FlashGenius Logo FlashGenius
AAISM · Page 2 of 5 · AI Security Program

AI Security Program, Asset Lifecycle & Incident Response

AAISM · Domain 1: AI Governance & Program Management · 31% of Exam

AI Asset Inventory · Model Lifecycle · Security Program · BC/DR · AI Incident Response · GDPR Notification

Study with Practice Tests →

What This Page Covers

This page addresses Domain 1 Sub-areas C, D, and E of the AAISM exam — together worth approximately 31% of 90 exam questions. You will need to demonstrate mastery of how AI systems are inventoried and managed through their lifecycle, how a formal AI security program is structured and operated, and how organizations prepare for and respond to AI-specific disruptions and security incidents.

  • Sub-area C: AI Asset and Data Life Cycle Management — inventorying AI assets, tracking models from inception to retirement, data classification, shadow AI discovery
  • Sub-area D: AI Security Program Development and Management — charters, roles, KPIs/KRIs, security by design, awareness training, third-party assessments
  • Sub-area E: Business Continuity and Incident Response — AI-specific BCP, RTO/RPO for models, incident categories, the AI IR lifecycle, GDPR and EU AI Act notification requirements
AI Asset Inventory Model Lifecycle Shadow AI Data Classification Security Program Charter KPIs & KRIs Security by Design AI BCP RTO / RPO Model Rollback Data Poisoning Adversarial Attacks GDPR 72-Hour Rule EU AI Act Model Theft IR Lifecycle

Core Concept Cards

Six foundational concepts tested across all three sub-areas

📦

AI Asset Inventory

A comprehensive register of all AI assets: trained models, training datasets, feature pipelines, APIs, third-party AI services, and automated decision systems. Includes classification by criticality (business-critical vs. experimental vs. retired) and ownership. Foundation for risk assessment, change management, and incident response.

🔄

AI Data & Model Lifecycle

Data flows through: Collection → Labeling → Preprocessing → Training → Validation → Deployment → Monitoring → Retirement. Models follow: Development → Testing → Staging → Production → Deprecation. Each stage introduces distinct security risks requiring targeted controls and documentation for reproducibility and audit.

🔐

AI Security Program

A formal program chartered with defined scope, authority, and resources. Staffed by specialized roles: AI Security Officer, AI Red Team, Data Steward, AI Ethics Committee. Governed by a hierarchy of policies → standards → procedures → guidelines. Measured by AI-specific KPIs (detection rates) and KRIs (model drift thresholds).

👤

Shadow AI Discovery

Unauthorized AI tools adopted by business units outside IT/security governance — the AI equivalent of shadow IT. Discovery methods include network traffic analysis, SaaS spend audits, developer tool surveys, and API gateway monitoring. Unmanaged AI tools bypass data controls, create data leakage paths, and generate ungoverned risk.

🛡️

AI Business Continuity

AI-specific BCP accounts for scenarios unique to AI: model unavailability, data corruption, training pipeline failure, and cloud AI service outages. Model fallback strategies include switching to rule-based systems, older stable model versions, or human-in-the-loop escalation. RTO/RPO definitions must address model rehydration time, not just infrastructure restart.

🚨

AI Incident Response

Follows PICERL: Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. AI-specific incidents include data poisoning, model theft/extraction, adversarial attacks, algorithmic bias events, and AI hallucinations causing material harm. Containment may include model rollback, feature shutdown, or traffic rerouting to fallback systems.

Comparison: Data Lifecycle vs. Model Lifecycle

Know the stages of each — the exam tests both

Stage AI Data Lifecycle AI Model Lifecycle Key Security Concern
1 Collection & Ingestion Development & Design Data provenance, consent, bias injection
2 Labeling & Annotation Testing & Validation Label poisoning, adversarial test evasion
3 Preprocessing & Feature Engineering Staging & QA Feature leakage, pipeline integrity
4 Training Production Deployment Poisoning attacks, unauthorized access to model weights
5 Validation & Testing Monitoring & Drift Detection Concept drift exploitation, performance degradation attacks
6 Deployment & Serving Deprecation & Retirement Inference attacks, model extraction, zombie model risk
7 Monitoring & Auditing Log tampering, anomaly concealment
8 Retirement & Deletion Incomplete data deletion, GDPR right-to-erasure compliance

📦 AI Asset & Data Life Cycle Management (Sub-area C)

AI Asset Inventory Components

An effective AI asset inventory must catalog all AI-related assets across the enterprise, not just deployed production models. The inventory should include:

