On this page
TL;DR for the time-pressed
The "AI Control Plane" category is now mature enough that buyers can run a structured RFP and get apples-to-apples answers - if they know the right questions. This post is the 87-question RFP template Areebi's research team uses with enterprise procurement teams, organised into seven sections (Identity and access; Data protection and residency; Policy enforcement and shadow AI; Audit and evidence; Model and vendor governance; Incident response; Compliance and certifications) and grounded in NIST AI 600-1 (July 2024), ISO/IEC 42001:2023, SOC 2 Trust Services Criteria, EU AI Act, Gartner's Market Guide for AI Trust, Risk, and Security Management (AI TRiSM), and ENISA's AI Threat Landscape. Use it as-is, or as a starting point for your own. Updated 2026-05-20.
How to use this template
An RFP is a forcing function, not a checklist. The goal is not to score vendors against a generic spec; it is to surface the gap between marketing language and operational reality. The template below is intentionally specific and intentionally referenced to standards. Each question carries a citation to the regulatory or framework expectation that justifies asking it - so when a vendor pushes back on the question, you can point to the source and say "we have to ask this because [standard X] requires we know."
Practical guidance:
- Tier the questions. Make some mandatory (a "no" disqualifies), some scored (the answer affects ranking), and some informational (used to inform the implementation plan but not the buy decision). Tiering is a function of your sector and data classes.
- Score on evidence, not assertions. "Yes we support that" is not an answer. Ask for the SOC 2 control reference, the architecture diagram, the screenshot, the policy document, the audit log sample, the customer reference.
- Run a hands-on evaluation in parallel. The RFP is the artefact for the procurement committee; the proof-of-concept is where the truth lives. The Areebi build vs buy guide covers the evaluation pattern.
- Re-score annually. AI control plane vendors are moving fast in 2026; an answer that was good 12 months ago may be out of date. Bake re-evaluation into the renewal cycle.
Use the Areebi AI vendor risk score as the scoring rubric for the answers you receive.
Section 1: Identity and access (12 questions)
NIST AI 600-1 ties identity to the "Govern" function (GV.OV-2, GV.RR-3) and the Manage function for access control. ISO 42001 control 8.2 addresses access management; SOC 2 CC6 covers logical access. The EU AI Act Article 14 (human oversight) and Article 22 (data governance) presuppose authenticated identity at every AI interaction.
- SSO and identity providers supported. Does the platform support SAML 2.0, OIDC, and SCIM provisioning from major IdPs (Okta, Microsoft Entra, Ping, Google Workspace)?
- Federated identity scope. Are identities federated end-to-end, including to the model vendor (so the LLM provider sees the authenticated user identity, not a service account)?
- MFA requirement. Does the platform enforce MFA on all administrative actions? On user actions? Can MFA be required policy-by-policy?
- Role-based access control. Are roles defined and configurable? Are they enforced consistently across UI, API, and admin surfaces?
- Attribute-based access control. Can policies be conditioned on user attributes (department, location, security clearance, data classification)?
- Just-in-time access. Does the platform support time-bounded elevated access with approval workflow?
- Service-account governance. Service accounts, API keys, and machine identities - rotation policies, scope limits, audit trail?
- Identity lifecycle hooks. Provisioning and de-provisioning automated on HR / IdP events; orphaned identities flagged.
- Session management. Maximum session length configurable; idle timeout; concurrent session limits.
- Privileged access management integration. Integration with CyberArk, BeyondTrust, Delinea for break-glass access patterns.
- Per-tenant identity isolation. Multi-tenant deployments - is identity isolation cryptographic, logical, or process-level?
- Authentication for the audit log. Read access to audit log is itself authenticated, MFA'd, and logged.
Section 2: Data protection and residency (13 questions)
NIST AI 600-1 lists data privacy as a top risk class (Risk DP). ISO 42001 control 8.3 addresses information security; SOC 2 P (Privacy) and C (Confidentiality) categories apply. GDPR Articles 5, 25, 32 and EDPB Opinion 28/2024 set the EU floor; HIPAA 45 CFR 164.312, OCR online tracking guidance, and the various US state laws set the US floor.
