AI Risk Map User Guide
— May 2026
Dashboard · Config Editor
Akos Szonyi
User Guide

AI Risk Map v1.0

A structured, browser-based tool for identifying, scoping, and rating the risks of an AI-enabled system. No installation, no server, no data transmitted — just open and assess.

This guide covers both tools in the AI Risk Map suite: the Dashboard (the main assessment workflow) and the Config Editor (the risk engine configuration tool). Whether you are a business owner running your first assessment or a risk lead customising the engine for your enterprise, this guide has what you need.

Who should use this guide

RoleWhat to read
Business owner / product teamSections 01–09 (the six-step workflow). You can run a complete assessment without touching the Config Editor.
Governance / risk professionalAll sections. Pay particular attention to the Engine section (17) and the Config Editor chapters (10–15).
Technical architect / security engineerSections 17 (Risk Engine internals), 18 (Security & Privacy), and the Config Editor tabs.
Auditor / assessorSections 16 (Saving & Loading) and 18 (Security & Privacy) for evidence trail and data handling questions.
No setup required
Both tools run entirely in your web browser. Open the HTML file and start immediately. Nothing is installed on your computer and nothing is sent over the internet.
Overview

The Two Apps

The suite consists of two separate HTML files that work together. You use the Dashboard to conduct assessments; you use the Config Editor to tune the risk engine to your organisation's standards.

🎛️

Dashboard

The main assessment tool. A six-step guided workflow takes you from system description through scope, vendor evidence, internal evidence, controls, and finally to an interactive risk heat map with export options.

⚙️

Config Editor

An advanced configuration tool for risk leads and governance professionals. Lets you customise the 5×5 risk matrix, answer weights, survey caps, control treatment factors, and per-risk base scores. Changes save as a portable .json config file.

Relationship between the two apps
The Config Editor produces a .json configuration file. In the Dashboard, click Open Config (or use Step 0) to load that file. All engine settings in the Dashboard will then reflect your custom configuration. The two apps are independent — no live link is required.

What the tool assesses

The tool covers 60 distinct AI risks grouped into 10 risk families and mapped to 7 AI lifecycle periods. For each in-scope risk, it calculates three ratings:

RatingWhat it representsWhen to use it
BaseStarting level from the taxonomy — before any evidence or controlsBaseline reference; useful for comparing against residual
InherentLevel after vendor and internal survey evidence is appliedUnderstanding where controls are having the most impact
ResidualLevel after all implemented controls are appliedPrimary view for governance reporting and board packs
Dashboard

Starting an Assessment

Open the Dashboard file in any modern browser (Chrome, Edge, Firefox, or Safari). You will see the six-step pipeline at the top of the screen.

The six-step pipeline

0 System
1 Scope
2 Vendor
3 Internal
4 Controls
5 Output

Each step in the pipeline turns green when the minimum completion threshold is met. You can click any step in the pipeline at any time to jump between steps — you do not need to complete steps in strict order. Risk ratings update live as you answer questions.

Navigation bar

ButtonFunction
SaveDownload the full assessment as a .json file for backup or sharing
OpenLoad a previously saved .json assessment file
ResetClear all assessment entries and start fresh (prompts for confirmation)
HelpOpen the in-app help modal with a quick reference
Version numberOpen the concise change log in an overlay window
⚙ (gear icon)Open the configuration panel to load or view engine settings
Auto-save is always on
Every change you make is automatically saved for the current browser session. Use the Save button to create a portable JSON backup before closing the browser or moving to another device.
Dashboard · Step 0

Step 0 · System Details

This is the entry screen. Before you begin answering questions, record the context for this assessment. The system and vendor details are included in saved assessments, report exports, and exported risk-map images.

FieldRequired?Purpose
System NameYesShort, clear name for the AI system. Becomes the default filename on save. Example: Customer Service GenAI Assistant
Vendor NameOptionalName of the vendor, platform provider, or internal build team. Appears on the Vendor step, Markdown export, JSON export, and risk-map images.
Assessor NameOptionalName of the person or team conducting the assessment. Appears in exports for audit trail.
System DescriptionOptionalBrief description of what the AI system does and its primary use case. Included in the Markdown export.

Loading existing work

From this screen you can also:

  • Load a previously saved assessment (Open saved assessment) — restores all answers, notes, and configuration
  • Load a configuration file (Load config) — applies engine settings without overwriting assessment answers
Important
Loading a saved assessment replaces all current work in the browser. Save any in-progress work first using the Save button before opening a different file.

When you are ready, click Start scope to move to Step 1.

Dashboard · Step 1

Step 1 · Scope Questions

The 30 scope questions are the most important step. They determine which of the 60 risks are relevant to your AI system. Answer carefully — every Yes activates a set of risks and makes corresponding vendor and internal survey rows required.

How scope works

Each question shows three things: the question text, an explanation of what it is really asking, and the risk codes it activates (labelled "Covers risks"). The five possible answers have the following effects:

Yes No Do not know N/A Not set
AnswerEffect on risks
YesBrings the listed risks into scope. Survey and control rows for those risks become Required.
NoExcludes those risks. They appear as Out of Scope in the heat map output.
Do not knowRisks remain tentatively in scope until clarified. Treated conservatively.
N/AExplicitly marks risks as not applicable to this system.
Not setNo answer given. Risks remain in scope by default — conservative assumption.