  • Models: Production, staging, experimental, and deprecated versions — including model weights, architecture specifications, and training configuration files
  • Training Datasets: Source data, labeled datasets, validation sets, and synthetic data used for model development
  • Feature Pipelines: Data transformation and feature engineering pipelines that feed model inputs
  • APIs and Integrations: Internal model-serving endpoints and third-party AI service integrations (e.g., OpenAI, Azure AI, AWS Bedrock)
  • Automated Decision Systems: Rule engines or hybrid systems that incorporate AI model outputs into business decisions

Asset Classification Schema

Assets should be classified along two dimensions: criticality (impact if unavailable or compromised) and sensitivity (data classification of inputs/outputs).

ClassificationDescriptionExamplesControls Required
Business-Critical Failure causes significant business impact or regulatory breach Fraud detection model, credit scoring, medical diagnosis AI HA architecture, DR plan, formal change management, 24/7 monitoring
Operational Supports business processes; degraded performance is tolerable short-term Customer churn prediction, inventory optimization Fallback procedures, regular backup, incident playbooks
Experimental R&D or pilot phase; not in production decision flows POC models, data science sandbox experiments Isolated environment, data access controls, exit criteria
Retired/Deprecated No longer in active use; retained for audit or rollback purposes only Superseded model versions, archived training runs Secure archival, deletion schedule, access restriction

Data Classification for AI

Training datasets introduce unique data classification challenges. PII (Personally Identifiable Information) and PHI (Protected Health Information) embedded in training data must be identified, documented, and governed even after model training is complete — because models can memorize and reproduce sensitive training samples.

  • Sensitivity tagging: Each dataset should carry a sensitivity classification label (Public, Internal, Confidential, Restricted) that propagates to any model trained on it
  • PII/PHI inventory: Cataloging which datasets contain regulated data types and which models were trained on them
  • Right to Erasure (GDPR Art. 17): Presents a challenge — deleting an individual's data from a trained model may require model retraining; organizations must have documented policies for this

Model Versioning & Lineage Tracking

Model lineage tracks the provenance of a model: which dataset was used, which hyperparameters were applied, which team member ran the training, and what the performance metrics were at each stage. This is essential for:

  • Audit reproduction: Regulators may require reproducing a model's output from a specific point in time
  • Incident investigation: Identifying when a compromised dataset was introduced or when a model's behavior changed
  • Rollback: Reverting to a known-good prior model version following an incident

Shadow AI Discovery

Shadow AI refers to AI tools and services adopted by employees or business units without IT and security awareness or approval. Unlike traditional shadow IT, shadow AI introduces additional risks:

  • Sensitive corporate data fed into public AI services (e.g., employees pasting confidential documents into ChatGPT)
  • AI-generated outputs used in business decisions without validation or bias assessment
  • Ungoverned third-party data processing violating GDPR or sector-specific regulations

Discovery methods: Network traffic analysis (detecting API calls to known AI providers), SaaS spend audits, browser extension inventory, developer tool surveys, and data loss prevention (DLP) rules tuned to AI service domains.

Data Retention & Deletion Policies

Training datasets must have defined retention schedules. Key considerations: legal hold requirements, regulatory minimum retention periods, the cost of retraining if data is deleted prematurely, and GDPR/CCPA deletion obligations. Secure deletion (cryptographic erasure or physical media destruction) must be documented and verifiable.

🔐 AI Security Program Development & Management (Sub-area D)

Program Charter Elements

The AI Security Program Charter is the foundational governance document that authorizes and scopes the program. A complete charter includes:

  • Scope: Which AI systems, processes, and organizational units fall under the program
  • Objectives: Specific, measurable outcomes the program aims to achieve
  • Authority: Executive sponsorship and reporting lines (typically to CISO or CRO)
  • Resources: Budget, headcount, tools, and external services allocated
  • Accountability: Named roles responsible for program components

AI Security Roles & Responsibilities

RolePrimary ResponsibilitiesReports To
AI Security Officer Oversees AI security strategy, policy, and program; interfaces with CISO and business units CISO / CRO
AI Red Team Conducts adversarial testing, prompt injection attempts, model extraction exercises, and bias probing AI Security Officer
Data Steward Manages data quality, classification, lineage, and data governance for AI training datasets Chief Data Officer / CDO
AI Ethics Committee Reviews AI use cases for fairness, bias, and societal impact; approves high-risk AI deployments Board / Executive Committee
ML Security Engineer Implements technical controls: model signing, pipeline security, adversarial robustness testing AI Security Officer

