hewyler commited on
Commit
d164597
·
verified ·
1 Parent(s): f617be3

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +75 -34
README.md CHANGED
@@ -1,34 +1,75 @@
1
- ---
2
- license: mit
3
- configs:
4
- - config_name: default
5
- data_files:
6
- - split: train
7
- path: data/train-*
8
- dataset_info:
9
- features:
10
- - name: Taxonomy
11
- dtype: string
12
- - name: Scenario
13
- dtype: string
14
- - name: Risk Description
15
- dtype: string
16
- - name: Priority
17
- dtype: int64
18
- - name: Control Name
19
- dtype: string
20
- - name: Control Activities
21
- dtype: string
22
- - name: COBIT Objectives
23
- dtype: string
24
- - name: Attribution
25
- dtype: string
26
- - name: Related Standards
27
- dtype: string
28
- splits:
29
- - name: train
30
- num_bytes: 33340
31
- num_examples: 100
32
- download_size: 18231
33
- dataset_size: 33340
34
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ ---
3
+ license: cc-by-4.0
4
+ task_categories:
5
+ - tabular-classification
6
+ - risk-assessment
7
+ tags:
8
+ - ISO-42001
9
+ - ISO-42005
10
+ - COBIT-2019
11
+ - GRC
12
+ - ai-governance
13
+ - internal-controls
14
+ language:
15
+ - en
16
+ size_categories:
17
+ - n<1K
18
+ ---
19
+
20
+ # AI Risk Scenarios & Control Library
21
+
22
+ ## Dataset Summary
23
+
24
+ This dataset contains **100 Common AI Risk Scenarios** paired with specific **Control Activities**. It is designed to serve as the operational backbone for an **ISO/IEC 42001 (AI Management System)**.
25
+
26
+ While ISO 42001 provides the "What" (Requirements), this dataset provides the "How" (Scenarios and Controls), specifically mapping to **ISO/IEC 42005 (AI Risk Management)** impact assessments and **COBIT 2019** objectives.
27
+
28
+ ## Author & Attribution
29
+
30
+ This library was developed and curated by:
31
+ **Prof. Hernan Huwyler, MBC, CPA**
32
+ * Academic Director
33
+ * AI GRC Director
34
+
35
+ *This dataset reflects a synthesis of global best practices in IT Audit and AI Governance.*
36
+
37
+ ## Dataset Structure
38
+
39
+ The dataset contains the following fields:
40
+
41
+ * **Taxonomy:** The domain of the risk (e.g., *Strategy, Governance, Architecture, Lifecycle*).
42
+ * **Scenario:** The short name of the risk event.
43
+ * **Risk description:** A detailed explanation of what goes wrong and the resulting impact (Financial, Reputational, Operational).
44
+ * **Priority:** Suggested risk rating (1 = High, 3 = Low) to assist in heatmapping.
45
+ * **Control name:** The title of the mitigation strategy.
46
+ * **Recommended control activities:** The specific steps, documentation, or technical implementations required to mitigate the risk.
47
+ * **COBIT 2019 Objectives:** Mapping to the COBIT framework (e.g., *Align, Plan and Organize*).
48
+
49
+ ## Use Cases
50
+
51
+ ### 1. ISO 42001 Implementation (Annex A)
52
+ When implementing the internal controls listed in **ISO 42001 Annex A**, use this dataset to flesh out the specific activities.
53
+ * *Annex A Reference:* **A.6.1 AI System Life Cycle**.
54
+ * *Dataset Mapping:* Filter by `Taxonomy = Lifecycle` to find controls for "Hypothesis Testing" and "Model Validation."
55
+
56
+ ### 2. AI Risk Assessment (ISO 42001,ISO 42005, ISO 32894, NIST AI RISK)
57
+ Use the **Risk description** column to populate your Risk Register.
58
+ * *Scenario:* "Model Overfitting".
59
+ * *Impact:* "Model performs well on training data but poorly on new data."
60
+ * *Mitigation:* Implement "Overfitting mitigation" controls defined in this dataset.
61
+
62
+ ### 3. Audit & Assurance
63
+ Internal Auditors can use the **Recommended control activities** as a checklist to verify if the organization's AI governance is effective.
64
+
65
+ ## Example Data
66
+
67
+ | Taxonomy | Scenario | Priority | Control Name | Control Activities |
68
+ |---|---|---|---|---|
69
+ | **Strategy** | Strategy deficiency | 1 | Enterprise AI strategy | Develop and implement a comprehensive enterprise-wide AI strategy aligning with business objectives. |
70
+ | **Lifecycle** | Data accuracy failures | 1 | Data accuracy verification | Enforce data accuracy verification standards. Document validation, error detection, and correction processes. |
71
+ | **Security** | Vulnerability blindness | 3 | Vulnerability testing | Conduct periodic penetration tests and 'Red-team' reviews. |
72
+
73
+ ## Citation
74
+ If you use this dataset in research or corporate frameworks, please cite:
75
+ > Huwyler, H. (2024). AI Risk Scenarios & Control Library. Hugging Face Datasets.