What This Page Covers
This page addresses Domain 1 Sub-areas C, D, and E of the AAISM exam — together worth approximately 31% of 90 exam questions. You will need to demonstrate mastery of how AI systems are inventoried and managed through their lifecycle, how a formal AI security program is structured and operated, and how organizations prepare for and respond to AI-specific disruptions and security incidents.
- Sub-area C: AI Asset and Data Life Cycle Management — inventorying AI assets, tracking models from inception to retirement, data classification, shadow AI discovery
- Sub-area D: AI Security Program Development and Management — charters, roles, KPIs/KRIs, security by design, awareness training, third-party assessments
- Sub-area E: Business Continuity and Incident Response — AI-specific BCP, RTO/RPO for models, incident categories, the AI IR lifecycle, GDPR and EU AI Act notification requirements
Core Concept Cards
Six foundational concepts tested across all three sub-areas
AI Asset Inventory
A comprehensive register of all AI assets: trained models, training datasets, feature pipelines, APIs, third-party AI services, and automated decision systems. Includes classification by criticality (business-critical vs. experimental vs. retired) and ownership. Foundation for risk assessment, change management, and incident response.
AI Data & Model Lifecycle
Data flows through: Collection → Labeling → Preprocessing → Training → Validation → Deployment → Monitoring → Retirement. Models follow: Development → Testing → Staging → Production → Deprecation. Each stage introduces distinct security risks requiring targeted controls and documentation for reproducibility and audit.
AI Security Program
A formal program chartered with defined scope, authority, and resources. Staffed by specialized roles: AI Security Officer, AI Red Team, Data Steward, AI Ethics Committee. Governed by a hierarchy of policies → standards → procedures → guidelines. Measured by AI-specific KPIs (detection rates) and KRIs (model drift thresholds).
Shadow AI Discovery
Unauthorized AI tools adopted by business units outside IT/security governance — the AI equivalent of shadow IT. Discovery methods include network traffic analysis, SaaS spend audits, developer tool surveys, and API gateway monitoring. Unmanaged AI tools bypass data controls, create data leakage paths, and generate ungoverned risk.
AI Business Continuity
AI-specific BCP accounts for scenarios unique to AI: model unavailability, data corruption, training pipeline failure, and cloud AI service outages. Model fallback strategies include switching to rule-based systems, older stable model versions, or human-in-the-loop escalation. RTO/RPO definitions must address model rehydration time, not just infrastructure restart.
AI Incident Response
Follows PICERL: Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. AI-specific incidents include data poisoning, model theft/extraction, adversarial attacks, algorithmic bias events, and AI hallucinations causing material harm. Containment may include model rollback, feature shutdown, or traffic rerouting to fallback systems.
Comparison: Data Lifecycle vs. Model Lifecycle
Know the stages of each — the exam tests both
| Stage | AI Data Lifecycle | AI Model Lifecycle | Key Security Concern |
|---|---|---|---|
| 1 | Collection & Ingestion | Development & Design | Data provenance, consent, bias injection |
| 2 | Labeling & Annotation | Testing & Validation | Label poisoning, adversarial test evasion |
| 3 | Preprocessing & Feature Engineering | Staging & QA | Feature leakage, pipeline integrity |
| 4 | Training | Production Deployment | Poisoning attacks, unauthorized access to model weights |
| 5 | Validation & Testing | Monitoring & Drift Detection | Concept drift exploitation, performance degradation attacks |
| 6 | Deployment & Serving | Deprecation & Retirement | Inference attacks, model extraction, zombie model risk |
| 7 | Monitoring & Auditing | — | Log tampering, anomaly concealment |
| 8 | Retirement & Deletion | — | Incomplete data deletion, GDPR right-to-erasure compliance |
📦 AI Asset & Data Life Cycle Management (Sub-area C)
AI Asset Inventory Components
An effective AI asset inventory must catalog all AI-related assets across the enterprise, not just deployed production models. The inventory should include:
- Models: Production, staging, experimental, and deprecated versions — including model weights, architecture specifications, and training configuration files
- Training Datasets: Source data, labeled datasets, validation sets, and synthetic data used for model development
- Feature Pipelines: Data transformation and feature engineering pipelines that feed model inputs
- APIs and Integrations: Internal model-serving endpoints and third-party AI service integrations (e.g., OpenAI, Azure AI, AWS Bedrock)
- Automated Decision Systems: Rule engines or hybrid systems that incorporate AI model outputs into business decisions
Asset Classification Schema
Assets should be classified along two dimensions: criticality (impact if unavailable or compromised) and sensitivity (data classification of inputs/outputs).