Policy Hierarchy for AI Security

  • Policies: High-level management intent (e.g., "All AI systems processing personal data must undergo privacy impact assessment before deployment")
  • Standards: Specific, mandatory requirements derived from policy (e.g., "Models must be version-controlled in an approved MLOps platform")
  • Procedures: Step-by-step instructions for implementing standards (e.g., the model review and approval checklist)
  • Guidelines: Recommended but non-mandatory practices (e.g., best practices for prompt design to reduce hallucination risk)

KPIs and KRIs for AI Security

AI security programs require metrics that reflect the unique risk environment of AI systems:

Metric TypeMetricPurpose
KPI % of AI assets with current risk assessment Measures program coverage
KPI Adversarial attack detection rate Measures effectiveness of detection controls
KPI Mean time to contain AI incident (MTTC) Measures IR response speed
KRI Model performance drift beyond threshold Early warning of potential compromise or data shift
KRI Data quality score below acceptable threshold Signals training data integrity issues
KRI % of AI assets without approved data classification Residual governance gap risk indicator

Security by Design for AI

Security by design means integrating security requirements from the earliest stages of AI model development — at model inception — rather than bolting on controls post-deployment. This includes:

  • Threat modeling for AI systems (identifying adversarial input vectors, training data poisoning paths, and inference attack surfaces) before development begins
  • Privacy-preserving techniques (differential privacy, federated learning, data minimization) incorporated into the architecture design
  • Adversarial robustness requirements specified as non-functional requirements alongside accuracy targets
  • Model signing and integrity verification built into the MLOps pipeline from day one

AI Security Awareness Training

Training must be tailored to audience role. The AAISM program distinguishes between:

  • Developers & Data Scientists: Secure coding for ML, safe handling of training data, avoiding data leakage in notebooks, recognizing adversarial inputs during testing
  • Business Users: Risks of shadow AI tools, appropriate use of AI-generated outputs, escalation paths for suspected AI anomalies
  • Executives & Board: AI risk appetite setting, board-level AI security reporting, regulatory exposure from AI incidents

Third-Party AI Security Assessments

When procuring or integrating third-party AI services (e.g., foundation model APIs, AI-powered SaaS tools), organizations must conduct vendor AI security assessments covering: data handling and residency, model access controls, incident notification SLAs, subprocessor chains, and right-to-audit clauses.

🛡️ Business Continuity for AI Systems (Sub-area E — BC)

AI-Specific BCP Considerations

Standard BCP frameworks address infrastructure failures, but AI systems introduce additional disruption scenarios that require explicit treatment in the BC plan:

  • Model Unavailability: The model serving infrastructure is down or the model weights are corrupted
  • Training Data Corruption: The dataset used for ongoing retraining has been poisoned or becomes unavailable
  • Feature Pipeline Failure: Upstream data feeds that generate real-time model inputs fail, producing degraded or null features
  • Cloud AI Service Outage: Third-party AI API (e.g., an LLM API) used in a critical business workflow becomes unavailable
  • Regulatory Suspension: A regulator orders suspension of an AI system due to compliance findings

RTO and RPO for AI Systems

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) must account for AI-specific factors:

ConceptTraditional IT MeaningAI System Nuance
RTO Time to restore service after disruption Must include model reload/rehydration time, inference service warm-up, and feature pipeline re-initialization
RPO Maximum acceptable data loss (time window) For AI: the maximum acceptable model staleness; if a model cannot be retrained with data newer than N hours, what is the business impact?
Model Backup N/A in traditional IT Model weights, architecture files, hyperparameter configs, and training checkpoints must be backed up and tested for restorability

Model Fallback Strategies

When a primary AI model is unavailable or suspected to be compromised, the BC plan must specify a tested fallback strategy:

  • Prior Model Version: Revert to the last known-good model version held in the model registry (requires versioned artifact storage)
  • Rule-Based System: Fall back to a deterministic, explainable rule engine (e.g., decision tree or business rules) — slower to adapt but predictable
  • Human-in-the-Loop Escalation: Route decisions to human reviewers for manual processing — appropriate for high-stakes, low-volume scenarios
  • Degraded Mode Operation: Serve predictions with a warning flag indicating reduced confidence or model unavailability

Dependency Mapping

AI BC plans require a dependency map documenting every upstream and downstream dependency of each critical AI system: cloud infrastructure providers, data pipeline orchestrators, feature stores, model registries, inference serving platforms, third-party APIs, and consuming applications. This map is the foundation for failure impact analysis and recovery sequencing.