- Data residency by region. Which regions does the platform operate in? Can data (prompts, completions, audit logs, embeddings, configuration) be pinned to a specific region?
- Sovereignty controls. Does the platform support EU sovereign cloud requirements, customer-managed encryption keys (BYOK / HYOK), and supply-chain transparency for the underlying infrastructure?
- Encryption at rest. What algorithms and key management? Customer-managed keys supported?
- Encryption in transit. TLS 1.2 minimum (1.3 preferred)? Internal service-to-service encryption?
- Tokenisation and redaction. Does the platform support pre-inference redaction of sensitive fields (PHI, PII, payment data, trade secrets)? Reversible tokenisation for authorised re-identification?
- Data classification. Per-class policy enforcement (PHI separately from PII separately from trade secret)?
- Retention policies. Per-class retention; automated purging; verifiable deletion?
- Right-to-erasure support. GDPR Article 17 implementation - can the platform identify and delete all records relating to a specific data subject across prompts, completions, retrieval stores, and logs?
- Data minimisation enforcement. Can the platform reject prompts that contain unnecessary data classes for the workload (e.g. block SSNs in a marketing workload)?
- Outbound data control. DLP-style egress controls on data leaving the platform to external models or downstream tools?
- Model vendor data flow. What data does the platform send to the model vendor? Is the training-on-customer-data carve-out enforced and verifiable?
- BAA / DPA support. Will the vendor sign a BAA for healthcare customers? A standard DPA with EU SCCs for EU customers? What are the exclusions?
- Cross-border transfer mechanisms. SCCs, adequacy decisions, BCR - which mechanisms does the vendor rely on and where?
Section 3: Policy enforcement and shadow AI (13 questions)
This is the operational core of an AI control plane. Gartner's Market Guide for AI Trust, Risk, and Security Management (AI TRiSM) identifies policy enforcement and shadow AI discovery as the differentiating capabilities. ENISA's AI Threat Landscape emphasises runtime defence; OWASP's Top 10 for LLM Applications 2025 enumerates the threats the policy engine must counter.
- Policy expression language. Code? Declarative? Visual builder? Hybrid? How are policies version-controlled?
- Policy testing. Test harness for policies before deployment; dry-run mode against historical traffic; impact analysis?
- Pre-built policy library. Off-the-shelf policies for common regulatory regimes (HIPAA, GDPR, PCI DSS, SOC 2) - what is the catalogue?
- Real-time enforcement latency. P50 / P95 / P99 latency impact of policy enforcement on the inference path?
- Prompt injection defence. What patterns does the platform detect and block? How is the detection updated as new patterns emerge?
- Output filtering. Toxicity, PII / PHI leakage, regulated content - which classifiers, which thresholds, how tuned?
- System prompt protection. Defence against system prompt extraction and leakage attacks?
- Tool-use / agent governance. When the LLM calls tools (database, email, browser, code execution), what policies gate the call?
- Shadow AI discovery. Discovery of unauthorised AI tool usage - network traffic analysis, browser extension monitoring, log analysis, expense report analysis? See our 90-minute shadow AI hunt.
- Vendor allow / deny list. Per-tenant configurable allow-list of approved model vendors and tools; default-deny for unknowns?
- Rate limits and quotas. Per-user, per-tenant, per-vendor rate limits and spend quotas?
- Policy override workflow. When a user needs to invoke an action the policy blocks, what is the approval / break-glass workflow, and how is it audited?
- Policy as code integration. Are policies exportable / importable as code, version-controlled in Git, and CI/CD deployable?
See Areebi in action
Get a 30-minute personalised demo tailored to your industry, team size, and compliance requirements.
Get a DemoSection 4: Audit and evidence (12 questions)
SOC 2 TSP Section 100, ISO 42001 control 9.5, and the NIST AI 600-1 Manage function all expect a reconstructable evidentiary chain. The audit log is what makes ISO 42001 certification and SOC 2 attestation possible at all.
- Audit log content. What is captured per inference - prompt, system prompt, completion, retrieved context, policy decisions, identity, model and version, latency, cost?
