Risk Control Effectiveness Checklist
Checklist for verifying the effectiveness of implemented risk controls.
15 min
Read Time
Level
Checklist Progress
0 of 66 items completed
This checklist provides a systematic method for evaluating the effectiveness of risk controls implemented for AI systems. Use this checklist to verify that controls are adequately designed, properly implemented, and operating effectively to mitigate identified risks.
- Complete this checklist periodically for all AI systems with implemented controls
- Frequency: High-Risk AI (quarterly), Limited/Minimal Risk (annually)
- Document evidence for each control evaluated
- Address any gaps or deficiencies identified
- Update risk assessments based on findings
2.1.1Control addresses the identified risk directly
Partial2.1.2Control specification is clear and documented
Partial2.1.3Control has defined success criteria/metrics
Partial2.1.4Control is proportionate to the risk level
Partial2.1.5Control does not introduce new significant risks
Partial2.1.6Control aligns with regulatory requirements
Partial2.1.7Control has assigned ownership
Partial2.2.1Control addresses the identified risk directly
Partial2.2.2Control specification is clear and documented
Partial2.2.3Control has defined success criteria/metrics
Partial2.2.4Control is proportionate to the risk level
Partial2.2.5Control does not introduce new significant risks
Partial2.2.6Control aligns with regulatory requirements
Partial2.2.7Control has assigned ownership
Partial4.1.1Automated controls functioning correctly
Partial4.1.2Control triggers activate as designed
Partial4.1.3Alerts/notifications working
Partial4.1.4Logging of control activities operational
Partial4.1.5System performance within parameters
Partial4.2.1Procedures being followed consistently
Partial4.2.2Required reviews/approvals occurring
Partial4.2.3Documentation maintained as required
Partial4.2.4Escalation procedures followed
Partial4.2.5Communication occurring as required
Partial4.3.1Human oversight occurring as designed
Partial4.3.2Override capability tested and functional
Partial4.3.3Personnel competent to perform oversight
Partial4.3.4Decision support information adequate
Partial4.3.5Stop/intervention capability functional
Partial5.1Bias detection mechanisms operational
Partial5.2Fairness metrics being monitored
Partial5.3Bias thresholds trigger alerts
Partial5.4Bias mitigation actions effective
Partial5.5Regular bias testing conducted
Partial5.6Results reviewed and acted upon
Partial6.1Accuracy monitoring in place
Partial6.2Accuracy within acceptable thresholds
Partial6.3Performance degradation detection working
Partial6.4Model drift monitoring operational
Partial6.5Adversarial attack protections effective
Partial6.6Fail-safe mechanisms functional
Partial7.1Access controls functioning properly
Partial7.2Authentication mechanisms effective
Partial7.3Encryption implemented as designed
Partial7.4Security monitoring operational
Partial7.5Vulnerability management effective
Partial7.6Incident detection capabilities working
Partial8.1Data quality controls effective
Partial8.2Data access controls functioning
Partial8.3Data retention controls enforced
Partial8.4Data lineage tracking operational
Partial8.5Personal data protection controls effective
Partial9.1Automatic logging capturing required events
Partial9.2Log integrity protected
Partial9.3Log retention meeting requirements
Partial9.4Audit trail complete and accurate
Partial9.5Logs accessible for review/investigation
Partial1[ ] High [ ] Medium [ ] Low
Not Started2[ ] High [ ] Medium [ ] Low
Not Started3[ ] High [ ] Medium [ ] Low
Not Started1[ ] Open [ ] In Progress [ ] Complete
Not Started2[ ] Open [ ] In Progress [ ] Complete
Not Started3[ ] Open [ ] In Progress [ ] Complete
Not Started1[ ] High [ ] Medium [ ] Low
Not Started2[ ] High [ ] Medium [ ] Low
Not Started3[ ] High [ ] Medium [ ] Low
Not Started