Testing AI BC Plans

BC plans must be tested periodically. AI-specific test types include: tabletop exercises (simulating a data poisoning event to walk through the IR and recovery playbook), failover drills (activating model fallback and measuring RTO achievement), and chaos engineering experiments (injecting controlled failures into the feature pipeline to verify graceful degradation).

🚨 AI Incident Response (Sub-area E — IR)

AI Incident Categories

Incident TypeDescriptionDetection Signals
Data Poisoning Malicious data injected into training dataset to corrupt model behavior Unexpected model accuracy drops, anomalous training data statistics, backdoor trigger patterns in outputs
Model Compromise Unauthorized access to or modification of model weights, architecture, or serving infrastructure File integrity alerts on model artifacts, unauthorized access logs on model registry
Adversarial Attack Crafted inputs designed to cause model misclassification at inference time Anomalous input patterns, sudden accuracy degradation on specific input classes, SIEM alerts on inference anomalies
Model Theft / Extraction Attacker reconstructs a model by querying the API at scale and training a surrogate Unusual API query volumes, repetitive systematic query patterns, scraping behavior in API gateway logs
Algorithmic Bias Incident Model produces systematically discriminatory outputs affecting a protected class Fairness metric alerts, customer complaints, regulatory inquiry, internal audit findings
AI Hallucination Harm Generative AI produces false information that causes material harm (legal, medical, financial) User reports, fact-checking failures, downstream decision errors traced to AI outputs

AI Incident Response Lifecycle (PICERL)

1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Lessons Learned
  • Preparation: AI incident playbooks, trained IR team including data scientists, pre-established escalation paths, forensic tooling for ML artifacts
  • Identification: Detecting anomalous model behavior via SIEM/SOAR alerts, user reports, monitoring dashboards; declaring an AI incident and assigning severity
  • Containment: Model rollback to last known-good version, traffic rerouting to fallback system, feature shutdown, rate-limiting or blocking suspicious API callers
  • Eradication: Removing poisoned data from training sets, patching vulnerable pipeline components, revoking compromised API credentials, retraining model on verified clean data
  • Recovery: Gradual traffic restoration to restored model, monitoring for recurrence, validating model performance against baseline, communicating recovery status to stakeholders
  • Lessons Learned: Root cause analysis, post-incident report, control gap remediation, playbook updates, regulatory reporting if required

Containment Strategies for Compromised AI Models

  • Model Rollback: Deploying a prior certified model version from the model registry — the fastest containment option when a clean prior version exists
  • Feature Shutdown: Disabling specific input features suspected of carrying adversarial or poisoned signal
  • Traffic Rerouting: Redirecting inference requests to a fallback rule-based system or human review queue
  • API Rate Limiting / Blocking: Throttling or blocking sources exhibiting model extraction query patterns

Evidence Preservation for AI Incidents

AI forensics requires preserving artifacts that do not exist in traditional IT incidents:

  • Model artifacts: Snapshots of model weights, configuration files, and feature engineering code at the time of incident
  • Inference logs: Input/output pairs logged at the model API layer — critical for reconstructing attack patterns
  • Training data snapshots: The exact dataset version used for the current production model
  • Pipeline execution records: MLOps pipeline run history showing who triggered which training jobs with which data

Regulatory Notification Requirements

RegulationTriggerNotification DeadlineRecipient
GDPR Art. 33 Personal data breach, including via AI system compromise that exposes training data 72 hours from discovery (to supervisory authority); without undue delay to affected individuals if high risk Lead supervisory authority (DPA)
EU AI Act Art. 62 Serious incident involving high-risk AI system (harm to health, safety, fundamental rights, or significant damage) Immediately (without undue delay) upon becoming aware Market surveillance authority; notified body where applicable
Sector-specific AI incident in regulated sector (finance, health, critical infrastructure) Varies: DORA (36 hours for major ICT incidents), HIPAA (60 days), FCA (as soon as practicable) Sector regulator

AI-Specific SIEM/SOAR Integration

Traditional SIEM/SOAR platforms detect threats in IT infrastructure logs. Effective AI incident detection extends these platforms with:

  • Model performance telemetry: Streaming accuracy, confidence score distributions, and prediction distributions to the SIEM as time-series events
  • Inference log analysis: SOAR playbooks triggered by anomalous input patterns (e.g., high-volume systematic queries indicating model extraction)
  • Data pipeline integrity alerts: Alerts on unexpected data schema changes, volume anomalies, or hash mismatches in training data feeds
  • Feature drift monitoring: Automated alerts when feature distributions deviate beyond statistical thresholds

Exam tip: The GDPR 72-hour notification clock starts from when the organization becomes aware of the breach — not from when the breach occurred. AI incident response plans must explicitly define what constitutes "awareness" and designate who has authority to make the notification decision.