| Classification | Description | Examples | Controls Required |
|---|---|---|---|
| Business-Critical | Failure causes significant business impact or regulatory breach | Fraud detection model, credit scoring, medical diagnosis AI | HA architecture, DR plan, formal change management, 24/7 monitoring |
| Operational | Supports business processes; degraded performance is tolerable short-term | Customer churn prediction, inventory optimization | Fallback procedures, regular backup, incident playbooks |
| Experimental | R&D or pilot phase; not in production decision flows | POC models, data science sandbox experiments | Isolated environment, data access controls, exit criteria |
| Retired/Deprecated | No longer in active use; retained for audit or rollback purposes only | Superseded model versions, archived training runs | Secure archival, deletion schedule, access restriction |
Data Classification for AI
Training datasets introduce unique data classification challenges. PII (Personally Identifiable Information) and PHI (Protected Health Information) embedded in training data must be identified, documented, and governed even after model training is complete — because models can memorize and reproduce sensitive training samples.
- Sensitivity tagging: Each dataset should carry a sensitivity classification label (Public, Internal, Confidential, Restricted) that propagates to any model trained on it
- PII/PHI inventory: Cataloging which datasets contain regulated data types and which models were trained on them
- Right to Erasure (GDPR Art. 17): Presents a challenge — deleting an individual's data from a trained model may require model retraining; organizations must have documented policies for this
Model Versioning & Lineage Tracking
Model lineage tracks the provenance of a model: which dataset was used, which hyperparameters were applied, which team member ran the training, and what the performance metrics were at each stage. This is essential for:
- Audit reproduction: Regulators may require reproducing a model's output from a specific point in time
- Incident investigation: Identifying when a compromised dataset was introduced or when a model's behavior changed
- Rollback: Reverting to a known-good prior model version following an incident
Shadow AI Discovery
Shadow AI refers to AI tools and services adopted by employees or business units without IT and security awareness or approval. Unlike traditional shadow IT, shadow AI introduces additional risks:
- Sensitive corporate data fed into public AI services (e.g., employees pasting confidential documents into ChatGPT)
- AI-generated outputs used in business decisions without validation or bias assessment
- Ungoverned third-party data processing violating GDPR or sector-specific regulations
Discovery methods: Network traffic analysis (detecting API calls to known AI providers), SaaS spend audits, browser extension inventory, developer tool surveys, and data loss prevention (DLP) rules tuned to AI service domains.
Data Retention & Deletion Policies
Training datasets must have defined retention schedules. Key considerations: legal hold requirements, regulatory minimum retention periods, the cost of retraining if data is deleted prematurely, and GDPR/CCPA deletion obligations. Secure deletion (cryptographic erasure or physical media destruction) must be documented and verifiable.