Using filter chips

The filter bar at the top of the question list lets you navigate efficiently. Use All for a full view, Unanswered to find gaps, and Answered to review decisions. The progress counter at the top shows how many risks are currently in scope.

Tip — involve technical colleagues for scope
Some scope questions ask about system architecture, data handling, or AI model types. Involve a technical colleague if you are unsure. Answering "Do not know" when you have genuine uncertainty is better than guessing — but it leaves risks in scope conservatively.

When is Step 1 complete?

The Scope step turns green in the pipeline when you have answered at least half (15 of 30) of the scope questions. You can always return and refine answers — all ratings update instantly.

Dashboard · Step 2

Step 2 · Vendor Survey

The vendor survey contains 29 questions about the AI vendor's capabilities, practices, and controls. These are answered on behalf of — or in collaboration with — the AI vendor. Only questions marked Required need a response; these are the ones whose associated risks are in scope.

What each row shows

  • The question text and a plain-language explanation of what strong vendor evidence looks like
  • The risk codes the question informs
  • A Notes field (expandable) for recording specific vendor references, version numbers, or meeting dates
  • A Required or Optional badge based on your scope answers

Answer meaning in the vendor survey

AnswerCredit appliedWhen to use it
YesFull credit (1.0)Vendor fully meets the requirement with documented evidence
PartialHalf credit (0.5)Vendor partially meets the requirement or evidence is incomplete
NoNo credit (0.0)Vendor does not meet this requirement
Do not knowNo credit (0.0)Uncertain — treated conservatively, as if No
N/AExcludedNot applicable to this system — excluded from calculations

CSV workflow for distributed completion

If you need to collect answers asynchronously — for example, by sending the survey to a vendor — use the CSV workflow:

Download the survey
Click Download survey. A CSV file is exported with all question rows and an empty answer column.
Share with the vendor
Send the CSV to the vendor or their representative. They fill in the answer column (Yes / Partial / No / Do not know / N/A) and optionally add notes.
Upload the completed survey
Click Upload survey and select the completed CSV. Responses are merged into the current assessment. Existing answers are not overwritten for rows not included in the upload.
Use Notes for audit evidence
Record specific evidence in the Notes field: document names, meeting dates, version numbers, or references to vendor security certifications. These notes appear in the Markdown export and are valuable for audit purposes.
Dashboard · Step 3

Step 3 · Internal Survey

The internal survey contains 26 questions about your organisation's own governance, data management, and operational practices. These are answered by the internal team — typically the business or product owner, with input from technology, data, legal, and risk colleagues.

The structure and answer options are identical to the vendor survey. The same Required filtering logic applies: only rows whose associated risks are in scope need to be answered.

Owner field

Each question has an Owner field for recording who in the organisation is best placed to provide the answer. The explanation panel under each question describes what information you need and which team or role to consult.

Distributing the survey

The same CSV download and upload workflow from the vendor survey is available. This lets you distribute specific rows to the relevant teams (e.g., data questions to the data team, legal questions to the legal team) and consolidate responses back into the tool.

Difference between vendor and internal surveys
The vendor survey assesses external controls and practices — what the AI provider does. The internal survey assesses your organisation's own governance and operational readiness. Both contribute to the inherent risk rating.
Dashboard · Step 4

Step 4 · Controls Catalogue

The controls catalogue starts with 241 built-in controls grouped by risk code. You can also add assessment-specific custom controls under any of the existing 60 risks. A control appears as Required when its associated risk is in scope and that risk's inherent rating is not already LOW. Controls on risks that are already LOW do not need to be assessed.

Adding custom controls

Use Add custom control from the Controls step, or open a risk group and add a control directly to that risk. Custom controls are saved inside the current assessment, not in the global configuration file. They are cleared by Reset Controls and by a full assessment reset.

Each custom control has the same scoring fields as the built-in catalogue: control type, effect direction, weight, status, owner, and notes. You can edit or delete custom controls from the Controls tab. Deleting one also removes its saved status, owner, and notes.

Control status options

StatusMeaningEffect on residual risk
YesFully implemented and operating effectivelyFull credit applied
PartialPartially implemented or inconsistently appliedHalf credit by default
NoNot implementedNo credit
N/ANot applicable to this systemExcluded from calculation
Not setNot yet assessedNo credit (treated conservatively)

Control types

TypeDescription
DesignBuilt into the architecture or technical design of the AI system
OperationalA process, procedure, or practice that must be actively maintained
ContractualA requirement that should be included in contracts with vendors or partners

CSV workflow for controls

The controls list can be exported as a CSV, completed offline or distributed across teams, and re-uploaded. Use Download controls from the Controls step. Fill in the status, owner, and notes columns and upload with Upload controls. Uploaded responses are merged into the current assessment.

Custom controls are included in the CSV with a Control ID and Source column. CSV upload can update status, owner, and notes for custom controls that already exist in the assessment, but it does not create new custom control definitions. Use the in-app form for creating or editing definitions.

Dashboard · Step 5

Step 5 · Output — The Risk Map

The Output step displays a colour-coded heat map of all 60 risks. This is the primary deliverable of the assessment — suitable for governance forums, executive reporting, and board packs.

Switching between views

Use the Base / Inherent / Residual toggle in the top-right of the heat map to switch views. The summary row below the toggle shows the count of risks in each band for the active view.