- Audit log integrity. Tamper-evidence - signed log entries, hash chains, immutable storage?
- Audit log retention. Configurable retention; legal-hold support; per-record retention policies?
- Audit log search and export. Searchable by user, identity, time range, policy decision, data class? Exportable in JSON / CSV / SIEM-friendly formats?
- SIEM integration. Native integration with Splunk, Sentinel, Chronicle, Sumo, Elastic? Real-time streaming?
- Evidence packs for auditors. Pre-built evidence packs for ISO 42001, SOC 2, HIPAA, GDPR? How are they generated and how are they validated?
- Reproducibility. Can an inference be re-played from the audit log with the same model version and the same prompt? This is the SOC 2 reproducibility expectation.
- Model decision lineage. For a given output, can the auditor trace which model version, which prompt, which retrieved context, which policy decisions, and (if fine-tuned) which training corpus?
- Reporting and dashboards. Out-of-the-box dashboards for usage, policy violations, top users, top use cases, top costs, top data classes?
- Anomaly detection. Built-in anomaly detection on usage patterns, policy violations, and cost?
- Read access governance. Read access to the audit log itself is authenticated, MFA'd, time-bounded where appropriate, and logged?
- Audit log of admin actions. Configuration changes, policy changes, identity changes - all in the audit log with the actor and the diff?
Section 5: Model and vendor governance (13 questions)
NIST AI 600-1 risk class "Value Chain and Component Integration" (VC) and ISO 42001 control 8.4 (third-party AI services) require explicit governance of the model and vendor layer. EU AI Act Article 16 (provider obligations) and Article 25 (supplier responsibilities) make the vendor relationship a regulator-relevant artefact.
- Model registry. Inventory of every model in use - provider, version, modality, training cut-off, intended use, classification?
- Multi-model routing. Can the platform route different workloads to different models based on policy (data class, sensitivity, cost, capability)?
- Model version pinning. Workloads pinned to specific model versions for reproducibility; controlled migration to new versions?
- Vendor registry. Per-vendor record of DPA, BAA, SCC, AUP status, certifications, breach history?
- AIBOM (AI Bill of Materials). Does the platform produce or integrate with an AIBOM showing models, embeddings, datasets, libraries, and dependencies? See our AIBOM playbook.
- Model card management. Storage and presentation of model cards (Mitchell et al format) and system cards from vendors?
- Fine-tuning governance. If fine-tuning is supported, the data lineage, the training run metadata, and the evaluation evidence are captured?
- RAG governance. If RAG is supported, the retrieval source registry, the embedding model version, and the chunking strategy are captured?
- Vendor incident integration. When a model vendor publishes a security advisory, how does the platform surface that to your team?
- Vendor deprecation handling. When a vendor deprecates a model version, the platform's notice-to-action workflow?
- Self-hosted model support. Can the platform front a self-hosted open-weight model (Llama, Mistral) with the same policy and audit controls as a hosted vendor?
- Multi-region failover. If a vendor region is unavailable, fallback to another region or another vendor?
- Cost governance. Per-vendor and per-model cost attribution; budget alerts; chargeback support?
Section 6: Incident response (12 questions)
NIST SP 800-61r2 and AI 600-1 set the expectations; ISO 42001 control 10.1 (response to AI system incidents) and SOC 2 CC7.4 / CC7.5 make incident response a control-effectiveness criterion. See our AI incident response runbook for the operational pattern.
- Kill switch. A tested mechanism to disable a use case, a model integration, or all AI access for an identity, group, or tenant - immediately?
- Policy hot-deploy. Policy patches deployable to production without service restart and without re-authentication of all sessions?
- Incident detection rules. Out-of-the-box detection rules for the OWASP LLM Top 10 risks and the NIST AI 600-1 risk classes?
- Evidence preservation. When an incident is opened, the relevant audit log records are preserved and locked against retention purges?
- Scope queries. Search across the audit log to identify the affected sessions, users, and downstream actions in a single workflow?