🔐 AI Security Program Development & Management (Sub-area D)
Program Charter Elements
The AI Security Program Charter is the foundational governance document that authorizes and scopes the program. A complete charter includes:
- Scope: Which AI systems, processes, and organizational units fall under the program
- Objectives: Specific, measurable outcomes the program aims to achieve
- Authority: Executive sponsorship and reporting lines (typically to CISO or CRO)
- Resources: Budget, headcount, tools, and external services allocated
- Accountability: Named roles responsible for program components
AI Security Roles & Responsibilities
| Role | Primary Responsibilities | Reports To |
|---|---|---|
| AI Security Officer | Oversees AI security strategy, policy, and program; interfaces with CISO and business units | CISO / CRO |
| AI Red Team | Conducts adversarial testing, prompt injection attempts, model extraction exercises, and bias probing | AI Security Officer |
| Data Steward | Manages data quality, classification, lineage, and data governance for AI training datasets | Chief Data Officer / CDO |
| AI Ethics Committee | Reviews AI use cases for fairness, bias, and societal impact; approves high-risk AI deployments | Board / Executive Committee |
| ML Security Engineer | Implements technical controls: model signing, pipeline security, adversarial robustness testing | AI Security Officer |
Policy Hierarchy for AI Security
- Policies: High-level management intent (e.g., "All AI systems processing personal data must undergo privacy impact assessment before deployment")
- Standards: Specific, mandatory requirements derived from policy (e.g., "Models must be version-controlled in an approved MLOps platform")
- Procedures: Step-by-step instructions for implementing standards (e.g., the model review and approval checklist)
- Guidelines: Recommended but non-mandatory practices (e.g., best practices for prompt design to reduce hallucination risk)
KPIs and KRIs for AI Security
AI security programs require metrics that reflect the unique risk environment of AI systems:
| Metric Type | Metric | Purpose |
|---|---|---|
| KPI | % of AI assets with current risk assessment | Measures program coverage |
| KPI | Adversarial attack detection rate | Measures effectiveness of detection controls |
| KPI | Mean time to contain AI incident (MTTC) | Measures IR response speed |
| KRI | Model performance drift beyond threshold | Early warning of potential compromise or data shift |
| KRI | Data quality score below acceptable threshold | Signals training data integrity issues |
| KRI | % of AI assets without approved data classification | Residual governance gap risk indicator |
Security by Design for AI
Security by design means integrating security requirements from the earliest stages of AI model development — at model inception — rather than bolting on controls post-deployment. This includes:
- Threat modeling for AI systems (identifying adversarial input vectors, training data poisoning paths, and inference attack surfaces) before development begins
- Privacy-preserving techniques (differential privacy, federated learning, data minimization) incorporated into the architecture design
- Adversarial robustness requirements specified as non-functional requirements alongside accuracy targets
- Model signing and integrity verification built into the MLOps pipeline from day one
AI Security Awareness Training
Training must be tailored to audience role. The AAISM program distinguishes between:
- Developers & Data Scientists: Secure coding for ML, safe handling of training data, avoiding data leakage in notebooks, recognizing adversarial inputs during testing
- Business Users: Risks of shadow AI tools, appropriate use of AI-generated outputs, escalation paths for suspected AI anomalies
- Executives & Board: AI risk appetite setting, board-level AI security reporting, regulatory exposure from AI incidents
Third-Party AI Security Assessments
When procuring or integrating third-party AI services (e.g., foundation model APIs, AI-powered SaaS tools), organizations must conduct vendor AI security assessments covering: data handling and residency, model access controls, incident notification SLAs, subprocessor chains, and right-to-audit clauses.
