Free checklist · 3 pages · PDF

The Secure AI Checklist.

How to use AI at work without leaking data, creating unmanaged risk, or letting employees freestyle with sensitive information.

  • What employees should and shouldn't enter into AI tools
  • Vendor review questions before you sign
  • Access control basics — SSO, MFA, revocation
  • Where human approval is non-negotiable
  • Governance roles and an incident response path
  • Your first safe rollout, sized to a single team
secure-ai

Get the Secure AI Checklist

Tell us a little about your environment and we'll tailor the next step to your industry.

We respect your inbox. No spam — unsubscribe anytime.

Seven sections

A defensible AI policy,
in one document.

01

Employee usage

Approved tools, no personal accounts, written usage policy.

02

Data rules

Define what data may and may not be entered into AI tools.

03

Vendor review

Training, retention, SSO, logs, deletion, processing region.

04

Access control

SSO, MFA, role-based access, central revocation, key hygiene.

05

Human approval

Required for external comms, payments, legal, hiring, clinical.

06

Governance

AI owner, approved tools, banned use cases, incident path.

07

First safe rollout

Internal productivity. Drafting, not sending. Limited users.

Preview

Secure AI at work.
At a glance.

Pin this to a wall. Send it to your CISO. Use it as the table of contents for your first AI policy meeting.

Secure AI at work — 7-part checklist

Need a real policy?

We write AI policies that
your security team will sign off on.

Strategy, training, governance, and custom implementation. The roadmap call is where it starts.