About this program
Copilot / Cursor / Claude Code / Codeium / equivalent — quick audit of how AI code assistants are deployed in your engineering org.
Risks addressed
- Critical Source code or IP sent to a free-tier assistant for training
- High Vulnerable AI-generated code shipped without review
- High Secrets in suggestions leak into commits
- Medium Licence-incompatible code generated and not flagged
Controls (8)
-
Approved AI coding assistants list
HighApproved AI coding assistants list
How to test + evidence
Testing procedure: Single approved tool (or short list) with enterprise plan + DPA.
Evidence to collect: Approved tool register.
-
Enterprise tier — no training on customer code
CriticalEnterprise tier — no training on customer code
How to test + evidence
Testing procedure: Contract clause: code submitted is not used to train the providers shared models.
Evidence to collect: Signed DPA / contract clause.
-
Repo-level scope + opt-out for sensitive code
HighRepo-level scope + opt-out for sensitive code
How to test + evidence
Testing procedure: Sensitive repos / paths excluded from assistant context.
Evidence to collect: Scope config screenshot.
-
Secret scanning on every commit (incl. AI-generated)
CriticalSecret scanning on every commit (incl. AI-generated)
How to test + evidence
Testing procedure: Pre-commit + push protection catches secrets the assistant suggested.
Evidence to collect: Scanner config + last blocks.
-
AI-generated code subject to normal PR review
HighAI-generated code subject to normal PR review
How to test + evidence
Testing procedure: Policy: AI output is treated as untrusted input; reviewer attests.
Evidence to collect: Policy + PR template.
-
SAST / SCA in CI catches insecure AI suggestions
HighSAST / SCA in CI catches insecure AI suggestions
How to test + evidence
Testing procedure: Same security gates as any other code change.
Evidence to collect: CI workflow.
-
Licence / IP scanning on AI output
MediumLicence / IP scanning on AI output
How to test + evidence
Testing procedure: Tool flags suspiciously-similar code blocks; legal review for ambiguous cases.
Evidence to collect: Scanner config + last flags.
-
Telemetry + audit: who used what, when
MediumTelemetry + audit: who used what, when
How to test + evidence
Testing procedure: Tenant admin logs available; reviewed monthly.
Evidence to collect: Audit log sample.