Executive summary
Decision memo (one line)
Adopt a single, board-ready decision to run a 90-day operating plan that establishes accountable governance, phishing-resistant identity for priority cohorts, and SBOM-aware vendor controls. Expected near-term resources: board sponsor, single program lead, IT and procurement time, and fractional CISO support as needed.
One-line benefit
Within 90 days the board will receive demonstrable policy, measurable identity coverage, and procurement and IR templates that support contracting and audit conversations.
Required board commitment
- Approve a one-page program charter.
- Appoint a board sponsor and a single program lead.
- Commit to monthly operations reviews for the first two quarters.
Three boardable artifacts to expect at day 90
- Board-ready dashboard with KPI targets and residual risk assessment.
- Evidence of phishing-resistant MFA adoption for prioritized cohorts with acceptance criteria.
- Procurement and IR templates that require SBOMs or defined compensating controls plus SBOM ingestion workflow documentation.
Context and risk profile for SMBs in Northern Virginia and the DC region
Why this matters locally
- Many organizations in Northern Virginia and the DC metro support federal programs, prime contractors, or regulated customers and therefore face heightened expectations for documented governance and supplier transparency. See NIST AI Risk Management Framework (AI RMF) for governance mapping and federal guidance on AI risk management. NIST AI RMF
- Hybrid and mobile workforces increase reliance on identity. Credential compromise remains a leading entry vector. Follow NIST SP 800-63B for digital identity guidelines, and FIDO Alliance guidance for phishing-resistant public-key credentials and passkeys. NIST SP 800-63B FIDO Alliance guidance
- Public-sector and regulated customers are increasingly requesting software provenance such as SBOMs. NTIA and CISA provide SBOM guidance and examples. NTIA SBOM Resources CISA SBOM Guidance
Practical implications for SMB executives
- The board will expect a concise charter, named owners, and measurable acceptance criteria rather than technical detail only.
- The operating model must be light enough for limited staff and budget, and structured to scale as customer obligations or regulatory requirements evolve.
Definition: what we mean by an AI asset
A record in the AI asset inventory should include the following metadata fields: asset identifier, owner, provider or vendor, model identifier and version, hosting location (cloud, on-premises, edge), data sources used for training and inference, access controls, audit/logging endpoints, risk tier (low/medium/high), business criticality, and contract clause references. Use a simple CSV or JSON schema for first-pass inventory.
Implementation blueprint: 90 days, owner-driven, three parallel tracks
Principle
Run Governance, Identity, and Vendor/SBOM tracks in parallel. Use 30-day sprints. Assign a RACI per milestone and require explicit acceptance criteria for each deliverable.
Sprint 0: Preparatory step (two business days)
Decision and deliverable
- Board sponsor appointed and program lead named. Deliverable: signed one-page charter with scope, resources, and escalation path.
Days 1-30: Discover and baseline
Goals
Produce a minimal, verifiable baseline for governance, identity, and vendors with measurable acceptance criteria.
Governance
Deliverable and acceptance criteria
- One-page governance charter and risk appetite statement for AI and third-party risk. Acceptance: signed by board sponsor and program lead; lists owners for each track.
- AI asset inventory. Acceptance: contains at least 90 percent of business-critical systems as identified by IT and business owners and includes the metadata fields defined above.
Identity security
Deliverable and acceptance criteria
- Identity baseline report listing identity providers, MFA status by user group, and prioritization for phishing-resistant MFA and passkeys. Acceptance: identification of prioritized cohorts covering administrators, finance, procurement, and remote workers.
- Quick win: enforce phishing-resistant MFA for admin and privileged accounts. Acceptance: 95 percent of admin/privileged accounts using phishing-resistant MFA or equivalent recorded in logs.
Vendor and SBOM
Deliverable and acceptance criteria
- Vendor register listing criticality, SBOM availability, contract references, and remediation timelines for those lacking SBOMs. Acceptance: critical vendors covering at least 80 percent of vendor-related risk exposure annotated.
- Contract review summary. Acceptance: annotated list of existing contracts with recommended clauses and sample clause text for procurement updates.
Citations and baseline references
- NIST AI RMF for governance functions and mapping. NIST AI RMF
- NIST SP 800-63B for digital identity and MFA recommendations. NIST SP 800-63B
- FIDO Alliance for passkey and FIDO2/WebAuthn technical guidance. FIDO Alliance
- NTIA and CISA for SBOM formats and supply chain recommendations. NTIA CISA
Days 31-60: Implement controls and procurement changes
Goals
Deploy phishing-resistant identity for prioritized cohorts, require SBOMs or compensating controls for critical procurements, and formalize AI governance workflows.
Governance
Deliverables and acceptance criteria
- AI governance policy and role-based training. Acceptance: policy approved by board sponsor and 90 percent of role-based assignees have completed training modules.
