On this page
TL;DR
MAP is the second of four functions in NIST AI 100-1 (AI RMF 1.0, January 2023) and contains five subcategories, MAP 1 through MAP 5. Where GOVERN sets organisation-wide policy, MAP sets per-system context, risk categorisation, capability documentation, impact mapping, and residual risk acceptance. Source: NIST AI 100-1. Updated 2026-05-20.
Why MAP comes second and why that matters
MAP is the function that converts an abstract AI use case into a concrete risk artefact a CISO can act on. GOVERN sets the rules of the game; MAP is where you play those rules against a specific system, vendor, or workflow. Without MAP outcomes, MEASURE has nothing to measure and MANAGE has nothing to manage. NIST is explicit on this ordering in AI 100-1: the framework "is designed to equip organizations to use the AI RMF to map risks specific to deployed AI systems".
For CISOs running the AI governance programme inherited from the GOVERN deep dive, MAP is where the work becomes operational. Each AI system on the inventory needs five outputs: a documented context, a risk categorisation, a capabilities and limitations record, an impact assessment, and a residual risk acceptance decision. Those five outputs correspond exactly to MAP 1 through MAP 5, and they are the documents auditors and regulators will request first.
At Areebi, we built the inventory and assessment workflow so that MAP outputs are generated as a natural part of onboarding any AI system into the platform, rather than as a separate compliance exercise. The strategic point: MAP is where the largest absolute risk surface in an enterprise gets characterised, and the discipline of doing it well is what separates organisations that survive their first AI incident from those that do not.
The 5 MAP subcategories explained with examples
NIST AI 100-1 organises MAP into five subcategories, each describing a per-system outcome the organisation should achieve. The subcategory IDs (MAP 1, MAP 2, and so on) are the canonical reference used by auditors, regulators, and procurement teams. Each one below explains the outcome, gives a concrete CISO-level example, and points to the Areebi capability that operationalises it.
MAP 1: Context is established and understood
MAP 1 requires that the organisation documents and understands the context in which the AI system is being developed, deployed, or procured. The outcome is a written record of intended purpose, deployment setting, users, affected populations, data inputs, decision outputs, regulatory regimes that apply, and the operating environment.
A concrete example: a regional health insurer brings in a vendor AI tool that summarises prior authorisation requests for clinical reviewers. The MAP 1 record names the use case (clinical summarisation), the user population (utilisation management nurses), the affected population (members whose requests are summarised), the data inputs (clinical notes, ICD-10 codes, prior auth submissions), the decision outputs (summary text only - the human reviewer still adjudicates), the regulatory regimes (HIPAA, state insurance commissioner rules, the Colorado AI Act if Colorado members are in scope), and the operating environment (BAA in place, data residency US, vendor model is OpenAI GPT-4 class via Azure with no training on submissions).
The trap to avoid: treating context as a one-line use-case description. NIST AI 100-1 contemplates a multi-page artefact that is reviewed when the system, vendor, or scope materially changes. The Areebi platform inventory stores this context record alongside the live system so that it is impossible to add a model in production without a current MAP 1 entry.
MAP 2: Categorization of the AI system
MAP 2 requires that the AI system is categorised according to risk and other relevant factors, so that the appropriate level of oversight and controls can be applied. The outcome is a documented risk tier (with a rationale) that drives downstream MEASURE and MANAGE decisions.
A concrete example: the same insurer rates the prior authorisation summariser as "high impact" because errors could plausibly affect benefit decisions, even though the human reviewer is the formal decision-maker. That high-impact rating triggers stricter requirements: monthly accuracy spot-checks, mandatory pre-deployment red teaming, a published model card to clinical leadership, and the right to disable the tool on 24-hour notice if accuracy degrades. By contrast, an internal marketing copy assistant that affects no external party and produces no decision artefact is rated "limited impact" and runs on lighter-touch monthly review.
The trap to avoid: treating risk categorisation as static. NIST AI 100-1 expects re-categorisation when the model is retrained, repurposed, or moved to a new population. The EU AI Act uses parallel categories (prohibited, high-risk, limited, minimal) and ISO/IEC 42001 expects risk classification to be reviewed at least annually as part of the management system. CISOs should align internal risk tiers with EU AI Act categories where the organisation has EU exposure, because that mapping cuts downstream documentation effort substantially.
MAP 3: AI capabilities, targeted usage, goals, and benefits
MAP 3 requires that the AI capabilities, targeted usage, goals, expected benefits, and costs of the AI system are understood, documented, and communicated. The outcome is a model and use-case card that records what the system can do, what it cannot do, the assumptions behind it, and the expected benefits net of costs.
A concrete example: a financial services CISO documents the targeted usage of a fraud-triage model: "rank inbound transactions by fraud likelihood for queueing to human reviewers; the model does not make automated decline decisions". The capabilities record includes the model architecture (gradient boosting on tabular features), the training data window (rolling 24 months of confirmed fraud and legitimate transactions), the known limitations (poor calibration on transactions from countries representing less than 0.5 percent of training volume), the expected benefit (review queue reduced by 40 percent in pilot), and the costs (vendor licence, internal MLOps support, model risk management overhead). This artefact is the source of truth used by every other function downstream.