Risk band meanings

LOW MEDIUM HIGH EXTREME Out of Scope
BandMeaningTypical action
LOWRisk is well-managedMaintain controls and monitor. Annual review.
MEDIUMRequires active managementReview controls and track improvement. Quarterly review.
HIGHSignificant riskPrioritise control improvement. Escalate to senior management. Monthly review.
EXTREMECritical riskImmediate action required. Report to executive or board. Consider system suspension.
Out of ScopeNot applicable to this systemVerify exclusion is correct before finalising.

Drilling into a risk

Click any risk tile in the heat map to open a detail panel showing the risk name, code, score, and current Base / Inherent / Residual ratings along with the likelihood and impact coordinates. Out-of-scope risks are shown in grey and are excluded from all calculations.

Overriding scope

You can manually toggle any individual risk in or out of scope from the output view, independent of your Step 1 scope answers. This is useful for edge cases where the scoping logic does not perfectly reflect your situation.

Export options

Results CSV
.csv
Flat table of all risks with Base, Inherent, and Residual ratings. Suitable for Excel or Power BI.
Full JSON + PNG
.json + .png
Complete machine-readable export with all answers and a heat map image snapshot. Use for archiving a point-in-time record.
Markdown + PNG
.md + .png
Structured text report ready for wikis, email, or AI-assisted analysis via Copilot or similar tools.
Config Editor

Config Editor · When to Use It

The Config Editor is a standalone tool for risk leads and governance professionals. It lets you customise how the risk engine calculates ratings so the tool aligns with your organisation's framework, risk appetite, or existing risk matrix.

Default settings are production-ready
You do not need to use the Config Editor to run a valid assessment. The defaults are calibrated for general-purpose AI risk assessment. Only adjust settings if you have a specific reason — for example, to align with an existing enterprise risk matrix or to apply a more conservative risk appetite.

The five configuration tabs

Risk Matrix Answer Weights 📊 Survey Evidence 🛡 Control Treatment 🎯 Risk Scores

Saving and sharing configuration

Configuration is saved automatically as part of your assessment JSON. To reuse the same configuration across multiple assessments:

Save a standalone config file
In the Config Editor, click Save Config to download a .json configuration file. This file contains only settings — not assessment answers, survey responses, or notes.
Store in a shared location
Place the config file in a shared team location accessible to all assessors. Label it clearly with the version and approval date.
Load in the Dashboard
When starting a new assessment in the Dashboard, click the gear icon → Load config and select the file. Settings are applied without overwriting any assessment answers.
Configuration files are safe to share
Config files contain only engine settings. They contain no assessment data, survey responses, risk scores, or personally identifiable information. Sharing a config file with a vendor or external party reveals nothing about any specific assessment.
Config Editor · Risk Matrix

Risk Matrix Tab

The risk matrix defines how combinations of likelihood and impact translate into risk bands. The default is a 5×5 matrix with rows representing impact (bottom to top: Insignificant → Catastrophic) and columns representing likelihood (left to right: Rare → Almost Certain).

Default risk matrix

Impact \ LikelihoodRareUnlikelyPossibleLikelyAlmost Certain
CatastrophicLOWHIGHHIGHEXTREMEEXTREME
MajorLOWMEDIUMHIGHHIGHEXTREME
ModerateLOWMEDIUMMEDIUMHIGHHIGH
MinorLOWLOWMEDIUMMEDIUMHIGH
InsignificantLOWLOWLOWLOWLOW

Editing the matrix

Click any cell to cycle its rating: LOW → MEDIUM → HIGH → EXTREME → LOW. You can also edit the point score inline — point scores are used for internal ranking within a band and do not appear in the output. Cells changed from the default are highlighted with an amber outline.

Click Reset matrix to defaults to revert all cells to the default configuration.

Config Editor · Answer Weights

Answer Weights Tab

Answer weights define how much credit each survey or control answer contributes to risk reduction. They are numeric values between 0.0 and 1.0.

AnswerDefault weightWhat it means
Yes1.0Full credit — the requirement is fully met
Partial0.5Half credit — partially met
Do not know0.0No credit — treated conservatively
No0.0No credit — requirement not met

When to adjust weights

The default weights are appropriate for most organisations. Consider adjusting in these situations:

  • Reduce the Partial weight to 0.25 to apply a more conservative view of partially implemented controls
  • Increase the Do not know weight slightly if your organisation treats unknown status as equivalent to partial evidence (not recommended without governance approval)
Technical note
Weights apply multiplicatively. A weight of 0.5 on "Partial" means a partially-answered survey question contributes 50% of what a "Yes" would — before the survey evidence caps are applied on top.
Config Editor · Survey Evidence

Survey Evidence Caps Tab

Survey evidence caps define how much a risk can be reduced by vendor and internal survey answers alone. These caps exist to enforce a key design principle: surveys confirm capability; controls demonstrate implementation. Survey answers alone should never be sufficient to eliminate a risk.

SettingDefaultWhat it controls
Survey likelihood cap1Maximum number of likelihood matrix columns a risk can shift left due to survey evidence
Survey impact cap0Maximum impact rows reducible by surveys. Default 0 means surveys cannot reduce impact at all.
Strong evidence threshold0.85Minimum average survey strength required before any reduction is applied
Survey methodthresholdThreshold: reduction fires only when average strength exceeds the threshold. Proportional: scales reduction continuously with strength.
Why the defaults are conservative
The default threshold of 0.85 means that near-perfect survey evidence is required before any likelihood reduction is applied. The cap of 1 means a HIGH risk can shift to MEDIUM via survey evidence — but not further. Controls must close the remaining gap. This prevents gaming the assessment by answering "Yes" to everything in the surveys.
Config Editor · Controls

Control Treatment Tab

Control treatment settings define how implemented controls reduce residual risk. Controls can reduce likelihood, impact, or both, subject to caps and scaling factors.