🛡️ Business Continuity for AI Systems (Sub-area E — BC)
AI-Specific BCP Considerations
Standard BCP frameworks address infrastructure failures, but AI systems introduce additional disruption scenarios that require explicit treatment in the BC plan:
- Model Unavailability: The model serving infrastructure is down or the model weights are corrupted
- Training Data Corruption: The dataset used for ongoing retraining has been poisoned or becomes unavailable
- Feature Pipeline Failure: Upstream data feeds that generate real-time model inputs fail, producing degraded or null features
- Cloud AI Service Outage: Third-party AI API (e.g., an LLM API) used in a critical business workflow becomes unavailable
- Regulatory Suspension: A regulator orders suspension of an AI system due to compliance findings
RTO and RPO for AI Systems
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) must account for AI-specific factors:
| Concept | Traditional IT Meaning | AI System Nuance |
|---|---|---|
| RTO | Time to restore service after disruption | Must include model reload/rehydration time, inference service warm-up, and feature pipeline re-initialization |
| RPO | Maximum acceptable data loss (time window) | For AI: the maximum acceptable model staleness; if a model cannot be retrained with data newer than N hours, what is the business impact? |
| Model Backup | N/A in traditional IT | Model weights, architecture files, hyperparameter configs, and training checkpoints must be backed up and tested for restorability |
Model Fallback Strategies
When a primary AI model is unavailable or suspected to be compromised, the BC plan must specify a tested fallback strategy:
- Prior Model Version: Revert to the last known-good model version held in the model registry (requires versioned artifact storage)
- Rule-Based System: Fall back to a deterministic, explainable rule engine (e.g., decision tree or business rules) — slower to adapt but predictable
- Human-in-the-Loop Escalation: Route decisions to human reviewers for manual processing — appropriate for high-stakes, low-volume scenarios
- Degraded Mode Operation: Serve predictions with a warning flag indicating reduced confidence or model unavailability
Dependency Mapping
AI BC plans require a dependency map documenting every upstream and downstream dependency of each critical AI system: cloud infrastructure providers, data pipeline orchestrators, feature stores, model registries, inference serving platforms, third-party APIs, and consuming applications. This map is the foundation for failure impact analysis and recovery sequencing.
Testing AI BC Plans
BC plans must be tested periodically. AI-specific test types include: tabletop exercises (simulating a data poisoning event to walk through the IR and recovery playbook), failover drills (activating model fallback and measuring RTO achievement), and chaos engineering experiments (injecting controlled failures into the feature pipeline to verify graceful degradation).
🚨 AI Incident Response (Sub-area E — IR)
AI Incident Categories
| Incident Type | Description | Detection Signals |
|---|---|---|
| Data Poisoning | Malicious data injected into training dataset to corrupt model behavior | Unexpected model accuracy drops, anomalous training data statistics, backdoor trigger patterns in outputs |
| Model Compromise | Unauthorized access to or modification of model weights, architecture, or serving infrastructure | File integrity alerts on model artifacts, unauthorized access logs on model registry |
| Adversarial Attack | Crafted inputs designed to cause model misclassification at inference time | Anomalous input patterns, sudden accuracy degradation on specific input classes, SIEM alerts on inference anomalies |
| Model Theft / Extraction | Attacker reconstructs a model by querying the API at scale and training a surrogate | Unusual API query volumes, repetitive systematic query patterns, scraping behavior in API gateway logs |
| Algorithmic Bias Incident | Model produces systematically discriminatory outputs affecting a protected class | Fairness metric alerts, customer complaints, regulatory inquiry, internal audit findings |
| AI Hallucination Harm | Generative AI produces false information that causes material harm (legal, medical, financial) | User reports, fact-checking failures, downstream decision errors traced to AI outputs |
AI Incident Response Lifecycle (PICERL)
- Preparation: AI incident playbooks, trained IR team including data scientists, pre-established escalation paths, forensic tooling for ML artifacts
- Identification: Detecting anomalous model behavior via SIEM/SOAR alerts, user reports, monitoring dashboards; declaring an AI incident and assigning severity
- Containment: Model rollback to last known-good version, traffic rerouting to fallback system, feature shutdown, rate-limiting or blocking suspicious API callers
- Eradication: Removing poisoned data from training sets, patching vulnerable pipeline components, revoking compromised API credentials, retraining model on verified clean data
- Recovery: Gradual traffic restoration to restored model, monitoring for recurrence, validating model performance against baseline, communicating recovery status to stakeholders