The trap to avoid: copying vendor marketing as the capability record. NIST is clear that MAP 3 expects the deploying organisation to characterise capabilities in its own terms, with its own assumptions and its own evidence. Vendor claims are evidence inputs, not the artefact. Areebi audit logs attach the model and policy version to every interaction, which makes it straightforward to challenge vendor-supplied capability claims against actual behaviour in production.
MAP 4: Risks and benefits are mapped
MAP 4 requires that risks and benefits of the AI system are mapped to specific outcomes, with attention to both intended and unintended impacts on affected populations. The outcome is a structured impact assessment that goes beyond "could the model be wrong" to consider second-order effects on individuals and groups.
A concrete example: a public sector CISO running a benefits-eligibility triage model documents impacts across the lifecycle. Intended impacts: faster eligibility determinations, reduced backlog. Unintended impacts considered: disparate false-rejection rates across language groups, automation bias by caseworkers (over-reliance on model output), loss of caseworker judgment over time, model drift as eligibility rules change, vendor lock-in if vendor exits the market. Each impact is rated by likelihood and severity. Mitigations are assigned by impact, with named owners. The impact assessment is updated quarterly and after any material model change.
The trap to avoid: writing impact assessments that read like risk theatre. NIST AI 100-1 and NIST AI 600-1 (the Generative AI Profile, published 2024-07-26) both emphasise that the assessment must inform actual decisions about deployment, control selection, and ongoing monitoring. If your impact assessment never causes a control to be added, removed, or strengthened, it is not doing its job. OMB M-24-10 makes this explicit for US federal agencies: high-impact AI requires a pre-deployment impact assessment that materially shapes the deployment.
MAP 5: Impacts to individuals, groups, communities, organisations, and society are characterised
MAP 5 requires that the organisation characterises the magnitude of impact across affected stakeholders and reconciles those impacts against the organisation's risk tolerance. The outcome is a documented risk acceptance decision: who accepted the residual risk, on what basis, for what duration, and under what conditions the acceptance is revoked.
A concrete example: the CISO and the AI Governance Committee review the impact assessment for an HR screening assistant. The residual risk is documented (small but non-zero risk of disparate impact in initial CV ranking; mitigated by mandatory recruiter review of all model outputs and quarterly disparate impact testing). The risk owner (the VP of HR) formally accepts the residual risk in writing, with the acceptance valid for 12 months or until the next material model change, whichever comes first. The risk acceptance is logged in the governance committee minutes and surfaced on the executive risk dashboard. If quarterly disparate impact testing exceeds a documented threshold, the acceptance is automatically revoked and the system is paused pending review.
The trap to avoid: implicit risk acceptance. NIST expects an explicit, named, time-bound acceptance with documented revocation conditions. This is also where most internal audit findings cluster - auditors look for the named individual, the written rationale, and the link between the residual risk and the organisation's stated risk tolerance. The ISO/IEC 42001 management system clause on risk treatment is built on this same expectation.
See Areebi in action
Get a 30-minute personalised demo tailored to your industry, team size, and compliance requirements.
Get a DemoCommon pitfalls
Three pitfalls show up repeatedly when CISOs operationalise MAP, and each one is avoidable with a small amount of design discipline at programme kickoff.
Pitfall 1: Context records that are vendor decks. A team copies the vendor product description into MAP 1, attaches a logo, and considers the artefact complete. Three months later a regulator asks for the deploying organisation's characterisation of the system and the only document available is the vendor's. Avoid this by requiring the MAP 1 record to be authored in the deploying organisation's voice, with the vendor materials as appendices. Areebi's MAP 1 template forces the deploying organisation to name the affected population, the regulatory regimes, and the operating constraints in its own words.
Pitfall 2: Risk categorisation drift. A system is rated "limited impact" at initial deployment, the vendor releases a major capability upgrade six months later, and the rating is never refreshed. Now a system that materially affects external decisions is sitting under lightweight controls. Avoid this by binding the risk tier to the model and policy version in the inventory, so that any material change triggers a re-categorisation workflow rather than relying on someone remembering to revisit the artefact. The model supply chain security guide covers the mechanics of version-based re-categorisation in depth.
Pitfall 3: Impact assessments that never change a control. The team produces a multi-page MAP 4 artefact, files it, and never returns to it. NIST is explicit that the assessment must inform actual control decisions. Avoid this by requiring every MAP 4 artefact to produce a specific output: a control delta (which controls are added, removed, or strengthened compared with the default), or an explicit "no controls required" decision with a rationale. If MAP 4 produces neither, it is not done.