Reduction caps

SettingDefaultWhat it controls
Control likelihood cap4Maximum levels a risk's likelihood can be reduced. Cap of 4 can move a risk from Almost Certain all the way to Rare.
Control impact cap4Maximum levels impact can be reduced by controls.
Control roundingfloorFloor: always rounds down (conservative). Round: rounds to nearest integer.

Control effect type factors

SettingDefaultWhat it controls
Both-effect split factor1.0For controls that reduce both likelihood and impact, scales the split. Default applies full reduction to each dimension independently.
Detective likelihood factor1.0Scales credit for detective controls. Below 1.0 gives detective controls less credit than preventive controls.
Governance direct reductionYesWhether governance controls apply as direct matrix reductions. No makes them influence-only.
Governance likelihood factor1.0Scales the likelihood reduction of governance controls relative to technical controls.
Config Editor · Risk Scores

Risk Scores Tab

The Risk Scores tab lets you view and override the base taxonomy score and strategy bias for each of the 60 individual risks. This is where you align the tool with your organisation's specific risk appetite.

Base score override

Every risk has a default taxonomy score (1–10) reflecting typical AI system severity. You can override this for risks that are significantly more or less severe for your specific system or industry context. Range: 1–10.

Strategy bias

Apply an organisational risk appetite adjustment as a percentage. A positive strategy bias increases the effective score; this is used to reflect heightened concern about specific risk categories in your operating environment.

The final effective score is: Base score × (1 + Strategy% / 100), capped at 10.

Example
Base score 7, Strategy bias +15% → 7 × 1.15 = 8.05. The risk moves to a higher likelihood band, increasing its initial rating before any controls are applied.

To allow strategy bias to reduce risks below their taxonomy default, enable Allow negative strategy bias in the Risk Scores tab. This is disabled by default to prevent inadvertently understating risks.

Reference

Saving & Loading

Auto-save

The Dashboard automatically saves your in-progress assessment to browser session storage every time you make a change. This protects you during refreshes within the same session, but the portable JSON save is the primary way to keep work across browser restarts, devices, or handovers.

Portable save formats

OptionFormatWhat it savesBest for
Save Assessment (JSON).jsonAssessment identity, vendor name, all answers, notes, scope decisions, custom controls, and configurationPrimary working backup; sharing with colleagues; loading on another device
Full Export (JSON + PNG).json + .pngFull JSON plus heat map images labelled with system and vendorArchiving a point-in-time record
Markdown + PNG.md + .pngHuman-readable report with assessment identity, all ratings, and labelled heat map imagesStakeholder sharing; AI-assisted analysis; wikis and SharePoint
Results CSV.csvRisk ratings table only (no answers or notes)Excel, Power BI, or governance dashboards

Loading a saved assessment

Go to Step 0
Navigate to the Assessment Details step using the pipeline.
Click Open saved assessment
A file picker opens. Select the .json file you saved earlier.
All work is restored
All previous answers, notes, and configuration settings are loaded. Risk ratings recalculate immediately.
Save before loading
Loading a saved assessment replaces all current work in the browser. Always save any unsaved changes first before opening a different assessment file.
Reference

How the Risk Engine Works

This section is for technical and governance readers who want to understand how Base, Inherent, and Residual ratings are calculated. Understanding the engine helps you interpret results and make informed decisions about configuration priorities.

Base score → likelihood band mapping

Score rangeLikelihood band
1–2Rare
3–4Unlikely
5–6Possible
7–8Likely
9–10Almost Certain

The impact band defaults to the same position as the likelihood band. Strategy bias and base score overrides are applied before this mapping. The resulting likelihood × impact coordinate is then looked up in the 5×5 matrix to produce the band (LOW / MEDIUM / HIGH / EXTREME).

Scope gating

Before any calculation, the engine checks scope. A risk is in scope if its driver question (Step 1) was answered Yes or left unanswered. Risks answered No or N/A are excluded and shown as Out of Scope. Manual scope overrides from the output view take precedence.

Inherent risk — the survey layer

The inherent layer applies vendor and internal survey evidence on top of the base risk:

  • All survey answers covering each in-scope risk are collected
  • Each answer is converted to a strength value using the configured answer weights
  • The average strength across all answers for that risk is calculated
  • If the average meets or exceeds the strong evidence threshold (default: 0.85), a likelihood reduction of up to the survey likelihood cap (default: 1 level) is applied
  • Impact reduction may also apply if the survey impact cap is above 0
Why the survey layer is conservative
Strong, consistent positive evidence across all relevant questions is required before any reduction is granted. A single "Yes" is not enough — the average across all relevant questions must reach 0.85. This prevents partial or self-reported evidence from significantly reducing risk ratings.