- Lessons Learned: Root cause analysis, post-incident report, control gap remediation, playbook updates, regulatory reporting if required
Containment Strategies for Compromised AI Models
- Model Rollback: Deploying a prior certified model version from the model registry — the fastest containment option when a clean prior version exists
- Feature Shutdown: Disabling specific input features suspected of carrying adversarial or poisoned signal
- Traffic Rerouting: Redirecting inference requests to a fallback rule-based system or human review queue
- API Rate Limiting / Blocking: Throttling or blocking sources exhibiting model extraction query patterns
Evidence Preservation for AI Incidents
AI forensics requires preserving artifacts that do not exist in traditional IT incidents:
- Model artifacts: Snapshots of model weights, configuration files, and feature engineering code at the time of incident
- Inference logs: Input/output pairs logged at the model API layer — critical for reconstructing attack patterns
- Training data snapshots: The exact dataset version used for the current production model
- Pipeline execution records: MLOps pipeline run history showing who triggered which training jobs with which data
Regulatory Notification Requirements
| Regulation | Trigger | Notification Deadline | Recipient |
|---|---|---|---|
| GDPR Art. 33 | Personal data breach, including via AI system compromise that exposes training data | 72 hours from discovery (to supervisory authority); without undue delay to affected individuals if high risk | Lead supervisory authority (DPA) |
| EU AI Act Art. 62 | Serious incident involving high-risk AI system (harm to health, safety, fundamental rights, or significant damage) | Immediately (without undue delay) upon becoming aware | Market surveillance authority; notified body where applicable |
| Sector-specific | AI incident in regulated sector (finance, health, critical infrastructure) | Varies: DORA (36 hours for major ICT incidents), HIPAA (60 days), FCA (as soon as practicable) | Sector regulator |
AI-Specific SIEM/SOAR Integration
Traditional SIEM/SOAR platforms detect threats in IT infrastructure logs. Effective AI incident detection extends these platforms with:
- Model performance telemetry: Streaming accuracy, confidence score distributions, and prediction distributions to the SIEM as time-series events
- Inference log analysis: SOAR playbooks triggered by anomalous input patterns (e.g., high-volume systematic queries indicating model extraction)
- Data pipeline integrity alerts: Alerts on unexpected data schema changes, volume anomalies, or hash mismatches in training data feeds
- Feature drift monitoring: Automated alerts when feature distributions deviate beyond statistical thresholds
Exam tip: The GDPR 72-hour notification clock starts from when the organization becomes aware of the breach — not from when the breach occurred. AI incident response plans must explicitly define what constitutes "awareness" and designate who has authority to make the notification decision.
Memory Hooks
Six mnemonics to lock in the most testable concepts from Sub-areas C, D & E
AI Asset Inventory — What Goes In?
When asked what belongs in an AI asset inventory, recall MAPS-T: Models (all versions), APIs (internal & external), Pipelines (feature engineering & data flows), Services (third-party AI integrations), Training data (datasets & labels). Any exam question listing AI assets should match one of these five categories.
AI Data Lifecycle — All 8 Stages
Collect → Label → Preprocess → Train → Validate → Deploy → Monitor → Retire. The sentence "Can Lucy Produce The Very Delicious Morning Rendition?" maps each word to a lifecycle stage in order. The exam may present stages out of order and ask you to arrange them correctly.
AI Incident Response — PICERL
Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. "Please Identify Contained Enemies, Restore Life" gives you the six phases in order. Note that Containment comes before Eradication — a common distractor reversal on the exam.
GDPR 72-Hour Notification Rule
GDPR Article 33 requires notifying the supervisory authority within 72 hours of becoming aware of a personal data breach. The clock starts at awareness, not at breach occurrence. Remember: 72 hours = 3 days. High-risk breaches also require notifying affected individuals "without undue delay." EU AI Act adds a separate serious-incident notification obligation for high-risk AI systems.
Model Fallback Strategy — 3 Options
When a production AI model must be taken offline, the fallback hierarchy is: Prior stable model version (fastest, lowest disruption) → Rule-based system (deterministic, explainable, slower to adapt) → Human-in-the-loop (manual review, highest cost, appropriate for high-stakes/low-volume). Exam scenarios will test your ability to select the appropriate fallback given the scenario constraints.
AI Security Program — Policy Hierarchy
The four-level hierarchy is: Policies (management intent) → Standards (mandatory requirements) → Procedures (step-by-step instructions) → Guidelines (recommended practices). Standards are mandatory; guidelines are not. "Policies Set the Standard; Procedures Guide" encodes the hierarchy and the key distinction. The AI Security Program Charter sits above all four levels as the authorizing document.
