Download Publication

Who it's for:
- CISOs and other C-Suite Executives
- AI Researchers, Engineers, and Developers
- Risk Management and Compliance Officers
- Customers
AI Organizational Responsibilities: AI Tools and Applications
Release Date: 01/28/2025
This publication is the third installment in a series that explores organizational responsibilities related to Artificial Intelligence (AI). The first paper examined core AI security responsibilities and the second explored AI governance, risk management, and compliance. Building on these earlier discussions, this installment shifts the focus to the practical implementation of AI within organizations. It explores the tools, applications, supply chains, and other essential components necessary to deploy AI-driven systems successfully.
Key responsibilities discussed include secure coding practices, prompt injection defense, comprehensive output evaluation, and rigorous access control measures. Ensuring secure AI applications also involves adopting robust security assessments, automated testing, and role-based access controls. Finally, compliance with established frameworks such as the NIST AI Risk Management Framework and GDPR further reinforces organizational responsibility.
By focusing on these practical aspects of AI management, this publication equips organizations with necessary knowledge and strategies. These strategies will help professionals harness the power of AI technology effectively, while navigating its unique challenges.
Key Takeaways:
- Critical security considerations for developing, deploying, and maintaining advanced AI tools
- Third-party and supply chain management best practices for AI
- Additional AI implementation and operations considerations, including using generative AI for Security Operations Centers (SOCs)
Download this Resource
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Jan Gerst
Cybersecurity Subject Matter Expert, Charter Communications
Jan Gerst
Cybersecurity Subject Matter Expert, Charter Communications
MSMIT Cloud, MBA, MSMIT Cybersecurity
CSA CSP CCSK
Cornell University - Technology Leadership | Business Management
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more