Sensitive Data Protection
Specification
Define and implement, processes, procedures and technical measures to protect sensitive data throughout its lifecycle.
Threat coverage
Architectural relevance
Lifecycle
Data collection, Data storage
Design, Guardrails
Evaluation, Validation/Red Teaming
Orchestration, AI Services supply chain
Operations, Maintenance, Continuous monitoring
Data deletion, Archiving
Ownership / SSRM
PI
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Model
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Orchestrated
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Application
Owned by the Customer (AIC)
The Customer (AIC) is responsible and accountable for the design, development, implementation, and enforcement of the control to mitigate security, privacy, or compliance risks associated with Large Language Model (LLM)/GenAI technologies services or products they consume.
Implementation guidelines
Auditing guidelines
1. Verify whether infrastructure policies and procedures include data privacy guidelines for managing sensitive data processed by AI workloads hosted or supported by the infrastructure. 2. Verify whether roles and responsibilities are defined for maintaining privacy and security controls across infrastructure components supporting AI systems (e.g., data storage, pipeline management). 3. Verify that sensitive data classification is integrated into service offerings; confirm isolation, access control, and encryption standards; validate compliance with customer and regulatory privacy requirements; interview technical and compliance staff; and confirm documentation is up to date. 4. Verify that the infrastructure includes mechanisms to safeguard sensitive data across its lifecycle—from data ingestion to runtime processing in AI pipelines. 5. Verify whether any infrastructure-related data privacy incidents involving hosted AI workloads were investigated, with evidence of corrective actions and customer communication. 6. Verify that risk management strategies include technical safeguards (e.g., secure compute environments, encryption at rest/in transit) to protect customer data and prevent misuse. 7. Verify that incident response plans for AI infrastructure cover customer data privacy breaches, including clear escalation, notification, and remediation workflows.
Standards mappings
42001: A.4.3 Data Resources 42001: A.5.4 Assessing AI system impact on individuals or groups of individuals 42001: A.5.5 Assessing Societal Impacts of AI Systems 42001: A.7.2 Data for development and enhancement of AI system 42001: B.7.3 Acquisition of data 42001: A.7.4 Quality of Data for AI Systems 42001: A.7.5 Data Provenance 42001: A.2.3 Alignment with other organizational policies 27001: A.5.12 Classification of information 27001: A.5.13 Labelling of information 27001: A.5.14 Information transfer 27001: A.5.15 Access control 27001: A.5.16 Identity management 27001: A.5.17 Authentication information 27001: A.5.18 Access rights 27001: A.7.7 Clear desk and clear screen 27001: A.7.10 Storage Media 27001: A.8.11 Data masking 27001: A.8.12 Data leakage prevention 27002: 5.12 Classification of information 27002: 5.13 Labelling of information 27002: 5.14 Information transfer 27002: 5.15 Access control 27002: 5.16 Identity management 27002: 5.17 Authentication information 27002: 5.18 Access rights 27002: 7.7 Clear desk and clear screen 27002: 7.10 Storage Media 27002: 8.3 Information Access Restrictions 27002: 8.11 Data masking 27002: 8.12 Data leakage prevention
Addendum
N/A
Article 10 (2) Article 15
Addendum
N/A
MP-4.1-001 MP-4.1-009
Addendum
NIST AI 600-1 does not cover the DSP-17 topic of NIST AI 600-1 does not cover the DSP-17 topic of "protect sensitive data throughout its lifecycle."
AM-02 AM-05 AM-06 CRY-02 CRY-03 OPS-12 OPS-14 PI-03 PSS-09 PSS-12
Addendum
N/A
AI-CAIQ questions (1)
Are processes, procedures, and technical measures defined and implemented to protect sensitive data throughout its lifecycle?