Please enable JavaScript.
Coggle requires JavaScript to display documents.
Hitrust Access Control AI Security Mapping - Coggle Diagram
Hitrust Access Control AI Security Mapping
AI Production Model Interaction Access Control
ISO 42001 Similar Control
A.6.3 – Access Control for AI Systems
NIST AI RMF
AC-1 / AC-2 – Access Control for AI Systems
EU AI Act
Article 14 – Data Governance & Access Control
MAS TRM
Section 8.2 – Access Controls & Privilege Management for AI
OWASP Top 10 llm
LLM03 – Excessive Permissions & Privilege Misuse
SAIF
Pillar 2 – Identity & Access Management for AI Systems
AI Data and Model At-Rest Encryption Control
ISO 42001
A.7.4 – Data Protection and Encryption
NIST AI RMF
SC-12 / SC-13 – Cryptographic Protection for AI Systems
EU AI Act
Article 15 – Data Security & Integrity Requirements
MAS TRM
Section 9.1 – Data Protection and Encryption
OWASP Top 10 llm
LLM06 – Data Protection and Confidentiality
SAIF
Pillar 3 – Data Protection and Encryption
AI Engineering Environment Least Privilege Access Control
ISO 42001
A.6.3 – Access Control for AI Systems
NIST AI RMF
AC-1 / AC-2 – Access Control for AI Systems
EU AI Act
Article 14 – Data Governance & Access Control
MAS TRM
Section 8.2 – Access Controls & Privilege Management for AI
OWASP Top 10 llm
LLM03 – Excessive Permissions & Privilege Misuse
SAIF
Pillar 2 – Identity & Access Management for AI Systems
AI Model Least Privilege Access Control
ISO 42001
A.6.3 – Access Control for AI Systems
NIST AI RMF
AC-1 / AC-2 – Access Control for AI Systems
EU AI Act
Article 14 – Data Governance and Access Control
MAS TRM
Section 8.2 – Access Controls and Privilege Management for AI
OWASP Top 10 llm
LLM03 – Excessive Permissions & Privilege Misuse
SAIF
Pillar 2 – Identity & Access Management for AI Systems
AI Training Data Least Privilege Access Control
ISO 42001 Similar Control
A.6.3 – Access Control for AI Systems
NIST AI RMF
AC-1 / AC-2 – Access Control for AI Systems
EU AI Act
Article 14 – Data Governance & Access Control
MAS TRM
Section 8.2 – Access Controls & Privilege Management for AI
OWASP Top 10 llm
LLM03 – Excessive Permissions & Privilege Misuse
SAIF
Pillar 2 – Identity & Access Management for AI Systems
AI Model Deployment Least Privilege Access Control
ISO 42001 Similar Control
A.6.3 – Access Control for AI Systems
NIST AI RMF
AC-1 / AC-2 – Access Control for AI Systems
EU AI Act
Article 14 – Data Governance & Access Control
MAS TRM
Section 8.2 – Access Controls & Privilege Management for AI
OWASP top 10 llm
LLM03 – Excessive Permissions & Privilege Misuse
SAIF
Pillar 2 – Identity & Access Management for AI Systems
Unique Control
ISO 42001
Annex A.6.2.1 – AI System Inventory and Classification
Annex A.6.3.2 – AI Model Transparency and Explainability
NIST AI RMF
Govern 1.6 – AI System Inventory
Govern 4.3 – AI Testing & Incident Sharing
Govern 6.1 – Third-Party Risk Management
EU AI ACT
Article 15 – Accuracy, Robustness, and Cybersecurity
Article 16 – Data Governance and Management
OWASP Top 10 llm
LLM01 – Prompt Injection
LLM02 – Insecure Output Handling
LLM04 – Model Denial of Service
LLM05 – Supply Chain Vulnerabilities
SAIF
Model Risk Management
Security by Design
Continuous Monitoring and Incident Response
PILLAR 1,3,4,5,6
nist
1
MAP 2.2 (Primary)
MAP 4.2
MEASURE 2.7
GOVERN 2.1, GOVERN 1.1
MANAGE 1.2, MANAGE 2.4
2
MAP 4.2 (Primary)
MAP 1.6
MEASURE 2.7
GOVERN 1.1, GOVERN 2.1
MANAGE 1.2, MANAGE 2.4
3
MAP 4.2 (Primary)
MAP 2.2
GOVERN 1.1
GOVERN 2.1
MEASURE 2.7
MANAGE 1.2
MANAGE 2.4
4
GOVERN 1.1 (Primary)
GOVERN 2.1
MAP 4.2
MEASURE 2.7
MANAGE 1.2
MANAGE 2.4
5
GOVERN 1.1 (Primary)
GOVERN 2.1
MAP 4.2
MEASURE 2.7
MANAGE 1.2
MANAGE 2.4
6
MAP 4.2 (Primary)
MEASURE 2.10
MEASURE 2.7
GOVERN 1.1
MANAGE 1.2