- Model procurement approval workflow mapped to NIST AI RMF risk tiers. Acceptance: checklist enforced for new model procurements and recorded approvals for at least one procurement in each risk tier.
Identity security
Deliverables and acceptance criteria
- Rollout of phishing-resistant MFA for prioritized cohorts, targeting 80 percent enrollment within 30 days of rollout and 95 percent within 60 days. Acceptance: authentication logs show MFA events and passkey use where enabled.
- Passkey pilot for a representative group with usability and failure-rate metrics collected. Acceptance: pilot report with defined migration plan if pilot shows <5 percent operational friction.
Technical notes and logging requirements
- Prefer FIDO2/WebAuthn-capable solutions for phishing resistance. FIDO Alliance
- Minimum detection and logging requirements
- Centralize authentication, authorization, privileged access, model access and inference logs, and SBOM ingestion events into a secure log store or SIEM.
- Retention: maintain authentication and administrative logs for 90 days; preserve security event logs relevant to incidents for at least one year. These retention baselines align with NIST log management guidance. NIST Guide to Computer Security Log Management
- Ensure logs are tamper-evident and access to logs is auditable.
Vendor and SBOM
Accepted SBOM formats and ingestion workflow
- Accept SPDX or CycloneDX SBOM formats as primary formats. NTIA and industry practice recognize SPDX and CycloneDX. NTIA SBOM
- Ingestion workflow example
- Supplier provides SBOM in SPDX or CycloneDX as part of onboarding.
- Automated validation using an SBOM tool such as Syft or CycloneDX CLI to verify schema and compute cryptographic hashes. Example open source tools: Syft (Anchore) and CycloneDX tooling. Syft on GitHub CycloneDX Tools
- Record SBOM metadata and verification status in the vendor register.
- If SBOM fails validation, require remediation timeline or apply compensating controls per contract clause.
- Compensating controls when SBOMs are unavailable
- Require supplier attestations of software provenance and secure development practices.
- Perform enhanced vulnerability scanning of delivered artifacts and require runtime integrity checks such as binary signing and hash verification.
- Enforce shorter remediation SLAs and contractual obligations to remediate identified vulnerabilities within defined timeframes.
- Acceptance criteria by day 60
- Procurement templates updated and approved.
- Onboarding checklist includes SBOM validation steps for critical suppliers.
Mapping to federal contracting and regional requirements
- Example clauses and standards to consider when serving federal customers or primes
- FAR basic safeguarding clause: FAR 52.204-21. Requires basic safeguarding of covered contractor information systems. FAR 52.204-21
- DFARS and NIST SP 800-171 for defense contractors handling controlled unclassified information. DFARS clause 252.204-7012 references safeguarding requirements and incident reporting. DFARS 252.204-7012 summary at acquisition.gov
- NIST SP 800-171 for protecting Controlled Unclassified Information. NIST SP 800-171
- Executive Order 14028 and subsequent agency guidance on software supply chain security provide the basis for SBOM requests. See EO 14028 summary and agency guidance. Executive Order 14028 (White House)
Days 61-90: Harden, integrate, and test
Goals
Move from deployment to operationalization. Integrate controls into incident response and measure operational effectiveness.
Governance
Deliverable and acceptance
- Quarterly governance cadence and KPI dashboard. Acceptance: dashboard populated with KPI values and calendar invites created for cadence.
Identity security
Deliverable and acceptance
- Coverage report showing target enrollment for prioritized cohorts with remediation plans for gaps. Acceptance: 95 percent admin enrollment and 80 percent prioritized cohort enrollment by day 90.
- Targeted phishing simulation against non-enrolled cohort and lessons learned recorded. Acceptance: phishing simulation report with reduced click rates vs baseline.
Vendor, SBOM and incident response integration
IR playbook updates and forensic requirements
- Update incident response plan to include SBOM intake, triage, and supplier engagement procedures.
- Forensic and evidence preservation steps to include chain of custody forms, disk and memory image capture guidance, cryptographic hashing of artifacts, and preservation of model artifacts, training data snapshots, inference logs, and SBOM copies. Use NIST guidance for integrating forensic techniques into IR. NIST SP 800-86
- Minimum triage SLAs: 72 hours for SBOM-informed triage of high-severity vendor-sourced incidents; 7 days for medium severity. Acceptance: triage completed within SLA for tabletop scenarios and one real incident if it occurs.
Testing and exercises
- Tabletop exercise scenario examples
- Vendor-supplied component vulnerability discovered in a critical library with an available SBOM.
- Model integrity incident such as a successful data poisoning or prompt injection that causes unsafe outputs.
- Deliverable: tabletop after-action report with assigned remediation items and owners. Acceptance: owners assigned and remediation timelines documented.
