Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

AI Model Risk Management Framework
AI Model Risk Management Framework
Who it's for:
  • AI/ML Engineers and Developers
  • Data Scientists
  • Risk Management Professionals
  • Compliance Officers and Auditors
  • Business Leaders, Executives, and Project Managers
  • Communications and Public Relations Professionals

AI Model Risk Management Framework

Release Date: 07/23/2024

Working Group: AI Safety Initiative

Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. While these ML models hold the potential to unlock significant innovation, their increasing use also introduces inherent risks. Unaddressed model risks can lead to substantial financial losses, regulatory issues, and reputational harm. To address these concerns, we need a proactive approach to risk management.

This paper from the CSA AI Technology and Risk Working Group discusses the importance of AI model risk management (MRM). It showcases how model risk management contributes to responsible AI development and deployment and explores the core components of the framework. These components work together to identify and mitigate risks and improve model development through a continuous feedback loop.

Key Takeaways:
  • Benefits of a comprehensive AI risk management framework, including the more responsible use of AI, enhanced transparency, informed decision-making processes, and robust model validation
  • Elements, benefits, and limitations of the four core components: AI model cards, data sheets, risk cards, and scenario planning
  • How to combine the core components into a comprehensive AI risk management framework
Download this Resource

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
AI Risk Management: Thinking Beyond Regulatory Boundaries
AI Risk Management: Thinking Beyond Regulatory ...
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
AI Organizational Responsibilities - Governance...
AI-Powered Cybersecurity: Safeguarding the Media Industry
AI-Powered Cybersecurity: Safeguarding the Media Industry
Published: 11/20/2024
5 Big Cybersecurity Laws You Need to Know About Ahead of 2025
5 Big Cybersecurity Laws You Need to Know About Ahead of 2025
Published: 11/20/2024
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Managing AI Risk: Three Essential Frameworks to Secure Your AI Systems
Published: 11/19/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
Virtual Zero Trust Summit 2024
Virtual Zero Trust Summit 2024
November 20 | Virtual
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Online

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Chris Kirschke
Chris Kirschke
Cloud Portfolio Information Security Officer at Albertsons Companies

Chris Kirschke

Cloud Portfolio Information Security Officer at Albertsons Companies

Security Leader with over 20+ years of experience across Financial Services, Streaming, Retail and IT Services with a heavy focus on Cloud, DevSecOps and Threat Modeling. Advises multiple security startups on Product Strategy, Alliances and Integrations. Sits on multiple Customer Advisory Boards helping to drive security product roadmaps, integrations and feature developments. Avid hockey player, backpacker and wine collector in his spare t...

Read more

Jeffrey Ritter Headshot Missing
Jeffrey Ritter

Jeffrey Ritter

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Eric Tierling Headshot Missing
Eric Tierling

Eric Tierling

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Candy Alexander Headshot Missing
Candy Alexander

Candy Alexander

MJ Schwenger
MJ Schwenger
vCIO/CISO, RCP

MJ Schwenger

vCIO/CISO, RCP

Maria (MJ) Schwenger is a seasoned Information Security Executive. She leverages her deep expertise across cybersecurity, privacy & compliance, AI/Generative AI, cloud modernization, and software development to spearhead transformative digital journeys. Renowned for her leadership in integrating emerging technologies like AI/GenAI, DevSecOps/SRE, Blockchain, IoT/Edge, and cloud-native optimization, she seamlessly unlocks innovative business...

Read more

Renata Budko Headshot Missing
Renata Budko

Renata Budko

Hadir Labib
Hadir Labib
Blue Team Manager

Hadir Labib

Blue Team Manager

Vani Mittal Headshot Missing
Vani Mittal

Vani Mittal

Nick Ray Headshot Missing
Nick Ray

Nick Ray

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training