AI security & compliance
Readiness assessment

25-question self-assessment to score AI security maturity and map compliant clauses across OWASP AIMA, NIST AI RMF, ISO/IEC 42001, and the EU AI Act. 

Estimated time: less than 5 minutes

Overall Progress
0 of 25 questions
Governance & Accountability
AI Inventory & Risk Identification
Security & Technical Controls
Transparency & Lifecycle Assurance
Continuous Improvement & Compliance Proof
Have you formally assigned roles and responsibilities for AI risk management?
Do you maintain an up-to-date inventory of all AI models, agents, datasets, and services (AI-BOM)?
Is every AI component tagged with ownership, business purpose, and sensitivity classification?
Do you perform threat modeling specific to AI (e.g., prompt injection, data poisoning, model theft)?
Do you conduct risk assessments before deploying new AI models or agents?
Are data sources for AI training and inference validated for quality, provenance, and appropriateness?
Do you have controls to prevent unauthorized access to AI models, prompts, and training data?
Is model output monitored for hallucinations, bias, leakage, or other unsafe behaviors?
Do you maintain audit logs for AI decisions, training events, model changes, and access?
Have you defined and communicated policies for acceptable AI use and security standards?
Are inputs and outputs validated to prevent prompt injection, jailbreaks, and data leakage?
Do you test AI systems for resilience against adversarial or red-team attacks (continuous where possible)?
Do you quantify AI weaknesses or findings with a consistent metric or score?
Is your AI risk register reviewed at a scheduled cadence by governance stakeholders?
Do you maintain model cards or equivalent documentation of model design choices, assumptions, and risks?
Are bias/fairness evaluations conducted and documented for each production AI model?
Is AI risk integrated into your broader AppSec/SDLC (gates, PR checks, CI/CD, change mgmt)?
Do you review third-party AI components for licensing, vulnerabilities, and malicious packages/models?
Do you produce periodic AI risk reports for executives or boards?
Are human oversight mechanisms defined for AI decision approval/escalation in high-impact use cases?
Do you conduct post-deployment monitoring for performance, drift, and security anomalies?
Is there a documented and tested incident response plan for AI failures or breaches?
Do you perform periodic internal audits of AI risk and compliance requirements?
Are corrective actions tracked and validated after each AI incident, assessment, or audit?
Do you publicly document your AI governance and trustworthiness commitments (e.g., transparency report)?
Assessment results
Your AI security & compliance maturity report
Average Score: / 4.0
Questions Answered Yes: / 25
Section Breakdown
Governance & Accountability
coverage
AI Inventory & Risk Identification
coverage
Security & Technical Controls
coverage
Transparency & Lifecycle Assurance
coverage
Continuous Improvement & Compliance Proof
coverage
Recommended Next Steps
Mend.io Solutions
Gaps to Address
EU AI Act
ISO/IEC 42001
NIST AI RMF
OWASP AI-MA
Annex IV (Technical Documentation)
Article 10
Article 10(2)
Article 13
Article 14
Article 15(1)
Article 15(2)
Article 15(3)
Article 15(4)
Article 17
Article 19
Article 9
Article 9(2)
Article 9(3)
Annex A.7
Clause 10.2
Clause 10.3
Clause 5.2
Clause 5.3
Clause 6.1
Clause 6.2
Clause 6.3
Clause 8.1
Clause 8.2
Clause 8.3
Clause 8.4
Clause 8.5
Clause 9.1
Clause 9.2
Clause 9.3
GOVERN 1.1
GOVERN 1.2
GOVERN 1.4
GOVERN 2.2
GOVERN 3.1
GOVERN 3.3
GOVERN 3.4
GOVERN 4.1
MANAGE 1.3
MANAGE 1.4
MANAGE 2.1
MANAGE 2.4
MANAGE 3.1
MANAGE 3.3
MAP 1.2
MAP 1.3
MAP 2.2
MEASURE 1.1
MEASURE 2.2
MEASURE 2.3
MEASURE 3.2
Access Control
Asset Mapping
Asset Metadata
Audit
Audit & Logging
Behavioral Monitoring
Bias & Fairness Testing
Corrective Actions
Data Quality & Provenance §3.1
Explainability
Governance
Governance & Policies
Governance Reporting
