Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

AI Model Risk Management Framework
AI Model Risk Management Framework
Who it's for:
  • AI/ML Engineers and Developers
  • Data Scientists
  • Risk Management Professionals
  • Compliance Officers and Auditors
  • Business Leaders, Executives, and Project Managers
  • Communications and Public Relations Professionals

AI Model Risk Management Framework

Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. While these ML models hold the potential to unlock significant innovation, their increasing use also introduces inherent risks. Unaddressed model risks can lead to substantial financial losses, regulatory issues, and reputational harm. To address these concerns, we need a proactive approach to risk management.

This paper from the CSA AI Technology and Risk Working Group discusses the importance of AI model risk management (MRM). It showcases how model risk management contributes to responsible AI development and deployment and explores the core components of the framework. These components work together to identify and mitigate risks and improve model development through a continuous feedback loop.

Key Takeaways:
  • Benefits of a comprehensive AI risk management framework, including the more responsible use of AI, enhanced transparency, informed decision-making processes, and robust model validation
  • Elements, benefits, and limitations of the four core components: AI model cards, data sheets, risk cards, and scenario planning
  • How to combine the core components into a comprehensive AI risk management framework
Download this Resource

Bookmark
Share
Related resources
CSA Large Language Model (LLM) Threats Taxonomy
CSA Large Language Model (LLM) Threats Taxonomy
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
AI Organizational Responsibilities - Core Security Responsibilities
AI Organizational Responsibilities - Core Secur...
Navigating Data Privacy in the Age of AI: How to Chart a Course for Your Organization
Navigating Data Privacy in the Age of AI: How to Chart a Course for...
Published: 07/26/2024
Integrating PSO with AI: The Future of Adaptive Cybersecurity
Integrating PSO with AI: The Future of Adaptive Cybersecurity
Published: 07/23/2024
Enhancing AI Reliability: Introducing the LLM Observability & Trust API
Enhancing AI Reliability: Introducing the LLM Observability & Trust...
Published: 07/19/2024
Revamping Third Party Vendor Assessments for the Age of Large Language Models
Revamping Third Party Vendor Assessments for the Age of Large Langu...
Published: 07/10/2024
SECtember.ai 2024
SECtember.ai 2024
September 10 | Bellevue, WA

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Chris Kirschke
Chris Kirschke
Cloud Portfolio Information Security Officer at Albertsons Companies

Chris Kirschke

Cloud Portfolio Information Security Officer at Albertsons Companies

Security Leader with over 20+ years of experience across Financial Services, Streaming, Retail and IT Services with a heavy focus on Cloud, DevSecOps and Threat Modeling. Advises multiple security startups on Product Strategy, Alliances and Integrations. Sits on multiple Customer Advisory Boards helping to drive security product roadmaps, integrations and feature developments. Avid hockey player, backpacker and wine collector in his spare t...

Read more

Jeffrey Ritter Headshot Missing
Jeffrey Ritter

Jeffrey Ritter

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Eric Tierling Headshot Missing
Eric Tierling

Eric Tierling

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Candy Alexander Headshot Missing
Candy Alexander

Candy Alexander

Maria Schwenger Headshot Missing
Maria Schwenger

Maria Schwenger

Renata Budko Headshot Missing
Renata Budko

Renata Budko

Hadir Labib Headshot Missing
Hadir Labib

Hadir Labib

Vani Mittal Headshot Missing
Vani Mittal

Vani Mittal

Nick Ray Headshot Missing
Nick Ray

Nick Ray

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training