Memory Hooks

Six mnemonics to lock in the most testable concepts from Sub-areas C, D & E

📦

AI Asset Inventory — What Goes In?

MAPS-T: Models · APIs · Pipelines · Services · Training data

When asked what belongs in an AI asset inventory, recall MAPS-T: Models (all versions), APIs (internal & external), Pipelines (feature engineering & data flows), Services (third-party AI integrations), Training data (datasets & labels). Any exam question listing AI assets should match one of these five categories.

🔄

AI Data Lifecycle — All 8 Stages

Can Lucy Produce The Very Delicious Morning Rendition?

Collect → Label → Preprocess → Train → Validate → Deploy → Monitor → Retire. The sentence "Can Lucy Produce The Very Delicious Morning Rendition?" maps each word to a lifecycle stage in order. The exam may present stages out of order and ask you to arrange them correctly.

🚨

AI Incident Response — PICERL

PICERL: Please Identify Contained Enemies, Restore Life

Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. "Please Identify Contained Enemies, Restore Life" gives you the six phases in order. Note that Containment comes before Eradication — a common distractor reversal on the exam.

⏱️

GDPR 72-Hour Notification Rule

72 = 3 Days, Awareness Starts the Clock

GDPR Article 33 requires notifying the supervisory authority within 72 hours of becoming aware of a personal data breach. The clock starts at awareness, not at breach occurrence. Remember: 72 hours = 3 days. High-risk breaches also require notifying affected individuals "without undue delay." EU AI Act adds a separate serious-incident notification obligation for high-risk AI systems.

🛡️

Model Fallback Strategy — 3 Options

PRH: Prior version → Rules → Humans

When a production AI model must be taken offline, the fallback hierarchy is: Prior stable model version (fastest, lowest disruption) → Rule-based system (deterministic, explainable, slower to adapt) → Human-in-the-loop (manual review, highest cost, appropriate for high-stakes/low-volume). Exam scenarios will test your ability to select the appropriate fallback given the scenario constraints.

🔐

AI Security Program — Policy Hierarchy

PSPG: Policies Set the Standard; Procedures Guide

The four-level hierarchy is: Policies (management intent) → Standards (mandatory requirements) → Procedures (step-by-step instructions) → Guidelines (recommended practices). Standards are mandatory; guidelines are not. "Policies Set the Standard; Procedures Guide" encodes the hierarchy and the key distinction. The AI Security Program Charter sits above all four levels as the authorizing document.

Practice Quiz

10 exam-style questions — instant feedback on each answer

Question 1 of 10
An organization discovers that a business unit has been using a publicly available AI tool to analyze confidential customer contracts without IT or security awareness. This situation is BEST described as:
Question 2 of 10
When defining RTO for a business-critical AI fraud detection model, which AI-specific factor must be included in the RTO calculation that would NOT typically appear in a standard IT RTO?
Question 3 of 10
An organization's production recommendation model begins returning biased outputs that systematically disadvantage a protected class. After investigation, the cause is identified as a poisoned label in a training batch introduced three weeks ago. Which incident response phase should focus on removing the compromised data and retraining the model on verified clean data?
Question 4 of 10
An AI Security Officer wants to establish a metric that serves as an early warning indicator of potential AI system compromise — rather than measuring program performance. Which of the following is a Key Risk Indicator (KRI) rather than a Key Performance Indicator (KPI)?
Question 5 of 10
Under GDPR Article 33, an organization must notify its lead supervisory authority of a personal data breach affecting AI training data. The breach was caused by unauthorized access to the training dataset that occurred on Monday at 08:00. The security team became aware on Tuesday at 10:00. By when must notification be submitted?
Question 6 of 10
Which of the following BEST describes the primary purpose of model lineage tracking in an AI security program?
Question 7 of 10
An AI security team observes highly systematic, high-volume API queries against their production model that follow a repetitive pattern probing boundary decision regions. Which AI-specific incident type does this pattern MOST likely indicate?
Question 8 of 10
The AI Security Program Charter specifies that all AI systems processing personal data must undergo a Privacy Impact Assessment before deployment. A team proposes that the detailed checklist steps for conducting the PIA belong in a separate document. Which document type in the AI security policy hierarchy should contain the step-by-step PIA execution instructions?
Question 9 of 10
During a tabletop exercise, a team is testing their BC plan for a high-risk medical AI diagnostic system. The primary model has been taken offline due to a suspected compromise. Which fallback sequence correctly orders the options from LEAST to MOST disruptive to clinical operations?
Question 10 of 10
When classifying a retired AI model that is no longer used for production decisions but is retained in the model registry for potential rollback and audit purposes, which asset classification is MOST appropriate?