Practice Quiz
10 exam-style questions — instant feedback on each answer
Flashcards
Click any card to flip it and reveal the answer. Work through all 8 to reinforce key AAISM concepts.
Study Advisor
Select a focus area to get targeted study tips and common exam traps
AI Asset Inventory & Data Lifecycle Tips
- Know what's in the inventory: The exam expects you to know that AI asset inventories cover models, APIs, pipelines, third-party AI services, AND training datasets — not just deployed software. Questions often list options that omit one of these categories.
- Shadow AI is not an attack: Shadow AI is a governance gap — unauthorized adoption of AI tools by business users. The response is discovery, risk assessment, and bring-in-or-block governance — not incident response. Don't confuse shadow AI with an active security incident.
- Classification dimensions: AI assets are classified on TWO axes — criticality (business impact of loss) AND sensitivity (data classification of inputs/outputs). Exam distractors often collapse these into one dimension.
- Retired ≠ deleted: A retired AI model in the model registry is retained for rollback and audit. It should be classified as Retired/Deprecated with restricted access — not deleted and not reclassified as Experimental.
- Model lineage goes beyond performance tracking: Model lineage is about security, audit, and incident investigation — not just optimizing accuracy. Know that lineage enables root cause analysis when a model behaves unexpectedly.
- GDPR and training data deletion: Right to erasure requests against AI systems may require model retraining, not just database record deletion. The exam tests whether you understand this AI-specific complexity.
AI Security Program Development Tips
- Charter vs. Policy: The charter authorizes the program (scope, authority, budget). Policies express management intent for how AI security objectives should be met. Don't confuse these — the charter comes first and sits above the policy hierarchy.
- Policy hierarchy order: Policy → Standard → Procedure → Guideline. Standards are mandatory; guidelines are not. Step-by-step instructions belong in Procedures, not Standards. This is a common distractor — the exam often asks which document type should contain specific content.
- KPI vs. KRI distinction: KPIs measure how well you're doing (backward-looking performance). KRIs are early warning indicators of emerging risk (forward-looking). Model drift is a KRI; detection rate is a KPI. This distinction appears on nearly every ISACA exam.
- Security by design timing: Must start at inception/requirements phase — not at testing or deployment. Any answer option suggesting controls are added during testing or post-deployment is not "security by design."
- AI Red Team scope: The AI Red Team tests the security of AI systems through adversarial techniques — prompt injection, model extraction attempts, adversarial input crafting. They are not the same as a traditional penetration testing team.
- Awareness training is role-differentiated: Developers need secure ML coding training; business users need shadow AI awareness; executives need board-level risk reporting content. One-size-fits-all training is incorrect for AAISM purposes.
AI Data & Model Lifecycle Tips
- Data lifecycle has 8 stages; model lifecycle has 5-6: Be able to list both independently. The exam may ask you to identify which lifecycle a described activity belongs to — data lifecycle vs. model lifecycle are distinct.
- Each lifecycle stage has a distinct threat: Collection → consent/bias; Labeling → label poisoning; Training → data poisoning; Deployment → adversarial attacks; Monitoring → concealment; Retirement → incomplete deletion. Know the primary threat at each stage.
- Model versioning enables rollback: This is a security control, not just a DevOps convenience. The ability to roll back to a prior model version is a key containment strategy in AI incident response — it requires artifact storage in a model registry.
- Feature pipeline security is often overlooked: The exam may test that feature pipelines (data transformation code that generates model inputs) are themselves AI assets requiring security controls and inclusion in the asset inventory.
- Zombie model risk: Deprecated models that remain accessible via API but are no longer monitored represent a security risk — they can be exploited without detection. Proper retirement includes access revocation, not just classification change.
