Please enable JavaScript.
Coggle requires JavaScript to display documents.
Hitrust Data Protection and Privacy AI Security Control - Coggle Diagram
Hitrust Data Protection and Privacy AI Security Control
AI Legal and Regulatory Compliance Assessment Control
EU AI ACT
Article 19 – Compliance Assessment of High-Risk AI Systems
MAS TRM
Section 14.3 – AI Legal and Regulatory Compliance Review
NIST AI RMF
CA-1 / RA-5 – Regulatory Compliance and Legal Risk Assessment
ISO 42001 Similar Control
A.6.2 – Legal and Regulatory Compliance Assessment for AI Systems
owasp top 10 llm
LLM04 – Legal and Regulatory Compliance Verification
AI Data Usage Compliance Assessment Control
EU AI ACT
Article 10 – Data Governance
MAS TRM
Section 14.4 – AI Data Governance and Compliance Review
NIST AI RMF
RA-3 / CA-2 – Data Usage Compliance Assessment
OWASP TOP 10 LLM
LLM05 – AI Data Compliance Verification
ISO 42001 Similar Control
A.7 – Data for AI Systems
SAIF
Pillar 5 – AI Data Usage and Compliance Monitoring
AI Technical Information Disclosure Restriction Control
ISO 42001 Similar Control
Article 10 – Data Governance
MAS TRM
Section 14.4 – AI Model Risk Management
EU AI ACT
SR-3 – System and Communications Protection
OWASP TOP 10 LLM
LLM05 – AI Data Compliance Verification
NIST AI RMF
A.8 – Security of AI Systems
SAIF
Pillar 5 – AI Data Usage and Compliance Monitoring
AI Data Minimization and Anonymization Control
EU AI ACT
Article 10 – Data Governance / Data Anonymization Techniques
MAS TRM
Section 14.3 – Data Governance and Protection
NIST AI RMF
Privacy-enhancing technologies (PETs)
OWASP TOP 10 LLM
LLM03 – Training Data Poisoning & Data Sanitization
ISO 42001
A.7.2 – Data for Development and Enhancement of AI Systems
SAIF
Pillar 5 – AI Data Usage and Compliance Monitoring
Unique control
ISO 42001
Annex A.6.2.1 (partial)
NIST AI RMF
Govern 1.6
EU AI ACT
Article 15
OWASP TOP 10 LLM
LLM 01,2,6,7,8,9,10
SAIF
Pillar 1,2,3,4,6
nist
1
MAP 4.1 – Map AI component risks
MEASURE 2.7 – Evaluate security & resilience
MEASURE 3.1 – Track emerging AI risks
MANAGE 1.3 – Respond to high-priority threats
2
GOVERN 6.1 – Address risks from third-party data and IP
MAP 1.6 – Understand system requirements including data constraints
MAP 4.1 – Map data-related risks & legal constraints
MEASURE 2.10 – Evaluate privacy risks in data
MANAGE 3.1 – Manage risks from third-party resources
3
GOVERN 4.2, 6.1 • MAP 4.1 • MEASURE 2.7, 2.8 • MANAGE 4.3, 3.1
4
GOVERN 1.1, GOVERN 6.1
MAP 1.6, MAP 4.1, MAP 5.1
MEASURE 2.10, MEASURE 2.11, MEASURE 3.1
MANAGE 1.2, MANAGE 2.3, MANAGE 4.1