Flashcards

Click any card to flip it and reveal the answer. Work through all 8 to reinforce key AAISM concepts.

Flashcard 1 · AI Asset Management
What are the five primary categories of assets that must appear in an AI asset inventory?
Tap to reveal
Answer
MAPS-T: (1) Models — all versions including experimental and retired; (2) APIs — internal serving endpoints and third-party integrations; (3) Pipelines — feature engineering and data flows; (4) Services — third-party AI service subscriptions; (5) Training data — datasets, labels, and synthetic data. Each asset should be classified by criticality and sensitivity.
Flashcard 2 · GDPR Notification
Under GDPR Article 33, when does the 72-hour notification clock start, and to whom must notification be made?
Tap to reveal
Answer
The clock starts when the organization becomes aware of the personal data breach — not when the breach occurred. Notification must be made to the lead supervisory authority (DPA) within 72 hours. If the breach poses a high risk to affected individuals, they must also be notified without undue delay. Late notifications must include reasons for the delay.
Flashcard 3 · Incident Response
List the six phases of the AI Incident Response lifecycle in correct order.
Tap to reveal
Answer
PICERL: (1) Preparation — playbooks, team training, tooling; (2) Identification — detecting and declaring the incident; (3) Containment — limiting spread (model rollback, traffic rerouting); (4) Eradication — removing root cause (poisoned data removal, retraining); (5) Recovery — restoring normal operations; (6) Lessons Learned — RCA, control improvements, regulatory reporting.
Flashcard 4 · AI Security Program
What is the difference between a KPI and a KRI in the context of an AI security program? Give one example of each.
Tap to reveal
Answer
KPI (Key Performance Indicator) measures how well the security program is achieving its objectives — e.g., "85% of AI assets have a current risk assessment" or "Mean time to contain an AI incident = 4 hours." KRI (Key Risk Indicator) is a forward-looking early warning signal — e.g., "Model performance drift exceeds ±15% of baseline" or "Data quality score below 90% in the training pipeline." KRIs trigger investigation; KPIs measure outcomes.
Flashcard 5 · Data Lifecycle
Why does GDPR's "right to erasure" (Article 17) present a unique challenge for AI systems, and what is the accepted mitigation approach?
Tap to reveal
Answer
Models can memorize and reproduce training data, so deleting a record from the source dataset does not erase it from a trained model. The challenge: complying with erasure requests may require model retraining on the filtered dataset. Mitigation approaches include: machine unlearning techniques (where feasible), documented retraining processes triggered by erasure requests, and using privacy-preserving training (differential privacy) to limit memorization from the start.
Flashcard 6 · Business Continuity
What is the AI-specific nuance of RPO (Recovery Point Objective) that does not exist in traditional IT continuity planning?
Tap to reveal
Answer
In traditional IT, RPO measures the maximum acceptable data loss expressed as a time window (e.g., "we can tolerate losing up to 4 hours of transaction data"). For AI systems, RPO must also account for model staleness: if the model cannot be retrained with data more recent than N hours, does the resulting prediction quality fall below an acceptable threshold? This means the AI RPO must define both data backup frequency AND acceptable model age — a concept with no equivalent in traditional IT recovery planning.
Flashcard 7 · Incident Types
Distinguish between a data poisoning attack and an adversarial attack on an AI model. How does the attack vector differ?
Tap to reveal
Answer
Data Poisoning targets the training phase: malicious samples are injected into the training dataset before or during model training, corrupting the model's learned behavior. The attacker needs access to the training data pipeline. Adversarial Attack targets the inference phase: carefully crafted inputs are submitted to a deployed model to cause intentional misclassification. The attacker only needs API access to the production model. Poisoning corrupts the model itself; adversarial attacks exploit the model's existing decision boundaries.
Flashcard 8 · Security Program
What is "security by design" in the context of AI systems, and at what lifecycle stage must it begin?
Tap to reveal
Answer
Security by design means integrating security requirements at model inception — the earliest stage of AI development — rather than adding controls post-deployment. It begins during the design/requirements phase and includes: threat modeling for AI attack vectors before coding begins, specifying adversarial robustness as a non-functional requirement alongside accuracy targets, selecting privacy-preserving architectures (differential privacy, federated learning), and building model signing and integrity verification into the MLOps pipeline from day one. Post-hoc security is significantly more costly and less effective.

