AAT-10.11: AI TEVV Effectiveness
Mechanisms exist to evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV).
Control Question: Does the organization evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV)?
General (3)
| Framework | Mapping Values |
|---|---|
| NIST AI 100-1 (AI RMF) 1.0 | MEASURE 2.13 |
| NIST AI 600-1 | MG-4.1-002 |
| SCF CORE AI Model Deployment | AAT-10.11 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV).
Level 1 — Performed Informally
C|P-CMM1 is N/A, since a structured process is required to report the status and results of Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV) to relevant stakeholders, including governing bodies, as required.
Level 2 — Planned & Tracked
C|P-CMM2 is N/A, since a well-defined process is required in this domain to evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV).
Level 3 — Well Defined
Artificial Intelligence and Autonomous Technology (AAT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy and prioritizes the objectives of the security function to determine prioritized and authoritative guidance for Artificial Intelligence and Autonomous Technologies (AAT), within the broader scope of cybersecurity and data protection operations.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization. This CONOPS for AAT may be incorporated as part of a broader operational plan for the cybersecurity and data privacy program.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to facilitate the implementation of secure and compliant practices to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data. Compliance requirements for AAT are identified and documented.
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including AAT. The steering committee establishes a clear and authoritative accountability structure for AAT operations.
- Legal reviews are conducted to minimize the inadvertent infringement of third-party Intellectual Property (IP) rights through the use of AAT products and/ or services.
- AAT-specific compliance requirements for cybersecurity and data privacy are identified and documented.
- Governance function for AAT is formally assigned with defined roles and associated responsibilities.
- A Program Management Office (PMO), or similar function, tracks and reports on activities related to the mapping, measuring and managing of AAT.
- Secure engineering principles are identified and implemented to ensure AAT are designed to be reliable, safe, fair, secure, resilient, transparent, explainable and data privacy-enhanced to minimize emergent properties or unintended consequences.
- Robust development and pre-deployment functionality, security and data privacy testing is conducted on all internal and third-party AAT projects.
- Production use of AAT is closely monitored to minimize emergent properties or unintended consequences.
- Robust incident response and business continuity plans exist to respond to AAT-related emergent properties or unintended consequences.
- Data sources utilized in the training and/or operation of AAT are identified and documented.
- The Confidentiality, Integrity and Availability (CIA) of source data to prevent accidental contamination or malicious corruption (e.g., data poisoning) that could compromise the performance of AAT.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV).
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to evaluate the effectiveness of the processes utilized to perform Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV).
Assessment Objectives
- AAT-10.11_A01 After Action Reviews (AARs), or similar lessons learned exercises, are conducted after each Artificial Intelligence Test, Evaluation, Validation & Verification (AI TEVV) cycle to evaluate the effectiveness of the AI TEVV processes.
Technology Recommendations
Micro/Small
- Information Assurance (IA) Program
- Artificial Intelligence (AI) / autonomous technologies governance program
Small
- Information Assurance (IA) Program
- Artificial Intelligence (AI) / autonomous technologies governance program
Medium
- Information Assurance (IA) Program
- Artificial Intelligence (AI) / autonomous technologies governance program
Large
- Information Assurance (IA) Program
- Artificial Intelligence (AI) / autonomous technologies governance program
Enterprise
- Information Assurance (IA) Program
- Artificial Intelligence (AI) / autonomous technologies governance program