- Tool-use reversal. If an injected prompt caused an agent to take an action (sent email, modified record), is there a reversal / quarantine workflow?
- Notification workflows. Configurable notifications to security, privacy, legal, and executive stakeholders by severity?
- Regulator notification support. Pre-built timelines and content templates for GDPR 72-hour, HIPAA 60-day, SEC 8-K 4-business-day, EU AI Act Article 73, and DORA major-ICT-incident reporting?
- Tabletop and drill support. Can the platform produce a simulated incident for tabletop exercises?
- Post-incident artefacts. Timeline, root cause, containment, lessons - exportable for the post-mortem and the audit committee report?
- Vendor incident coordination. Per-vendor contact records and disclosure-obligation tracking for upstream incidents?
- MTTR metrics. The platform's own MTTD / MTTR / MTTC metrics on AI-specific incidents (anonymised across the customer base)?
Section 7: Compliance and certifications (12 questions)
The vendor's own compliance posture is a property procurement is buying. The relevant references: SOC 2 Type II report (current, with the Trust Services Criteria mapped to AI risks per our SOC 2 + AI workloads mapping), ISO/IEC 42001:2023 certification, ISO/IEC 27001 + ISO 27701, HIPAA, GDPR posture, EU AI Act readiness.
- SOC 2 Type II. Current report available under NDA? Trust Services Criteria covered (Security mandatory; Availability, Confidentiality, Processing Integrity, Privacy as applicable)?
- ISO/IEC 42001:2023. Certified? In progress? Roadmap? Internal-audit evidence available?
- ISO/IEC 27001. Current certification, scope, certificate available?
- HIPAA. BAA available; OCR examination history; Security Rule mapping documented?
- GDPR / EU posture. DPA available; EU SCC where applicable; UK addendum; data residency in EU; DPO contact?
- EU AI Act. Provider / deployer position documented; high-risk system support if relevant; GPAI Code of Practice signatory status?
- NIST AI RMF. Self-assessment or third-party attestation against the AI RMF 1.0 and the AI 600-1 GAI Profile?
- FedRAMP. Authorisation status (FedRAMP Moderate / High); FedRAMP 20x readiness if relevant for US public sector?
- Penetration testing. Frequency, scope, third-party tester, report available?
- AI red teaming. Frequency, methodology, findings remediation cadence? See the AI red team guide.
- Bug bounty. Active programme, scope, third-party platform, response SLAs?
- Trust Center. Public-facing trust documentation with current status of certifications, sub-processors, incident history?
The 87 questions above are the minimum. Sectoral overlays - DORA for financial services, OCR online tracking guidance for healthcare, OMB M-24-18 for US federal contractors, Australian Privacy Act for AU, Singapore AI Verify for SG - add 20-40 more for those sectors. The Areebi compliance hub indexes the sectoral mappings.
How to score the responses
A vendor RFP is only as good as the scoring discipline behind it. Areebi's recommended rubric:
- Score each answer 0-3. 0 = not supported. 1 = roadmap. 2 = supported with evidence. 3 = supported with evidence and customer reference.
- Weight by sector. Healthcare buyers weight Section 2 (data) and Section 7 (compliance, especially HIPAA / SOC 2) heavily. Financial services weight Section 4 (audit) and Section 6 (incident) heavily. EU public sector weights Section 2 (residency) and Section 7 (EU AI Act) heavily.
- Disqualify on any mandatory zero. Identify the mandatory questions for your sector (BAA for healthcare, DPA for EU, SOC 2 for any enterprise) - a zero on those is a disqualification.
- Triangulate with proof-of-concept. The RFP measures stated capability; the proof-of-concept measures actual capability. A vendor scoring 92% on the RFP but scoring poorly in the proof-of-concept is the worse choice.
- Run the same RFP twice, six months apart. The category is moving fast. A vendor that scored 75% in November 2025 should be able to score 85%+ in May 2026 if the product team is keeping up. Vendors that have flatlined are a signal.
Use the AI vendor risk score tool to capture and compare scores across vendors.
