Briefing 6 min read

Vendor Risk Management When Adopting AI Tools

A practical framework for CISOs evaluating AI tool vendors: data residency requirements, model security considerations, and the contractual controls that protect your organization.

The adoption curve for AI tools in the enterprise has outpaced the development of vendor risk frameworks designed to evaluate them. Organizations are integrating large language model-based products into workflows involving customer data, internal communications, proprietary code, and strategic planning — often through a procurement process designed for conventional SaaS vendors that does not ask the right questions.

CISOs have a narrow window to establish governance before the sprawl becomes unmanageable. The goal is not to slow AI adoption, which would be both ineffective and counterproductive. It is to ensure that adoption happens with visibility, with appropriate controls, and with contractual protection that reflects the actual risk profile of AI tools.

Why AI Vendors Present Different Risk

Conventional SaaS risk assessment focuses on data storage, access controls, and breach notification. These questions remain relevant for AI vendors, but they are insufficient because AI tools introduce risk categories that conventional frameworks do not address:

Training data ingestion. Many AI products, particularly those offered at no or low cost, train on or fine-tune models using customer-provided data. This raises the possibility that proprietary information — source code, internal communications, customer data — becomes embedded in model weights that are then used to respond to queries from other organizations. The risk is not theoretical: several instances of inadvertent data disclosure through AI tools have been documented where organizations later discovered that queries from other users elicited outputs based on their previously submitted data.

Model inference security. When a user queries an AI tool with sensitive information, where does that query go? Is it processed in a multi-tenant environment? Are inference logs retained? For how long? Can they be accessed by vendor staff? Are they used to improve the model? These questions have no equivalent in a traditional SaaS context.

Prompt injection and manipulation. AI tools that process external content — documents, emails, web content — are vulnerable to prompt injection attacks, where adversarial instructions embedded in processed content hijack the tool’s behavior. For organizations using AI assistants with access to email, calendars, or code repositories, this creates novel attack surfaces.

Agentic capabilities. As AI tools move from passive assistance to active execution — booking calendar events, sending emails, making API calls — the blast radius of a compromise or manipulation expands dramatically. An AI tool with read access to data is a confidentiality risk. An AI tool with write access to systems is an integrity risk.

Data Residency: The Foundation

Before any other evaluation, establish where your data goes and where it is processed. This is not a new question, but AI vendors have introduced some nuance.

The relevant data categories for an AI tool assessment include: the content you submit in queries (prompts), the outputs the tool generates, any fine-tuning data you provide, and inference logs (the record of queries and responses maintained by the vendor).

For each category, you need to know: the geographic location of processing, the geographic location of storage, the duration of retention, the access controls governing who at the vendor can access the data, and the conditions under which the data is used to train or improve models.

For organizations subject to GDPR, data processing agreements (DPAs) are required with any AI vendor that processes personal data on your behalf. Many AI vendor DPAs contain carve-outs for “model improvement” that may be incompatible with GDPR’s purpose limitation principle. Review these carefully.

For organizations in regulated sectors — healthcare, financial services, defense — contractual guarantees about geographic processing boundaries and staff access controls may be prerequisites for use, not negotiating points.

Evaluating Model Security

Model security is an emerging discipline, and most vendor security questionnaires do not yet address it adequately. The questions worth asking:

Does the vendor conduct red team exercises against their own models? Specifically, do they test for prompt injection, jailbreaking, and data extraction vulnerabilities? What is their disclosure policy when vulnerabilities are found?

What is the vulnerability disclosure process for the underlying model? If the vendor uses a third-party foundation model (GPT, Claude, Gemini, Llama), they may have limited visibility into model-level vulnerabilities. How do they handle security advisories from foundation model providers?

How is model access controlled? API keys, rate limiting, and audit logging for AI service access should meet the same standards as access to other sensitive systems. Many organizations discover that AI tool integrations were set up by individual users with no centralized oversight.

What is the incident notification timeline for AI-specific events? Incidents involving AI tools — model manipulation, data extraction, unexpected behavior — may not fit neatly into conventional security incident notification frameworks. Clarify expectations in the contract.

Contractual Controls That Matter

Standard vendor contracts are often written to favor the vendor on the questions that matter most for AI tools. The following contractual provisions warrant specific attention:

Training data prohibition. An explicit contractual prohibition on using your data (prompts, outputs, or any other submitted content) to train, fine-tune, or improve any model — the vendor’s own or any third party’s. “We use commercially reasonable measures to protect your data” is not a substitute for a clear prohibition.

Data retention limits. Specify maximum retention periods for prompts and inference logs, with a contractual right to request deletion. Unlimited retention is not an acceptable default for tools processing sensitive information.

Sub-processor disclosure. AI vendors often use multiple sub-processors — cloud infrastructure, foundation model APIs, evaluation services. The contract should require disclosure of all sub-processors and notice of changes.

Right to audit. For high-risk AI tool integrations, the right to conduct or commission security assessments of the vendor’s AI infrastructure is worth negotiating.

Breach notification. Define “security incident” to include AI-specific events: unauthorized access to inference logs, model manipulation affecting your organization, or inadvertent disclosure of your data through model outputs.

Building a Practical Governance Process

For most organizations, the pragmatic approach is a tiered assessment framework based on the sensitivity of the data being processed and the capabilities of the tool:

Tier 1: High-risk AI tools. Tools that process regulated data (PII, PHI, financial data), tools with agentic capabilities, or tools integrated with core business systems. Full vendor security assessment, DPA, contractual controls above, and CISO sign-off required.

Tier 2: Moderate-risk AI tools. Tools that process internal but non-regulated data, or tools used for productivity tasks with limited sensitive data exposure. Standard vendor security questionnaire plus data residency confirmation and training data prohibition.

Tier 3: Lower-risk AI tools. Public-facing tools used with non-sensitive data. Acceptable use policy acknowledgment, no personal or proprietary data in prompts, user awareness training.

The governance process must include a mechanism for existing AI tool usage to be reviewed — many organizations have accumulated shadow AI deployments that predate any formal governance framework. A periodic inventory of AI tools in use, conducted in partnership with IT and procurement, is an essential starting point.

AI tool risk management is not a one-time assessment. The capabilities and risk profiles of these products are evolving faster than most other enterprise technology categories. Build a review cadence that matches that velocity.