Kumo features can help you with Model Risk Management
Model Risk Management (MRM) refers to the set of regulations in the financial industry that control the design and deployment of machine learning models, such as SR 11-7 (USA), SS3/8 (UK), IFRS 9, and others.
While MRM provides many benefits to society by ensuring that ML is used safely and fairly, it is often seen as a burden for data scientists, who need to go through a heavyweight audit and review process for every single new model they develop.
Kumo helps data scientists save time during the MRM audit process. All information that is typically needed for the MRM audit is available in the Kumo UI, API, or public documentation.
In this datasheet, we highlight the the set of capabilities within Kumo that you would use to satisfy a typical MRM process, such as the one outlined in the Comptroller’s Handbook for Model Risk Management, published by the US government. The sections in this datasheet correspond roughly to the table-of-contents of the Comptroller’s Handbook.
The Governance section of the Comptroller’s Handbook describes the organizational structure, tooling, and people-processes that are typically required to implement Risk Management within a large organization. We recommend using a separate compliance platform to run your MRM governance program as a whole. As described in subsequent sections, Kumo is able to provide documentation, validation, and IT controls, so that you can efficiently audit and safely deploy all models that were built with Kumo.
The first thing a data scientist does during MRM is to prove that “the design, theory, and logic underlying the model” are sound and appropriate for the business problem.
In practice, this involves documenting the rationale for all components of model design, such as (1) the reasons for using specific tables/columns as an input to the model, and any pre-processing of these features (2) the choice of final model architecture, including tests that were run that led to the selection of the final architecture.
Kumo has several capabilities that simplify this documentation process, such as:
In the Comptroller’s Handbook, the “Model Use” section is focused on understanding any additional risks and limitations related to the model’s use in production, such as any post-processing or overlays applied on the predictions, or whether the assumptions made by the model reflect reality.
Most of this does not directly relate to ML model itself, but there are a few areas where Kumo can help:
A sound model validation process ensures that a model performs as expected, including input data, processing, and reporting. This typically starts with a rigorous evaluation of model correctness prior to the deployment of the first version, including an outcomes analysis by backtesting on a holdout dataset. After the model is in production, ongoing validation is needed to ensure continued correctness of the model predictions, a practice often known as MLOps.
Kumo offers many capabilities around model evaluation, including:
In order to support ongoing validation of model correctness, Kumo has the following features related to MLOps:
When engaging with a third-party vendor for modeling, additional restrictions may apply. Most importantly, it is recommended for banks to maintain as much knowledge in-house as possible, in case the vendor or bank terminates the contract for any reason.
As Kumo is a platform that lets organizations train their own models, all of the knowledge on how to build your specific model, as well as the data used to train the model, remains in control of the organization. As such, satisfying this aspect of the MRM requirements is typically much easier, compared to a vendor that sells a specific model or dataset as a service.
MRM typically requires that the IT systems used to train and serve models meet your organization’s needs around availability and security.
Kumo relies on industry standard information security best practices and compliance frameworks, such as NIST 800-53, ISO 27000 series. It is SOC-2 type 2 compliant, and provides several standard deployment offerings to meet the needs of various security teams. Custom offerings are available upon request:
Kumo features can help you with Model Risk Management
Model Risk Management (MRM) refers to the set of regulations in the financial industry that control the design and deployment of machine learning models, such as SR 11-7 (USA), SS3/8 (UK), IFRS 9, and others.
While MRM provides many benefits to society by ensuring that ML is used safely and fairly, it is often seen as a burden for data scientists, who need to go through a heavyweight audit and review process for every single new model they develop.
Kumo helps data scientists save time during the MRM audit process. All information that is typically needed for the MRM audit is available in the Kumo UI, API, or public documentation.
In this datasheet, we highlight the the set of capabilities within Kumo that you would use to satisfy a typical MRM process, such as the one outlined in the Comptroller’s Handbook for Model Risk Management, published by the US government. The sections in this datasheet correspond roughly to the table-of-contents of the Comptroller’s Handbook.
The Governance section of the Comptroller’s Handbook describes the organizational structure, tooling, and people-processes that are typically required to implement Risk Management within a large organization. We recommend using a separate compliance platform to run your MRM governance program as a whole. As described in subsequent sections, Kumo is able to provide documentation, validation, and IT controls, so that you can efficiently audit and safely deploy all models that were built with Kumo.
The first thing a data scientist does during MRM is to prove that “the design, theory, and logic underlying the model” are sound and appropriate for the business problem.
In practice, this involves documenting the rationale for all components of model design, such as (1) the reasons for using specific tables/columns as an input to the model, and any pre-processing of these features (2) the choice of final model architecture, including tests that were run that led to the selection of the final architecture.
Kumo has several capabilities that simplify this documentation process, such as:
In the Comptroller’s Handbook, the “Model Use” section is focused on understanding any additional risks and limitations related to the model’s use in production, such as any post-processing or overlays applied on the predictions, or whether the assumptions made by the model reflect reality.
Most of this does not directly relate to ML model itself, but there are a few areas where Kumo can help:
A sound model validation process ensures that a model performs as expected, including input data, processing, and reporting. This typically starts with a rigorous evaluation of model correctness prior to the deployment of the first version, including an outcomes analysis by backtesting on a holdout dataset. After the model is in production, ongoing validation is needed to ensure continued correctness of the model predictions, a practice often known as MLOps.
Kumo offers many capabilities around model evaluation, including:
In order to support ongoing validation of model correctness, Kumo has the following features related to MLOps:
When engaging with a third-party vendor for modeling, additional restrictions may apply. Most importantly, it is recommended for banks to maintain as much knowledge in-house as possible, in case the vendor or bank terminates the contract for any reason.
As Kumo is a platform that lets organizations train their own models, all of the knowledge on how to build your specific model, as well as the data used to train the model, remains in control of the organization. As such, satisfying this aspect of the MRM requirements is typically much easier, compared to a vendor that sells a specific model or dataset as a service.
MRM typically requires that the IT systems used to train and serve models meet your organization’s needs around availability and security.
Kumo relies on industry standard information security best practices and compliance frameworks, such as NIST 800-53, ISO 27000 series. It is SOC-2 type 2 compliant, and provides several standard deployment offerings to meet the needs of various security teams. Custom offerings are available upon request: