ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Introductory Guidance to AICM
Introductory Guidance to AICM
Who it's for:
  • AI Service Customers
  • AI Service Providers
  • Auditors and Consultants

Introductory Guidance to AICM

Release Date: 11/19/2025

The AI Controls Matrix (AICM) provides a foundational security and governance framework for AI service providers and customers. It helps them securely implement, assess, and manage AI systems across the AI supply chain.

The AICM establishes a clear and actionable set of AI risk management controls and supporting mechanisms. CSA has tailored these controls to the unique risks and responsibilities inherent in AI development, deployment, and consumption.

This document provides introductory guidance on the AICM. Understand what the AICM is, how to use it, and the various resources available that can help you get the most out of it.

Key Takeaways: 
  • The primary purpose of the AICM
  • How the components of the AICM work, including the mappings, AI-CAIQ, Implementation Guidelines, and Auditing Guidelines
  • Who should use the AICM, and in what ways
  • The purpose, scope, and structure of the AICM Implementation Guidelines
  • The purpose, scope, and structure of the AICM Auditing Guidelines
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Securing Application-to-Application Traffic with AI/AGI/ML-Powered Virtual Firewalls: A Comprehensive Framework for Multi-Cloud, Hybrid, and On-Premises Environments
Securing Application-to-Application Traffic with AI/AGI/ML-Powered ...
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Virtual

Interested in helping develop research with CSA?

Related Certificates & Training