Skip to main content
← All controls
A.6.2.3 / SC-7 ISO/IEC 42001:2023

Enterprise tier — no training on customer code

Demonstrate that enterprise-tier AI/ML models are architecturally and procedurally prevented from training on customer code, production data, or proprietary client content.

Description

What this control does

This control ensures that AI/ML models deployed at the enterprise tier are trained exclusively on sanitized, anonymized, or synthetic datasets and explicitly prohibited from training on live customer data, production code repositories, or proprietary client intellectual property. Organizations implement technical guardrails such as data classification enforcement, training pipeline access restrictions, and automated scanning to prevent customer code or PII from entering model training workflows. This separation protects customer confidentiality, reduces model leakage risks, and ensures compliance with data sovereignty and contractual obligations.

Control objective

What auditing this proves

Demonstrate that enterprise-tier AI/ML models are architecturally and procedurally prevented from training on customer code, production data, or proprietary client content.

Associated risks

Risks this control addresses

  • Unauthorized exposure of customer proprietary source code or algorithms through model outputs or inference attacks
  • Model memorization of sensitive customer data leading to inadvertent disclosure via generative responses or embeddings
  • Violation of contractual data processing agreements or regulatory requirements (GDPR, CCPA, HIPAA) due to unauthorized training on customer PII
  • Intellectual property theft or competitive harm if customer trade secrets are encoded into shared or multi-tenant model weights
  • Loss of customer trust and legal liability from unintended reproduction of customer-specific code patterns or business logic
  • Supply chain contamination where poisoned or malicious customer code influences model behavior across other customers
  • Regulatory penalties and breach notification obligations if customer data is used without explicit consent or lawful basis

Testing procedure

How an auditor verifies this control

  1. Obtain and review the enterprise AI/ML training policy document, identifying explicit prohibitions on customer code or production data ingestion.
  2. Inventory all enterprise-tier AI/ML models, including training data sources, pipeline configurations, and data lineage documentation.
  3. Examine data classification and labeling procedures to verify customer data is tagged and segregated from training-eligible datasets.
  4. Inspect training pipeline access controls, reviewing role-based permissions and verifying customer data repositories are excluded from training service accounts.
  5. Review automated scanning or data loss prevention (DLP) tool configurations that detect and block customer code or PII from entering training workflows.
  6. Select a sample of recent model training runs and trace input datasets back to origin, confirming no customer production environments or repositories were accessed.
  7. Interview ML engineers and data scientists to confirm awareness of customer data prohibitions and verify adherence to approved data sourcing procedures.
  8. Test technical enforcement by simulating an attempt to add a customer data source to a training pipeline and verify system rejection or alerting occurs.
Evidence required Collect the enterprise AI/ML training policy, data classification schema, training pipeline architecture diagrams, access control matrices (IAM policies, RBAC configurations), DLP or scanning tool rulesets, training run logs showing data source paths, and change control records for model training jobs. Obtain screenshots of attempted unauthorized data ingestion showing system blocks or alerts, and interview notes or attestation forms from ML engineering staff.
Pass criteria All enterprise-tier AI/ML models demonstrably source training data exclusively from approved, non-customer datasets, with technical controls and policy enforcement preventing customer code or production data ingestion, evidenced by pipeline configurations, access restrictions, and sample validation.

Where this control is tested

Audit programs including this control