A.2 AI Vendor Risk Assessment Checklist

accordion rap, japanese surf rock, pop g-funk · 2:44

Listen on 93

Lyrics

[Verse 1]
Before you sign that vendor deal, pause and investigate
Where does your precious data live, which laws will regulate?
Geography determines rights, sovereignty takes the throne
US servers, EU rules, make sure the zone is known

[Chorus]
Check the SOC, audit trail, sub-processors in the mix
Encryption shields, access sealed, incident response tricks
Data stays or data goes, training models on your gold
Vendor risk assessment flows, stories that must be told

[Verse 2]
Retention clocks are ticking fast, deletion promises made
Can they purge your information when the contract starts to fade?
Customer data feeds their brain, training algorithms grow
But can you opt your secrets out, or will they steal the show?

[Chorus]
Check the SOC, audit trail, sub-processors in the mix
Encryption shields, access sealed, incident response tricks
Data stays or data goes, training models on your gold
Vendor risk assessment flows, stories that must be told

[Bridge]
Transit, rest, and processing, three encryption states
Authentication gates and keys, access that never waits
Liability and indemnity, who pays when systems crack
Business continuity, disaster bounces back

[Verse 3]
Sub-processor inventory, third parties in the chain
Each vendor needs inspection, weak links cause the pain
Breach notification timing, how fast will they confess
Response plans and recovery, cleaning up the mess

[Chorus]
Check the SOC, audit trail, sub-processors in the mix
Encryption shields, access sealed, incident response tricks
Data stays or data goes, training models on your gold
Vendor risk assessment flows, stories that must be told

[Outro]
Ten essential checkpoints guard your corporate gate
AI vendor vetting done, security's first rate

← A.1 AI Acceptable Use Policy (Outline) | A.3 AI Incident Classification Matrix →