Study Advisor

Select a focus area to get targeted study tips and common exam traps

📦 AI Asset Management

AI Asset Inventory & Data Lifecycle Tips

  • Know what's in the inventory: The exam expects you to know that AI asset inventories cover models, APIs, pipelines, third-party AI services, AND training datasets — not just deployed software. Questions often list options that omit one of these categories.
  • Shadow AI is not an attack: Shadow AI is a governance gap — unauthorized adoption of AI tools by business users. The response is discovery, risk assessment, and bring-in-or-block governance — not incident response. Don't confuse shadow AI with an active security incident.
  • Classification dimensions: AI assets are classified on TWO axes — criticality (business impact of loss) AND sensitivity (data classification of inputs/outputs). Exam distractors often collapse these into one dimension.
  • Retired ≠ deleted: A retired AI model in the model registry is retained for rollback and audit. It should be classified as Retired/Deprecated with restricted access — not deleted and not reclassified as Experimental.
  • Model lineage goes beyond performance tracking: Model lineage is about security, audit, and incident investigation — not just optimizing accuracy. Know that lineage enables root cause analysis when a model behaves unexpectedly.
  • GDPR and training data deletion: Right to erasure requests against AI systems may require model retraining, not just database record deletion. The exam tests whether you understand this AI-specific complexity.
🔐 Security Program

AI Security Program Development Tips

  • Charter vs. Policy: The charter authorizes the program (scope, authority, budget). Policies express management intent for how AI security objectives should be met. Don't confuse these — the charter comes first and sits above the policy hierarchy.
  • Policy hierarchy order: Policy → Standard → Procedure → Guideline. Standards are mandatory; guidelines are not. Step-by-step instructions belong in Procedures, not Standards. This is a common distractor — the exam often asks which document type should contain specific content.
  • KPI vs. KRI distinction: KPIs measure how well you're doing (backward-looking performance). KRIs are early warning indicators of emerging risk (forward-looking). Model drift is a KRI; detection rate is a KPI. This distinction appears on nearly every ISACA exam.
  • Security by design timing: Must start at inception/requirements phase — not at testing or deployment. Any answer option suggesting controls are added during testing or post-deployment is not "security by design."
  • AI Red Team scope: The AI Red Team tests the security of AI systems through adversarial techniques — prompt injection, model extraction attempts, adversarial input crafting. They are not the same as a traditional penetration testing team.
  • Awareness training is role-differentiated: Developers need secure ML coding training; business users need shadow AI awareness; executives need board-level risk reporting content. One-size-fits-all training is incorrect for AAISM purposes.
🔄 AI Lifecycle

AI Data & Model Lifecycle Tips

  • Data lifecycle has 8 stages; model lifecycle has 5-6: Be able to list both independently. The exam may ask you to identify which lifecycle a described activity belongs to — data lifecycle vs. model lifecycle are distinct.
  • Each lifecycle stage has a distinct threat: Collection → consent/bias; Labeling → label poisoning; Training → data poisoning; Deployment → adversarial attacks; Monitoring → concealment; Retirement → incomplete deletion. Know the primary threat at each stage.
  • Model versioning enables rollback: This is a security control, not just a DevOps convenience. The ability to roll back to a prior model version is a key containment strategy in AI incident response — it requires artifact storage in a model registry.
  • Feature pipeline security is often overlooked: The exam may test that feature pipelines (data transformation code that generates model inputs) are themselves AI assets requiring security controls and inclusion in the asset inventory.
  • Zombie model risk: Deprecated models that remain accessible via API but are no longer monitored represent a security risk — they can be exploited without detection. Proper retirement includes access revocation, not just classification change.
🛡️ Business Continuity