Residual risk — the controls layer

The residual layer applies implemented controls on top of the inherent risk:

  • All controls associated with each in-scope risk are evaluated
  • Each control's effect type (likelihood, impact, or both) determines the direction of reduction
  • The strength of each control (Yes/Partial/No) determines contribution amount
  • Total likelihood reduction is capped at the Control likelihood cap; impact reduction at the Control impact cap
  • Detective and governance controls are scaled by their respective factors
  • Rounding is applied using the configured method (floor = conservative)

Risk map layout

The heat map plots all 60 risks across 10 families and 7 AI lifecycle periods. Families are the columns; lifecycle period is the rows. This layout is fixed to ensure consistent meaning across exports and screenshots.

MODModel Risks6
DATData Risks7
SECSecurity Risks6
GOVGovernance & Compliance6
OPSOperational Risks7
BUSBusiness & Reputation6
HUMHuman & Ethical Risks5
MONMonitoring & Control6
AGTAgentic AI Risks7
FSFFail-Safe Risks4
Security & Privacy

Security & Privacy

🔒
Zero server contact. Zero data exposure. Zero breach surface.
The AI Risk Map is a client-side-only application. Both the Dashboard and Config Editor run entirely in your browser. No assessment data, survey answers, risk scores, or personal information is ever transmitted to any server, API, or cloud service — by design.

Architecture: why the tool is inherently secure

Most web applications work by sending your data to a remote server for processing. AI Risk Map is architecturally different: it is a static HTML file with all logic embedded directly in the browser. There is no back-end, no database, no API endpoint, and no network call made at any point during use.

🌐
No internet connection required
The tool works fully offline. Open the HTML file on an air-gapped device or disconnected laptop — it behaves identically. No CDN, no font server, no analytics beacon is called.
🗄️
No server, no database
There is no server to compromise. There is no database to breach. The entire application is a single file on your device. Attack surface for external threats is zero.
🔑
No accounts or authentication
The tool requires no login, no account creation, and no credentials of any kind. There is no user registry and no password store that could be compromised.
📡
No telemetry or analytics
No usage data, session data, error logs, or analytics events are transmitted anywhere. No third-party tracking scripts or pixels are loaded. Your activity is completely private.
💾
Local storage only
Auto-save writes to browser sessionStorage — a sandboxed, device-specific store that is inaccessible to other websites and never synchronised to the cloud. Data stays on the device you are using.
📁
You control all exports
When you export a JSON, CSV, Markdown, or PNG file, the file is saved directly to your local disk. You decide where it goes and who sees it. The tool plays no role in distribution.

Data residency and classification

Because no data leaves your device during normal use, there is no data residency concern. The assessment data you enter — which may include details about AI system architecture, vendor capabilities, and organisational controls — remains entirely on your local device unless you explicitly export and share it.

The sensitivity classification of any exported file should follow your organisation's standard data classification policy based on the content of the assessment, not the tool itself.

What is stored and where

DataWhere it is storedWhen it is cleared
In-progress assessment (auto-save)Browser sessionStorage — your current browser session onlyWhen you reset the assessment, close the session, or clear browser data
Exported JSON assessmentYour local file system — wherever your browser saves downloadsWhen you manually delete the file
Exported CSV / Markdown / PNGYour local file systemWhen you manually delete the file
Configuration fileYour local file system if saved; otherwise only in memoryWhen you close the browser tab (if not saved)
Anything elseNothing else is stored anywhere outside your device

Breach risk assessment

A data breach requires either an exposed server, a compromised transmission channel, or unauthorised access to a data store. The AI Risk Map has none of these elements:

  • No server → no server-side breach possible
  • No data transmission → no interception or man-in-the-middle attack possible
  • No database → no database exfiltration possible
  • No credentials → no credential stuffing or account takeover possible
  • No cloud sync → no cloud storage breach possible
  • No third-party scripts → no supply chain injection via CDN possible

The only residual risk is the security of the device and file system on which you run the tool — which is governed by your organisation's endpoint security controls, not by the tool itself.

Using the tool in a corporate environment

BYOD and corporate device compatible
Because the tool makes no outbound network connections, it does not trigger DLP (Data Loss Prevention) policies, proxy inspection, or network monitoring alerts that would typically fire when data is sent to an external service. It is safe to use on corporate-managed devices for handling corporate risk assessment data.

If your organisation requires approval for browser-based tools, the following points are relevant for your security review:

  • Static HTML/CSS/JavaScript file — no executable installer or system-level access
  • No external network requests at runtime — verifiable by inspecting browser DevTools → Network tab (should show zero requests)
  • No browser permissions requested (no microphone, camera, location, notifications, or clipboard access)
  • No third-party JavaScript libraries loaded from external CDNs — all code is self-contained
  • Source code is fully readable by opening the HTML file in any text editor — no obfuscation

Sharing exported files securely

Exported assessment files may contain sensitive risk information about your AI systems and organisational controls. Treat exported files according to your organisation's information security policy:

  • Share JSON and CSV exports via approved secure channels (SharePoint, encrypted email, etc.)
  • Be aware that the JSON export contains all survey answers and notes — it is the most sensitive export format
  • The Results CSV contains only risk band ratings — less sensitive, suitable for wider distribution
  • Configuration files contain only engine settings and are safe to share without confidentiality concerns
  • Markdown exports are human-readable and may include vendor-related notes — review before sharing externally

Verification for security-conscious teams

Any technically inclined team member can verify the security properties of the tool directly:

Inspect network traffic
Open the tool in your browser. Open DevTools (F12) → Network tab. Interact with the tool normally. The Network tab should show zero external requests at any point.
Read the source code
Right-click anywhere in the tool → View Page Source. The entire application — all HTML, CSS, and JavaScript — is readable. Look for any fetch(), XMLHttpRequest, or navigator.sendBeacon() calls. There are none.
Inspect session storage
Open DevTools → Application → Session Storage. You will see the auto-saved assessment data keyed to the local origin. This data never leaves the browser.
Reference

Tips & Best Practices

Start with scope carefully

The 30 scope questions are the most important step. They determine which of the 60 risks are relevant. Involve technical colleagues for questions about system architecture or data handling. Answering "Do not know" is better than guessing incorrectly.

