedures and technical measures to disclose the details of any personal or sensitive data access by sub-processors to the data owner prior to initiation of that processing.

Threat coverage

Model manipulation
Data poisoning
Sensitive data disclosure
Model theft
Model/Service Failure
Insecure supply chain
Insecure apps/plugins
Denial of Service
Loss of governance

Architectural relevance

Physical infrastructure
Network
Compute
Storage
Application
Data

Lifecycle

Preparation

Resource provisioning, Team and expertise

Development

Design, Guardrails

Evaluation

Evaluation, Validation/Red Teaming

Deployment

Orchestration, AI Services supply chain

Delivery

Operations, Maintenance, Continuous monitoring

Retirement

Data deletion

Ownership / SSRM

PI

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Model

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Orchestrated

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Application

Owned by the Customer (AIC)

The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.

Implementation guidelines

[All Actors]
1. Disclose to data owners or customers every sub-processor that will access personal or sensitive data before processing begins, and promptly update the disclosure when a sub-processor is added, removed, or changes scope.

2. Maintain detailed logs or registers of all sub-processor engagements - including purpose, data categories accessed, approval / consent status, and effective dates - for audit or regulatory review.

3. Provide mechanisms to obtain, record, and honour explicit consent or approval (e-g., in-app settings, contract clauses, service-catalog workflows) wherever law or contract demands it.

4. Share relevant privacy-and-security documentation for each sub-processor (DPIAs, technical controls, certifications, access protocols) with customers, regulators, or internal stakeholders on request.

5. Perform risk-based due-diligence and embed contractual clauses that bind sub-processors to the same data-protection and disclosure obligations the actor has accepted.

[Shared among: MP, OSP, CSP]
1. Implement telemetry and visibility tooling (dashboards, access logs) to track real-time data-access events by sub-processors across model-training, orchestration, or infrastructure layers the actor operates, and surface those records for audit.

Auditing guidelines

1. Policies, Roles and Contracts: Examine the CSP’s documented policies, procedures, and contractual requirements requiring sub-processors to disclose access to PII before processing begins; identify and address any areas where contractual controls are insufficient, and ensure appropriate risk mitigation is in place; verify that roles and responsibilities for managing disclosures and approvals are defined and documented; review contracts with sub-processors and customers to ensure they mandate equivalent privacy and security standards; and include disclosure of subcontractors, and enforce data minimization (only necessary PII shared).

2. Sample-Based Validation: Select a sample of data transfers to sub-processors and validate that disclosures were made before processing and controls and reporting comply with CSP’s policies.

3. Disclosure Records and Record-Keeping: Verify that the CSP maintains complete records of all sub-processor disclosures, including: what was disclosed, when, to whom, the authority/legal basis, and confirm that these records are maintained and auditable throughout the service lifecycle.

4. Customer Notification and Legal Requests: Confirm the CSP has documented processes to notify customers of any legally binding disclosure requests, reject non-legally binding requests unless customers consent, ensure timely notification in compliance with contractual and legal obligations, and notify customers of any changes to sub-processors that may affect PII processing.

5. Sub-processor Management and Infrastructure Transparency: Review the CSP’s documentation and disclosures regarding their infrastructure sub-processors who may access PII through provided services, Verify that agreements and communications with customers make transparent how the CSP’s infrastructure and sub-processors handle PII.

6. Customer Transparency Mechanisms: Assess whether the CSP has implemented technical capabilities (e.g., logging, monitoring, dashboards) to enable customers to track data access and flows, meet their own sub-processor disclosure obligations, and review customer-facing documentation explaining how the CSP’s infrastructure supports transparency and disclosure requirements.

Standards mappings

ISO 42001No Gap
42001: A.10.3 Suppliers
42001: A.2.3 Alignment with other organizational policies
27001: A.5.20 - Addressing information security within supplier agreement
27001: A.5.21 Managing information security in the information and communication technology (ICT) supply chain
27002: 5.20 - Addressing information security within supplier agreement
27002: 5.21 Managing information security in the information and communication technology (ICT) supply chain
Addendum

N/A

EU AI ActPartial Gap
Article 23
Article 24
Article 25
Article 28
Addendum

While EU AI Act covers supply chain responsibilities and transparency, specific timing requirement for "prior to initiation" is missing.

NIST AI 600-1Full Gap
No Mapping
Addendum

NIST AI 600-1 does not cover DSP-14 topics of "prior to initiation of that processing."

BSI AIC4Partial Gap
SSO-01
SSO-02
BC-06
Addendum

For such topics, there is the GDPR in the EU. The GDPR is translated to local regulations for every country in the EU. This is an explicit target of GDPR.

AI-CAIQ questions (1)

DSP-14.1

Are processes, procedures, and technical measures defined, implemented, and evaluated to disclose the details of any personal or sensitive data access by sub-processors to the data owner before initiating that processing?