AI Business Continuity Tips

  • AI BCP scenarios go beyond infrastructure: Standard BCP covers hardware/network failure. AI BCP must additionally address model unavailability, data corruption, feature pipeline failure, and cloud AI service outages. Exam scenarios will test AI-specific disruption types.
  • RTO includes model warm-up time: This is the most tested AI-specific nuance of RTO. The time to reload model weights, initialize the serving infrastructure, and validate prediction quality before accepting production traffic is an AI-only element of RTO.
  • RPO for AI = model staleness + data loss: Traditional RPO measures data loss. AI RPO must also define acceptable model age — how out-of-date can the model be before predictions become unacceptable for the use case?
  • Fallback hierarchy: PRH: Prior version (least disruptive) → Rule-based (moderate disruption) → Human-in-the-loop (most disruptive/costly). For high-stakes scenarios where an older model version may also be compromised, the correct answer may skip directly to human review.
  • BC plans must be tested: Tabletop exercises, failover drills, and chaos engineering tests are all required. An untested BC plan is not an acceptable control — this is a principle across all ISACA certifications.
  • Dependency mapping is the foundation: You cannot write a valid AI BC plan without knowing all upstream dependencies. A question asking "what is the FIRST step in developing an AI BC plan" may have dependency mapping as the correct answer.
🚨 Incident Response

AI Incident Response Tips

  • PICERL phase order is tested: Containment ALWAYS precedes Eradication — a common distractor reverses these. You contain first to limit damage, then eradicate the root cause. Recovery comes after eradication, not before.
  • Know all six AI incident types: Data poisoning, model compromise, adversarial attack, model theft/extraction, algorithmic bias incident, and AI hallucination causing harm. Each has distinct detection signals and containment strategies.
  • Model extraction vs. adversarial attack: Model extraction is systematic high-volume querying to clone the model. Adversarial attack crafts specific inputs to fool the live model. Both are inference-time threats, but they are different incident types requiring different responses.
  • GDPR 72-hour clock starts at awareness: This is the most commonly tested IR regulatory detail. The clock starts when the organization BECOMES AWARE — not when the breach occurred. This is explicitly tested in exam scenarios that give you the breach time and the awareness time.
  • EU AI Act adds a separate notification obligation: For high-risk AI systems under the EU AI Act, a serious incident (harm to health, safety, or fundamental rights) must be reported to the market surveillance authority "without undue delay" — separate from and in addition to any GDPR notification.
  • Evidence preservation in AI IR: You must preserve model artifacts, inference logs, training data snapshots, and pipeline execution records — not just network logs and system logs. Data scientists must be involved in the IR team for AI incidents.
  • Lessons Learned triggers model retraining consideration: After an AI incident, the post-incident review must assess whether the model itself needs to be retrained on clean data, not just whether infrastructure controls need improvement.

Resources

Official and authoritative references for AAISM Domain 1 Sub-areas C, D & E

🏛️

ISACA AAISM Certification — Official Page

Official ISACA page for the AAISM credential. Access the exam content outline, eligibility requirements, and candidate resources. Essential first stop for all exam preparation.

📖

ISACA Journal — AI Governance & Security

ISACA Journal articles on AI governance and security management. Aligns directly with AAISM Domain 1 content including program management, asset lifecycle, and incident response frameworks.

⚖️

GDPR Article 33 — Notification of a Personal Data Breach

Full text of GDPR Article 33 specifying the 72-hour supervisory authority notification requirement. Critical reading for the incident response regulatory notification section of the AAISM exam.

🇪🇺

EU AI Act — European Commission Regulatory Framework

Official European Commission page on the EU AI Act. Covers Article 62 serious incident reporting obligations for high-risk AI systems — directly tested in the AAISM incident response domain.

📋

NIST AI Risk Management Framework (AI RMF 1.0)

NIST's AI RMF provides the governance, mapping, measuring, and managing structure for AI risk — directly aligned with AAISM program management content. Key reference for AI security program design and KPI/KRI selection.

🎯

FlashGenius AAISM Practice Tests — Full Exam Simulator

Exam-style practice questions across all 5 AAISM domains, with detailed explanations for every answer. Adaptive difficulty, timed sessions, and domain-level performance analytics to identify weak areas before exam day.

Ready to Pass the AAISM Exam?

Practice with exam-style questions across all 5 AAISM domains — adaptive difficulty, full explanations, and domain-level performance tracking.

Study with Practice Tests →