Use filter chips everywhere

Every step has filter chips to help you focus: Required only, Unanswered, Answered, All. Always check Required only first before reviewing the full list. This ensures you address all mandatory questions efficiently.

Use CSV workflows for distributed completion

Download vendor and internal surveys as CSV files and send them to the right people. Upload responses when received. This is particularly useful when collecting vendor answers asynchronously or involving multiple internal teams without requiring everyone to access the tool directly.

Save regularly, keep backups in shared locations

While auto-save works reliably in the browser, download a JSON backup after each major working session. Store backups in a shared location (SharePoint, team drive) accessible to your team — not just on your local device.

Use Markdown export for reporting and AI analysis

The Markdown + PNG export is structured for AI-assisted analysis. Paste it into Microsoft 365 Copilot or a similar tool to generate risk summaries, treatment recommendations, or executive briefings. The format is also suitable for wikis and SharePoint pages.

Residual is the primary reporting view

For governance forums and executive reporting, always use Residual. Use Inherent to understand where controls are having the most impact. Use Base as the raw taxonomy starting point for benchmarking.

Review Out of Scope before finalising

Check the Out of Scope list in the output to confirm excluded risks are genuinely not applicable — not excluded by an incorrect scope answer. A risk excluded by mistake will not appear in the heat map and will be invisible in exports.

Use Notes fields for evidence trails

The Notes column in vendor and internal surveys is free text. Record evidence references, meeting dates, document version numbers, or assessor observations. These appear in the Markdown export and are valuable for audit and governance purposes.

Config Editor: default settings are calibrated for most use cases

Only adjust configuration settings if you have a specific reason — such as aligning with an existing enterprise risk matrix. Changing settings without understanding their impact can produce misleading ratings. Document any changes and get them approved by your risk lead.

Reference

Glossary

TermDefinition
Base riskThe starting risk rating from the taxonomy score, before any surveys or controls are applied. Adjusted by base score overrides and strategy bias.
Inherent riskRisk level after vendor and internal survey evidence has been applied. Represents risk given what is known about the vendor and organisation, before specific controls.
Residual riskRisk level after all implemented controls have been applied. The primary view for governance reporting.
Taxonomy scoreThe default 1–10 risk score assigned by the built-in risk taxonomy. Reflects typical severity across AI systems in general.
Strategy biasAn organisation-specific percentage adjustment applied to a risk's base score to reflect strategic risk appetite. 0% means no adjustment.
Driver questionThe Step 1 scope question whose answer determines whether a risk is in scope. Each of the 60 risks has one driver question.
RequiredA survey row or control that must be addressed because its associated risk is in scope and (for controls) has a non-LOW inherent rating.
Strength valueNumeric weight assigned to a survey or control answer: Yes=1.0, Partial=0.5, No/Do not know=0.0. Used in risk reduction calculations.
Likelihood capMaximum number of likelihood matrix levels that can be reduced by surveys or controls.
Impact capMaximum number of impact matrix levels that can be reduced by surveys or controls.
Evidence thresholdMinimum average survey strength (default 0.85) required before any survey reduction is applied.
OOSOut of Scope. A risk excluded because its driver question was answered No or N/A, or manually excluded in the output view.
Auto-saveAutomatic browser-based save to sessionStorage. Preserves work during the current browser session, but JSON Save is needed for durable backup.
Configuration fileA standalone .json file containing only engine settings. Does not contain assessment answers, survey responses, or notes.
Controls CSVExported spreadsheet of built-in and existing custom controls with status columns that can be filled in offline and re-uploaded. CSV upload updates responses only; create custom controls in the app.
Survey CSVExported spreadsheet of vendor or internal survey questions with answer columns for offline or distributed completion.
Floor roundingA rounding method that always rounds fractional risk reductions down, ensuring the engine is conservative about credit for partial control implementations.
sessionStorageA browser-native storage mechanism sandboxed to the current device and browser session. Data stored here is never transmitted over the network.
Risk Taxonomy

Risk Map & Taxonomy

The AI Risk Map covers 60 distinct AI risks arranged across 10 risk families and 7 AI lifecycle periods. The heat map below shows the empty grid — the same layout used in the Dashboard output. Each cell represents one risk. Click any code to expand its description and mitigation below.

The 10 Risk Families

The taxonomy groups risks into ten families based on where in the AI system the risk originates, not where its effects are felt. This keeps assessment focused and actionable: each family maps to a distinct set of controls, owners, and review processes, so organisations can manage AI risk without treating it as a single undifferentiated problem.

