Security (CC) Mapping
Map AI controls to Common Criteria: CC6.1 (logical access), CC6.2 (credentials), CC6.3 (access removal), CC6.6 (external threats), CC6.7 (transmission security), CC6.8 (unauthorized changes), CC7.1 (monitoring), CC7.2 (anomaly detection).
Availability (A) Mapping
Map to Availability criteria: A1.1 (capacity management), A1.2 (environmental protections), A1.3 (recovery). AI platforms should demonstrate: multi-provider failover, auto-scaling, and disaster recovery procedures.
Confidentiality (C) Mapping
Map to Confidentiality criteria: C1.1 (identification of confidential info), C1.2 (disposal). PII redaction and zero-history architecture directly satisfy many confidentiality requirements.
Processing Integrity (PI) Mapping
Map to Processing Integrity criteria: PI1.1 (quality objectives), PI1.2 (system inputs), PI1.3 (system processing), PI1.4 (system output), PI1.5 (storage). Guardrails and audit logs demonstrate processing integrity controls.
.png)