This document discusses how to validate risk data from various sources. It recommends auditing risk data to ensure accuracy, completeness, and relevancy. Some techniques mentioned include stratifying data ranges to identify outliers, sampling data to compare against real-world evidence, and checking for missing or incorrect values. The document also discusses characteristics to audit like metadata, data sources, and access logs. Overall it emphasizes assigning data ownership, automating validation rules, and defining processes to accept and cleanse risk data entering models.