CodeFamilyWhy it was introduced
MODModel RisksThe model layer is the foundation of every AI system. Flaws introduced during training — bias, overfitting, capability gaps — propagate into every downstream use and are expensive to fix after deployment.
DATData RisksAI quality is inseparable from data quality. Poor, poisoned, or improperly governed data produces unreliable, biased, or legally non-compliant AI regardless of how good the model architecture is.
SECSecurity RisksAI systems introduce novel attack surfaces — prompt injection, model extraction, adversarial inputs — that are not covered by conventional IT security frameworks and require dedicated assessment.
GOVGovernance & ComplianceAI deployments routinely outpace governance frameworks. Without explicit policies, registers, and accountability structures, organisations are exposed to regulatory, audit, and legal risk they may not even be aware of.
OPSOperational RisksAI has operational characteristics — cost per query, latency, model drift, dependency on third-party APIs — that differ fundamentally from traditional software and require their own monitoring and management discipline.
BUSBusiness & Reputation RisksAI failures have a public-facing dimension that can escalate rapidly into reputational damage well beyond the direct operational impact, and commercial risk that may not appear in technical risk registers.
HUMHuman & Ethical RisksAI systems interact with and affect human beings in ways that create obligations beyond technical correctness — bias, workforce anxiety, erosion of autonomy, and ethical acceptability all require explicit assessment.
MONMonitoring & ControlAI systems can degrade silently — accuracy drops, costs spike, behaviour shifts — without any visible system failure. Without dedicated monitoring and logging, these problems go undetected until they cause significant harm.
AGTAgentic AI RisksAutonomous AI agents that take real-world actions create an entirely new risk category not present in passive AI tools. Delegated authority, multi-agent orchestration, and autonomous tool use require their own control framework.
FSFFail-Safe RisksEvery AI system will eventually fail. This family was introduced to ensure organisations have tested shutdown mechanisms, structured issue reporting, and adversarial testing programmes — a safety net when everything else goes wrong.

The 7 AI Lifecycle Periods

Each risk is assigned to the lifecycle period where it is most effectively addressed — not merely where it becomes visible. Treating lifecycle position as a design dimension forces organisations to act earlier: risks caught at P1 (foundations) cost a fraction of what they cost to remediate at P5 (oversight) or P7 (recovery). The seven periods span the full journey from pre-development through to resilience and recovery.

PeriodNameWhy it was introduced
P1Foundational QualityThe decisions made before model training — data sourcing, documentation standards, evaluation design — determine what is achievable at every later stage. Risks introduced here are the most expensive to fix and the easiest to prevent.
P2Design & TrainingModel architecture, training methodology, and initial validation lock in the core behaviour, capabilities, and biases of the AI system. This period was introduced to capture risks that are baked in before the system ever reaches a user.
P3Exposure & AccessHow a model is exposed — API design, access controls, integrations with other systems — determines its attack surface and the blast radius of failures. Risks here are about configuration and connectivity, not model quality.
P4Behaviour in UseLive production operation with real users and real data consistently surfaces failure modes that testing missed. This period exists because AI behaviour in the field is the only authoritative measure of real-world performance.
P5Oversight & ControlGovernance, audit trails, monitoring, and accountability are not one-time deployment gates — they are continuous functions. This period was introduced so that oversight is designed and resourced as an ongoing discipline, not treated as a checkbox.
P6Business & Human ImpactRisk materialises not just in technical failures but in downstream consequences: commercial loss, damage to customer trust, workforce disruption, and ethical harms. This period captures risks that only become visible through their broader impact.
P7Resilience & RecoveryAll AI systems will eventually fail. This period was introduced to ensure organisations plan for recovery before failures occur — tested rollback procedures, issue escalation paths, and post-incident learning that feeds back into future deployments.
AI Risk Map — Empty Grid (10 families × 7 lifecycle periods)

Use the colour pattern as a reading aid: each column carries a risk family colour, each row carries a lifecycle colour, and each tile blends both so clusters are easier to scan.

Family column Lifecycle row Risk tile
MOD DAT SEC GOV OPS BUS HUM MON AGT FSF
MOD Model DAT Data SEC Security GOV Governance & Compliance OPS Operational BUS Business & Reputation HUM Human & Ethical MON Monitoring & Control AGT Agentic AI FSF Fail-Safe
All families MOD DAT SEC GOV OPS BUS HUM MON AGT FSF 60 risks
Risk Taxonomy

References

The AI Risk Map taxonomy, risk scoring methodology, and control catalogue are informed by the following authoritative frameworks and standards. Assessors and governance professionals are encouraged to consult these sources when interpreting results or designing treatment plans.

AI Governance & Risk Frameworks

[1]
NIST AI Risk Management Framework (AI RMF 1.0)
National Institute of Standards and Technology (NIST), United States · January 2023
Voluntary framework for managing AI risks across four core functions: Govern, Map, Measure, Manage. Directly informs the governance, monitoring, and operational risk families.
https://airc.nist.gov/RMF
[2]
OECD Principles on Artificial Intelligence
Organisation for Economic Co-operation and Development (OECD) · Adopted 2019, updated 2024
Five principles for trustworthy AI: inclusive growth, human-centred values, transparency, robustness and security, and accountability. Influences the human, ethical, and governance risk families.
https://oecd.ai/en/ai-principles
[3]
EU Artificial Intelligence Act
European Parliament and Council of the European Union · Regulation (EU) 2024/1689, entered into force August 2024
Risk-based regulatory framework for AI systems deployed in the EU. Establishes prohibited practices, high-risk AI categories, transparency requirements, and conformity assessment obligations. Directly informs the regulatory and compliance risk categories.
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R1689
[4]
ISO/IEC 42001:2023 — Information Technology: Artificial Intelligence Management System
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) · December 2023
First international standard for AI management systems. Specifies requirements for establishing, implementing, maintaining, and continually improving an AI management system. Informs governance structure, policy requirements, and audit obligations.
https://www.iso.org/standard/81230.html
[5]
ISO/IEC 23894:2023 — AI Risk Management
International Organization for Standardization (ISO) / International Electrotechnical Commission (IEC) · February 2023
Provides guidance on managing risks specifically related to the development and use of AI systems, aligned with ISO 31000. Informs the risk scoring and treatment methodology used in this tool.
https://www.iso.org/standard/77304.html