Areebi's point of view
An RFP that asks only the marketing-friendly questions ("do you have policy enforcement?") gets back marketing-friendly answers. An RFP that asks the operationally specific, framework-referenced questions ("what is the P95 latency impact of your output filter on a 4k-token completion?", "show me the audit log entry for a HIPAA-scope inference") gets back signals you can buy on. Areebi's research team's view: the AI control plane category will consolidate over the next 18 months, and the buyers running disciplined RFPs in 2026 will be the ones with the leverage to negotiate good contracts with the winners. The 87 questions above are the floor; build on them.
Frequently Asked Questions
Can I use this template for an AI gateway purchase, not a full control plane?
Yes, with edits. An AI gateway is a subset of an AI control plane - it typically covers the runtime policy enforcement and the model routing but not the full vendor governance or compliance evidence pack. Drop Sections 5 and 7 questions that go beyond the gateway scope, and emphasise Sections 1, 3, and 4. The Areebi blog on AI control plane vs AI gateway explains the difference.
How long should an RFP cycle take?
For an AI control plane purchase at enterprise scale, 6-12 weeks is realistic - 1-2 weeks to issue, 3-4 weeks for vendor response, 2-3 weeks for evaluation and scoring, 1-2 weeks for proof-of-concept, and 1-2 weeks for negotiation. Compressing below 6 weeks is possible but usually skips the proof-of-concept, which is the worst skip to make.
Should I include a vendor's customer references?
Yes - one or two in the same industry or with the same regulatory exposure. Customer references are noisy but they catch operational realities the RFP misses (how the support team responds at 02:00, how change-management is done, how vendor advisories propagate). The Areebi research team's view: weight the customer reference more heavily than the RFP for tie-breaks.
Do I need a separate RFP for shadow AI discovery?
Usually no - a credible AI control plane should cover discovery and runtime policy enforcement in one platform. If a vendor cannot do discovery natively, integrate-with-discovery is an acceptable answer if the integration partner is named and the workflow is documented. See the 90-minute shadow AI hunt playbook for the bootstrap pattern.
What is the difference between AI TRiSM and AI Control Plane?
Gartner's AI Trust, Risk, and Security Management (AI TRiSM) is an analyst framework covering four capabilities: explainability and model monitoring, model operations, AI application security, and privacy. AI Control Plane is the architectural pattern that implements TRiSM in practice - the runtime layer that sits between users / applications and AI models, enforcing policy, capturing audit, and managing the vendor relationship. The RFP template above is shaped by both.
How often should I re-run this RFP?
Every renewal cycle (most enterprise AI control plane contracts are annual) and any time there is a material change in scope or regulatory environment. Examples: a new sector entry (e.g. healthcare M&A bringing HIPAA into scope), a new geography (EU expansion bringing EU AI Act into scope), a major vendor security incident, or a major framework update (NIST AI 600-2, EU AI Act implementing acts).
Related Resources
- AI Control Plane (definition)
- AI Vendor Risk (definition)
- AI Audit (definition)
- AI Policy Engine (definition)
- Compliance Hub
- EU AI Act Compliance Hub
- SOC 2 Compliance Hub
- HIPAA Compliance Hub
- GDPR Compliance Hub
- Areebi Platform
- Trust Center
- AI Vendor Risk Score (tool)
- AI Framework Comparison (tool)
- NIST AI RMF Gap Analyzer (tool)
- EU AI Act Readiness Checker (tool)
- Build vs Buy AI Governance Platform
- AI Control Plane vs AI Gateway
- AI Vendor List for CFOs
- AI Incident Response Runbook
- Open Source vs Proprietary LLM Governance
- 90-minute Shadow AI Hunt
- AI Red Team You Don't Have
- SOC 2 + AI Workloads Mapping
- AIBOM Playbook
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and governance best practices.
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and best practices.
About the Author
Areebi Research
The Areebi research team combines hands-on enterprise security work with deep AI governance research. Our analysis is informed by primary sources (NIST, ISO, OECD, federal registers, IAPP) and the operational realities of CISOs running AI programs in regulated industries today.
Ready to govern your AI?
See how Areebi can help your organization adopt AI securely and compliantly.