MAP-to-Areebi capability mapping
The table below maps each MAP subcategory to the Areebi platform capability that implements it. The mapping is intentionally conservative - we list only capabilities that ship in the platform today, cross-checked against the NIST AI RMF hub and the platform overview.
| Subcategory | Outcome | Areebi capability | Where to look |
|---|---|---|---|
| MAP 1 | Context established and understood | System inventory with structured context record (purpose, users, affected populations, regulatory regimes) | /platform |
| MAP 2 | System categorised by risk | Risk-tier tagging linked to model and policy version, automatic re-categorisation triggers on version change | /platform#dashboard |
| MAP 3 | Capabilities, usage, goals documented | Model and use-case card templates, deploying-organisation-authored capability records | /platform#policy |
| MAP 4 | Risks and benefits mapped to outcomes | Structured impact assessment templates with control-delta requirement, quarterly review workflows | /platform#policy |
| MAP 5 | Impacts characterised and residual risk accepted | Named risk acceptance workflow with time-bound expiry, dashboard surfacing of residual risk by owner | /platform#audit |
If you want to validate this mapping against your own environment, the Areebi AI Governance Assessment scores your current state across all five MAP outcomes and produces a prioritised remediation plan.
What to read next
To extend MAP into the rest of the AI RMF, work through this cluster in order.
- NIST AI RMF GOVERN function deep dive - the cross-cutting foundation that MAP depends on. Read this if you have not yet stood up an AI Governance Committee.
- NIST AI RMF compliance hub - the canonical Areebi reference for the full framework and how each function maps to platform controls.
- NIST AI RMF implementation guide - the end-to-end implementation playbook covering all four functions over a 24-week timeline.
- ISO/IEC 42001 certification guide - the management system standard that pairs cleanly with the AI RMF, especially for MAP 2 and MAP 5 risk treatment evidence.
- AI compliance landscape 2026 - the cross-jurisdiction view that shows how a single MAP implementation satisfies multiple regulators simultaneously.
Frequently Asked Questions
What is the MAP function in NIST AI RMF?
MAP is the second of four functions in the NIST AI Risk Management Framework (AI RMF 1.0, NIST AI 100-1, published January 2023). It establishes the per-system context, risk categorisation, capability documentation, impact assessment, and residual risk acceptance for each AI system the organisation deploys or procures. MAP outputs are the foundation that MEASURE and MANAGE both depend on.
How many MAP subcategories are there?
MAP contains five subcategories: MAP 1 (context is established and understood), MAP 2 (the AI system is categorised by risk), MAP 3 (capabilities, targeted usage, goals, and benefits are documented), MAP 4 (risks and benefits are mapped to specific outcomes), and MAP 5 (impacts on affected stakeholders are characterised and residual risk is accepted). The subcategory IDs are the canonical reference auditors and regulators use.
What is the difference between MAP and GOVERN?
GOVERN is cross-cutting and organisation-wide: policies, accountability, culture, third-party controls. MAP is per-system: the context, risk categorisation, capability documentation, impact assessment, and residual risk acceptance for each specific AI system. GOVERN sets the rules; MAP applies those rules to individual systems. NIST AI 100-1 expects both to be in place, and they reinforce each other.
How does MAP relate to EU AI Act risk categories?
The EU AI Act uses four formal risk categories (prohibited, high-risk, limited risk, minimal risk) that map closely to the risk tiering required by MAP 2. Organisations with EU exposure should align their internal MAP 2 risk tiers with EU AI Act categories, because that alignment cuts downstream documentation effort substantially. A system rated high-risk under MAP 2 will typically also be high-risk under the EU AI Act and will require the same fundamental rights impact assessment.
What documents prove MAP compliance?
Auditors and regulators typically expect: a current AI system inventory with a context record per system (MAP 1); a documented risk categorisation with rationale per system (MAP 2); a model and use-case card authored by the deploying organisation (MAP 3); a structured impact assessment with intended and unintended impacts (MAP 4); and a named, time-bound residual risk acceptance with documented revocation conditions (MAP 5). The Areebi platform inventory generates these artefacts as a byproduct of normal onboarding.
How often should MAP artefacts be refreshed?
NIST AI 100-1 expects MAP artefacts to be refreshed when the system, vendor, scope, or operating environment materially changes. As a practical baseline, organisations should refresh the context record (MAP 1) and risk categorisation (MAP 2) at least annually, the impact assessment (MAP 4) at least quarterly for high-impact systems, and the residual risk acceptance (MAP 5) on a defined time-bound basis (typically 12 months, sooner for higher-risk systems). The Areebi inventory binds MAP artefacts to the model and policy version so that material changes automatically trigger a refresh workflow.
Related Resources
- NIST AI RMF Compliance Hub
- Areebi Platform
- Policy Engine
- Audit Log
- Compliance Dashboards
- AI Governance Assessment
- EU AI Act Compliance
- Colorado AI Act Compliance
- ISO 42001 Compliance
- NIST AI RMF GOVERN Deep Dive
- NIST AI RMF Implementation Guide
- ISO 42001 Certification Guide
- AI Compliance Landscape 2026
- Model Supply Chain Security
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and governance best practices.
Stay ahead of AI governance
Weekly insights on enterprise AI security, compliance updates, and best practices.
About the Author
Areebi Research
The Areebi research team combines hands-on enterprise security work with deep AI governance research. Our analysis is informed by primary sources (NIST, ISO, OECD, federal registers, IAPP) and the operational realities of CISOs running AI programs in regulated industries today.
Ready to govern your AI?
See how Areebi can help your organization adopt AI securely and compliantly.