AI Security & Adversarial Risk

[6]
MITRE ATLAS — Adversarial Threat Landscape for Artificial-Intelligence Systems
MITRE Corporation · Living knowledge base, continuously updated
Structured taxonomy of adversarial tactics, techniques, and case studies targeting AI systems, analogous to MITRE ATT&CK for traditional cyber threats. Directly informs the Security and Agentic AI risk families, including prompt injection, model evasion, and supply chain attacks.
https://atlas.mitre.org
[7]
ENISA AI Cybersecurity Risks Report
European Union Agency for Cybersecurity (ENISA) · 2023
Analysis of cybersecurity risks specific to AI systems, covering data poisoning, adversarial inputs, model theft, and supply chain compromise. Informs the Security risk family scoring and control design.
https://www.enisa.europa.eu/publications/cybersecurity-of-ai-and-standardisation
[8]
Google Secure AI Framework (SAIF)
Google LLC · June 2023
Conceptual framework for securing AI systems across six core elements: expanding strong security foundations, extending detection and response, automating defences, harmonising platform-level controls, adapting controls to AI workflows, and contextualising AI risks. Informs the Security and Monitoring control families.
https://safety.google/cybersecurity-advancements/saif/
[9]
OWASP Top 10 for Large Language Model Applications
Open Worldwide Application Security Project (OWASP) · v1.1, 2023 / v2.0, 2025
Identifies the ten most critical security risks for applications built on LLMs, including prompt injection, insecure output handling, training data poisoning, model denial of service, and supply chain vulnerabilities. Primary reference for SEC and AGT risk families.
https://owasp.org/www-project-top-10-for-large-language-model-applications/

Responsible AI & Ethics

[10]
Microsoft Responsible AI Standard v2
Microsoft Corporation · June 2022
Internal standard operationalising Microsoft's six responsible AI principles (fairness, reliability, privacy, inclusiveness, transparency, accountability) into engineering and governance requirements. Informs the human, ethical, and governance risk families and their associated controls.
https://blogs.microsoft.com/on-the-issues/2022/06/21/microsofts-framework-for-building-ai-systems-responsibly/
[11]
Anthropic Model Card and Responsible Scaling Policy (RSP)
Anthropic PBC · Version 1.0, September 2023; updated 2024
Framework for evaluating and managing catastrophic risks from frontier AI models. Defines capability thresholds, safety requirements, and deployment conditions. Informs the Agentic AI and Fail-Safe risk families, particularly around autonomous action limits and shutdown capabilities.
https://www.anthropic.com/news/anthropics-responsible-scaling-policy
[12]
Australia's AI Ethics Principles
Australian Government, Department of Industry, Science and Resources (DISR) · 2019, reviewed 2024
Eight voluntary principles for ethical AI in Australia: human-centred values, fairness, privacy protection, reliability and safety, transparency and explainability, contestability, and accountability. Informs the Human, Governance, and Monitoring risk families for Australian-context assessments.
https://www.industry.gov.au/publications/australias-artificial-intelligence-ethics-framework
[13]
ASD Engaging with Artificial Intelligence (Cyber Security Guidance)
Australian Signals Directorate (ASD) / Australian Cyber Security Centre (ACSC) · 2023
Practical guidance on securely deploying and using AI systems, with a focus on data handling, access controls, prompt security, and supply chain risk. Directly relevant for Australian government and regulated-sector assessments.
https://www.cyber.gov.au/resources-business-and-government/governance-and-user-education/artificial-intelligence

Agentic AI & Advanced Systems

[14]
Claude Model Card
Anthropic PBC · 2024
Documents Claude's intended use cases, capability profile, known limitations, safety properties, and evaluation methodology. Covers model behaviour in agentic contexts, preference for reversible actions, human oversight requirements, and prompt injection resistance. Reference for the Agentic AI (AGT) and Governance risk families.
https://www.anthropic.com/model-card
[15]
AI Safety Levels (ASL) and Dangerous Capability Evaluations
Anthropic PBC · 2023–2024
Structured framework for evaluating capability thresholds and applying corresponding safety measures. Informs the Fail-Safe risk family, particularly around shutdown capability, adversarial testing, and monitoring requirements for advanced AI systems.
Note on taxonomy provenance
The 60-risk taxonomy and 241 built-in controls in this tool were developed specifically for operational AI risk assessment contexts. Assessment-specific custom controls can be added when local treatment plans require more detail. The taxonomy and catalogue draw on the frameworks above but are not a direct implementation of any single standard. Where regulatory compliance is required (e.g., EU AI Act, ISO 42001), this tool should be used in conjunction with a formal compliance programme, not as a substitute for one.
AI Risk Map v1.0 · User Guide · May 2026 · Runs entirely in browser · No data transmitted · No installation required