Governance Review
Human Oversight
IR & Containment
Lifecycle Security
Operational Monitoring
Prompt Security
Risk Assessment
Supply Chain §2.4
Testing §4 (Red Teaming)
Threat Modeling §2.2
Transparency
Validation §3.1
Vulnerability Classification
No gaps - fully compliant!
Learn more
EU AI Act
Annex IV (Technical Documentation)
Article 10
Article 10(2)
Article 13
Article 14
Article 15(1)
Article 15(2)
Article 15(3)
Article 15(4)
Article 17
Article 19
Article 9
Article 9(2)
Article 9(3)
No gaps - fully compliant!
ISO/IEC 42001
Annex A.7
Clause 10.2
Clause 10.3
Clause 5.2
Clause 5.3
Clause 6.1
Clause 6.2
Clause 6.3
Clause 8.1
Clause 8.2
Clause 8.3
Clause 8.4
Clause 8.5
Clause 9.1
Clause 9.2
Clause 9.3
No gaps - fully compliant!
NIST AI RMF
GOVERN 1.1
GOVERN 1.2
GOVERN 1.4
GOVERN 2.2
GOVERN 3.1
GOVERN 3.3
GOVERN 3.4
GOVERN 4.1
MANAGE 1.3
MANAGE 1.4
MANAGE 2.1
MANAGE 2.4
MANAGE 3.1
MANAGE 3.3
MAP 1.2
MAP 1.3
MAP 2.2
MEASURE 1.1
MEASURE 2.2
MEASURE 2.3
MEASURE 3.2
No gaps - fully compliant!
OWASP AI-MA
Access Control
Asset Mapping
Asset Metadata
Audit
Audit & Logging
Behavioral Monitoring
Bias & Fairness Testing
Corrective Actions
Data Quality & Provenance §3.1
Explainability
Governance
Governance & Policies
Governance Reporting
Governance Review
Human Oversight
IR & Containment
Lifecycle Security
Operational Monitoring
Prompt Security
Risk Assessment
Supply Chain §2.4
Testing §4 (Red Teaming)
Threat Modeling §2.2
Transparency
Validation §3.1
Vulnerability Classification
No gaps - fully compliant!
Compliant Clauses
EU AI Act
ISO/IEC 42001
NIST AI RMF
OWASP AI-MA
Annex IV (Technical Documentation)
Article 10
Article 10(2)
Article 13
Article 14
Article 15(1)
Article 15(2)
Article 15(3)
Article 15(4)
Article 17
Article 19
Article 9
Article 9(2)
Article 9(3)
Annex A.7
Clause 10.2
Clause 10.3
Clause 5.2
Clause 5.3
Clause 6.1
Clause 6.2
Clause 6.3
Clause 8.1
Clause 8.2
Clause 8.3
Clause 8.4
Clause 8.5
Clause 9.1
Clause 9.2
Clause 9.3
GOVERN 1.1
GOVERN 1.2
GOVERN 1.4
GOVERN 2.2
GOVERN 3.1
GOVERN 3.3
GOVERN 3.4
GOVERN 4.1
MANAGE 1.3
MANAGE 1.4
MANAGE 2.1
MANAGE 2.4
MANAGE 3.1
MANAGE 3.3
MAP 1.2
MAP 1.3
MAP 2.2
MEASURE 1.1
MEASURE 2.2
MEASURE 2.3
MEASURE 3.2
Access Control
Asset Mapping
Asset Metadata
Audit
Audit & Logging
Behavioral Monitoring
Bias & Fairness Testing
Corrective Actions
Data Quality & Provenance §3.1
Explainability
Governance
Governance & Policies
Governance Reporting
Governance Review
Human Oversight
IR & Containment
Lifecycle Security
Operational Monitoring
Prompt Security
Risk Assessment
Supply Chain §2.4
Testing §4 (Red Teaming)
Threat Modeling §2.2
Transparency
Validation §3.1
Vulnerability Classification
No compliant clauses yet
Learn more
EU AI Act
Annex IV (Technical Documentation)
Article 10
Article 10(2)
Article 13
Article 14
Article 15(1)
Article 15(2)
Article 15(3)
Article 15(4)
Article 17
Article 19
Article 9
Article 9(2)
Article 9(3)
No gaps - fully compliant!
ISO/IEC 42001
Annex A.7
Clause 10.2
Clause 10.3
Clause 5.2
Clause 5.3
Clause 6.1
Clause 6.2
Clause 6.3
Clause 8.1
Clause 8.2
Clause 8.3
Clause 8.4
Clause 8.5
Clause 9.1
Clause 9.2
Clause 9.3
No gaps - fully compliant!
NIST AI RMF
GOVERN 1.1
GOVERN 1.2
GOVERN 1.4
GOVERN 2.2
GOVERN 3.1
GOVERN 3.3
GOVERN 3.4
GOVERN 4.1
MANAGE 1.3
MANAGE 1.4
MANAGE 2.1
MANAGE 2.4
MANAGE 3.1
MANAGE 3.3
MAP 1.2
MAP 1.3
MAP 2.2
MEASURE 1.1
MEASURE 2.2
MEASURE 2.3
MEASURE 3.2
No gaps - fully compliant!
OWASP AI-MA
Access Control
Asset Mapping
Asset Metadata
Audit
Audit & Logging
Behavioral Monitoring
Bias & Fairness Testing
Corrective Actions
Data Quality & Provenance §3.1
Explainability
Governance
Governance & Policies
Governance Reporting
Governance Review
Human Oversight
IR & Containment
Lifecycle Security
Operational Monitoring
Prompt Security
Risk Assessment
Supply Chain §2.4
Testing §4 (Red Teaming)
Threat Modeling §2.2
Transparency
Validation §3.1
Vulnerability Classification
No gaps - fully compliant!

Get your results

including a compliance readiness snapshot