Building an ISMS for AI Systems
An Information Security Management System provides the framework for managing information security risks systematically. Extending an ISMS to cover AI requires identifying AI-specific assets, threats, and controls.
ISMS Fundamentals
An ISMS is a systematic approach to managing sensitive information so that it remains secure. It encompasses people, processes, and technology through a risk management framework. The core cycle follows the Plan-Do-Check-Act (PDCA) model:
- Plan: Establish the ISMS policy, objectives, processes, and procedures
- Do: Implement and operate the ISMS
- Check: Monitor and review the ISMS performance
- Act: Maintain and improve the ISMS based on findings
AI-Specific Assets to Include
When extending your ISMS scope to include AI, these assets must be inventoried and classified:
| Asset Category | Examples | Classification |
|---|---|---|
| Training data | Datasets, labels, annotations | Confidential to Restricted |
| Models | Weights, architectures, hyperparameters | Confidential |
| AI infrastructure | GPU clusters, training pipelines, serving endpoints | Internal |
| Prompts and configurations | System prompts, fine-tuning configs, RAG pipelines | Confidential |
| AI outputs | Predictions, generated content, decisions | Varies by use case |
| Evaluation data | Test sets, benchmarks, red team results | Confidential |
AI Risk Assessment Process
The ISMS risk assessment for AI should follow this structured approach:
Identify AI Assets
Catalog all AI-related assets including models, data, infrastructure, and personnel with AI expertise.
Identify Threats
Enumerate threats specific to AI: adversarial attacks, data poisoning, model theft, prompt injection, supply chain compromises of AI libraries.
Assess Vulnerabilities
Evaluate AI system vulnerabilities: model robustness, data pipeline security, inference endpoint exposure, third-party AI service dependencies.
Calculate Risk
Determine the likelihood and impact of each risk scenario using your organization's risk criteria and scoring methodology.
Treat Risks
Select treatment options: mitigate with controls, transfer via insurance or outsourcing, accept with documented rationale, or avoid by not deploying the AI system.
Documenting the AI ISMS
ISO 27001 requires specific documentation. For AI systems, ensure you document:
- AI security policy and objectives
- AI asset inventory and classification
- AI-specific risk assessment methodology and results
- Statement of Applicability (SoA) covering AI controls
- AI model lifecycle security procedures
- Third-party AI vendor assessment records
- AI incident response procedures
Lilly Tech Systems