AI Business Continuity Tips
- AI BCP scenarios go beyond infrastructure: Standard BCP covers hardware/network failure. AI BCP must additionally address model unavailability, data corruption, feature pipeline failure, and cloud AI service outages. Exam scenarios will test AI-specific disruption types.
- RTO includes model warm-up time: This is the most tested AI-specific nuance of RTO. The time to reload model weights, initialize the serving infrastructure, and validate prediction quality before accepting production traffic is an AI-only element of RTO.
- RPO for AI = model staleness + data loss: Traditional RPO measures data loss. AI RPO must also define acceptable model age — how out-of-date can the model be before predictions become unacceptable for the use case?
- Fallback hierarchy: PRH: Prior version (least disruptive) → Rule-based (moderate disruption) → Human-in-the-loop (most disruptive/costly). For high-stakes scenarios where an older model version may also be compromised, the correct answer may skip directly to human review.
- BC plans must be tested: Tabletop exercises, failover drills, and chaos engineering tests are all required. An untested BC plan is not an acceptable control — this is a principle across all ISACA certifications.
- Dependency mapping is the foundation: You cannot write a valid AI BC plan without knowing all upstream dependencies. A question asking "what is the FIRST step in developing an AI BC plan" may have dependency mapping as the correct answer.
AI Incident Response Tips
- PICERL phase order is tested: Containment ALWAYS precedes Eradication — a common distractor reverses these. You contain first to limit damage, then eradicate the root cause. Recovery comes after eradication, not before.
- Know all six AI incident types: Data poisoning, model compromise, adversarial attack, model theft/extraction, algorithmic bias incident, and AI hallucination causing harm. Each has distinct detection signals and containment strategies.
- Model extraction vs. adversarial attack: Model extraction is systematic high-volume querying to clone the model. Adversarial attack crafts specific inputs to fool the live model. Both are inference-time threats, but they are different incident types requiring different responses.
- GDPR 72-hour clock starts at awareness: This is the most commonly tested IR regulatory detail. The clock starts when the organization BECOMES AWARE — not when the breach occurred. This is explicitly tested in exam scenarios that give you the breach time and the awareness time.
- EU AI Act adds a separate notification obligation: For high-risk AI systems under the EU AI Act, a serious incident (harm to health, safety, or fundamental rights) must be reported to the market surveillance authority "without undue delay" — separate from and in addition to any GDPR notification.
- Evidence preservation in AI IR: You must preserve model artifacts, inference logs, training data snapshots, and pipeline execution records — not just network logs and system logs. Data scientists must be involved in the IR team for AI incidents.
- Lessons Learned triggers model retraining consideration: After an AI incident, the post-incident review must assess whether the model itself needs to be retrained on clean data, not just whether infrastructure controls need improvement.
Resources
Official and authoritative references for AAISM Domain 1 Sub-areas C, D & E
ISACA AAISM Certification — Official Page
Official ISACA page for the AAISM credential. Access the exam content outline, eligibility requirements, and candidate resources. Essential first stop for all exam preparation.
ISACA Journal — AI Governance & Security
ISACA Journal articles on AI governance and security management. Aligns directly with AAISM Domain 1 content including program management, asset lifecycle, and incident response frameworks.
GDPR Article 33 — Notification of a Personal Data Breach
Full text of GDPR Article 33 specifying the 72-hour supervisory authority notification requirement. Critical reading for the incident response regulatory notification section of the AAISM exam.
EU AI Act — European Commission Regulatory Framework
Official European Commission page on the EU AI Act. Covers Article 62 serious incident reporting obligations for high-risk AI systems — directly tested in the AAISM incident response domain.
NIST AI Risk Management Framework (AI RMF 1.0)
NIST's AI RMF provides the governance, mapping, measuring, and managing structure for AI risk — directly aligned with AAISM program management content. Key reference for AI security program design and KPI/KRI selection.
FlashGenius AAISM Practice Tests — Full Exam Simulator
Exam-style practice questions across all 5 AAISM domains, with detailed explanations for every answer. Adaptive difficulty, timed sessions, and domain-level performance analytics to identify weak areas before exam day.