Deliverables at day 90 to present to the board
- Board-ready dashboard showing progress against KPIs and residual risk with target vs actual values.
- Evidence of MFA adoption and passkey pilot summary with acceptance measures.
- Procurement and IR templates that require or document compensating controls in lieu of SBOMs, and a documented SBOM ingestion workflow.
- Tabletop after-action report and prioritized remediation plan with owners.
Mapping to NIST AI RMF functions
- Govern: Charter, risk appetite, policy, board cadence. NIST AI RMF
- Map: Asset inventory and data flows for AI systems.
- Measure: KPIs, phishing simulations, SBOM coverage metrics.
- Manage: Procurement changes, IR integration, continuous improvement.
Metrics, governance cadence, and sustainment
Suggested board-ready metrics and targets (quarterly)
- Percent of AI assets inventoried and classified by risk tier. Target: 90 percent of business-critical assets at day 90.
- Percent of prioritized users enrolled in phishing-resistant MFA or passkeys. Targets: 95 percent for admin/privileged users, 80 percent for prioritized cohorts at day 90.
- Percent of critical vendors that provide SBOMs or equivalent provenance. Target: 60 percent by day 90 and 80 percent within 180 days.
- Number of vendor-sourced incidents with SBOM-informed triage completed within SLA. Target: 100 percent of high-severity vendor incidents triaged within 72 hours.
- Completion status of governance tasks: charter signed, policy approved, approval workflow enforced, training completed.
Reporting cadence and responsibilities
- Monthly operations review: program lead, IT, procurement, legal. Focus: unblock actions, review logs and SBOM ingestion failures, track pilot metrics.
- Quarterly board report: one page, status, top risks, and remediation plan. Owner: program lead; approver: board sponsor.
- Annual program review: evaluate scope, budget, staffing. Owner: CISO or fractional CISO.
Sample templates and examples (concise)
-
One-page governance charter example (to be adapted and signed)
- Purpose: Establish AI and third-party governance program.
- Scope: Systems and vendors that materially affect confidentiality, integrity, or availability of critical services.
- Board sponsor: [name]. Program lead: [name]. Reporting cadence: monthly operations, quarterly board.
-
Minimal AI asset inventory schema (CSV headers)
- asset_id, name, owner, provider, model_id, model_version, hosting_location, data_sources, access_controls, audit_logging_endpoint, risk_tier, business_criticality, contract_reference
-
Sample contract clause language for procurement
- "Supplier shall provide a machine-readable SBOM in SPDX or CycloneDX format for delivered software artifacts or, if unavailable, provide a signed attestation of secure development practices and accept compensating controls as specified in Exhibit A. Supplier must remediate identified critical vulnerabilities within 72 hours of notification."
-
One-page board report template
- Top line: Program status (On track / At risk / Off track). KPIs: Asset inventory coverage, MFA enrollment, critical vendor SBOM coverage. Top 3 risks. Next actions and resource requests.
Board objections: prepared responses and escalation path
- Cost objection: present phased rollout and prioritized cohorts. Provide estimated staff time and optional fractional CISO support for the 90-day campaign.
- User friction objection: offer passkey pilot and metrics; propose 30 day enforcement windows and support materials.
- Supplier pushback: use contract clause template, offer remediation timelines and compensating controls, escalate through procurement and contracting officer if federal customer obligations apply.
Sustainment and scaling
- Treat the 90-day plan as a repeatable cadence. Each quarter re-run the three-track process with updated priorities.
- Prioritize SBOM analysis by criticality until resourcing allows broader coverage.
- Convert passkey pilot into a migration plan if the pilot meets operational acceptance criteria.
Authoritative guidance and where to get help
- NIST AI RMF: https://www.nist.gov/ai-risk-management
- NIST SP 800-63B: https://pages.nist.gov/800-63-3/sp800-63b.html
- NIST Guide to Computer Security Log Management (SP 800-92): https://csrc.nist.gov/publications/detail/sp/800-92/final
- NIST Guide to Integrating Forensic Techniques into Incident Response (SP 800-86): https://csrc.nist.gov/publications/detail/sp/800-86/final
- NTIA SBOM resources: https://www.ntia.gov/SBOM
- CISA SBOM guidance: https://www.cisa.gov/sbom
- FIDO Alliance: https://fidoalliance.org/
- MITRE ATLAS for AI adversary techniques: https://atlas.mitre.org/
- FAR and DFARS guidance on contractor safeguarding: https://www.acquisition.gov/
Practical next step
Have the board approve the one-page charter and nominate the sponsor and program lead. Use the charter to start the Days 1-30 cadence the following business week. The program lead should prepare the RACI, an initial asset discovery checklist, and schedule the first monthly operations review.