You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
GitHub follows Microsoft's Responsible AI Standard:
Accountability
Transparency
Fairness
Reliability & Safety
Privacy & Security
Inclusiveness
Aligned with NIST AI Risk Management Framework (AI RMF).
4.2.2 — Enterprise Security Controls (15 min)
Control Categories
flowchart TB
subgraph CONTROLS["Enterprise Security Controls"]
direction TB
A["Policy Controls<br/>What features are allowed"]
B["Access Controls<br/>Who can use Copilot"]
C["Data Controls<br/>What code is processed"]
D["Audit Controls<br/>What is logged"]
end
Loading
Policy Controls Detail
Control
Options
Recommendation
Public code filter
Enabled / Disabled
Enable (reduces IP risk)
Agent Mode
Enabled / Disabled
Start disabled, enable after review
Coding Agent
Enabled / Disabled
Requires careful review
Third-party LLMs
Allow / Block
Block until vendor review
Copilot Extensions
Allow / Block
Block initially
Preview features
Enabled / Disabled
Disable for production
Access Controls Detail
Control
Implementation
SSO/SAML
Enterprise: Required
SCIM provisioning
Automate seat assignment
IdP group mapping
Team-based assignment
IP allowlisting
Enterprise network only (optional)
Data Controls Detail
Control
Scope
Syntax Example
Content exclusion
Org/Repo level
**/.env, **/secrets/**
Repository restrictions
Org level
Exclude specific repos
File pattern exclusion
Global
**/*.pem, **/credentials.*
⚠️ Critical Limitation
Agent Mode and Coding Agent do NOT respect content exclusions.
If content exclusion is critical, consider disabling these features.
Audit Controls Detail
Log Type
Retention
Export Options
Audit log (Copilot events)
180 days
CSV, JSON, GraphQL, REST
Git events
7 days
Same
Streaming to SIEM
Real-time
Splunk, Azure Event Hub
4.2.3 — Data Retention Policies (8 min)
Retention by Access Point
Access Point
Prompts/Suggestions
User Engagement
Feedback
IDE (Business/Enterprise)
Not retained
2 years
As needed
GitHub.com Chat
28 days
2 years
As needed
Coding Agent
Session lifetime
2 years
As needed
Data Residency
Primary processing: GitHub-owned Azure tenants
Traffic routing: Based on capacity, not geography
No guarantee of regional data residency
For Regulated Industries
If data residency is mandated:
Document the Azure processing model
Assess if "in-memory only" satisfies requirements
Consider on-premises alternatives (e.g., JetBrains AI Enterprise) if required
4.2.4 — Audit Log Analysis (7 min)
Copilot-Specific Audit Events
Event
Trigger
Use Case
copilot.seat_assignment_created
License assigned
Track provisioning
copilot.seat_assignment_deleted
License removed
Track deprovisioning
copilot.cfb_seat_cancelled
Business seat cancelled
Billing audit
copilot.content_exclusion_changed
Exclusion rules modified
Policy change tracking
Audit Log Query Example
actor:username action:copilot created:>2025-01-01
SIEM Integration Options
SIEM
Integration Method
Splunk
GitHub App for Splunk + Audit Log Streaming
Microsoft Sentinel
Azure integration + audit log connector
DataDog
GitHub integration + webhook
Elastic
REST API + webhook
Module 4.3: Compliance Framework Mapping (30 min)
4.3.1 — SOC 2 Mapping (10 min)
Trust Services Criteria Alignment
TSC
GitHub Copilot Control
Evidence
CC6.1 (Logical access)
SSO/SAML, SCIM, IdP groups
Audit logs
CC6.6 (System boundaries)
Content exclusion, network config
Policy settings
CC6.7 (Data transmission)
TLS encryption, Azure network
Trust Center
CC7.2 (Monitoring)
Audit logging, SIEM streaming
Audit exports
CC8.1 (Change management)
Policy cascade, approval workflows
Enterprise settings
PI1.1 (Privacy notice)
Data handling documentation
Trust Center
SOC 2 Audit Preparation
For your organization's SOC 2:
Document Copilot as a subservice (SaaS)
Reference GitHub's SOC 2 Type 2 report
Document your configuration choices
Maintain audit log exports
4.3.2 — ISO 27001 Mapping (10 min)
Annex A Control Alignment
Control
Title
Copilot Implementation
A.5.15
Access control
SSO, SCIM, policy cascade
A.5.23
Cloud service security
GitHub SOC 2/ISO 27001 certs
A.8.3
Information access
Content exclusion, repo restrictions
A.8.10
Information deletion
Retention policies (no retention)
A.8.12
Data leakage prevention
Content exclusion, code filters
A.8.15
Logging
Audit logs, SIEM streaming
A.8.16
Monitoring
Metrics dashboard, alerts
ISO 27001 Documentation Requirements
Risk assessment including AI tools (1.3 in this track)
Statement of Applicability update for AI processing
Third-party supplier assessment for GitHub
Incident response procedures for AI tool issues
4.3.3 — NIST Frameworks (10 min)
NIST CSF 2.0 Mapping
Function
Category
Copilot Control
IDENTIFY
Asset Management
Seat inventory, license tracking
PROTECT
Access Control
SSO, policy enforcement
PROTECT
Data Security
Content exclusion, encryption
DETECT
Continuous Monitoring
Metrics dashboard, audit logs
RESPOND
Analysis
Audit log investigation
RECOVER
Recovery Planning
Seat management, policy restore
NIST AI RMF Alignment
GitHub claims alignment with NIST AI RMF through Microsoft RAI Standard:
AI RMF Function
GitHub Implementation
GOVERN
Responsible AI Impact Assessment
MAP
Risk mapping for AI products
MEASURE
Copilot effectiveness studies
MANAGE
Safety filters, content moderation
NIST 800-53 (Federal)
For federal contractors:
Review FedRAMP status (GitHub Enterprise Cloud)
Document AI tool authorization
May require additional controls for classified work
Module 4.4: Policy Framework Design (20 min)
4.4.1 — Recommended Policy Template (10 min)
GitHub Copilot Security Policy Template
# GitHub Copilot Acceptable Use & Security Policy**Version:** 1.0
**Effective Date:**[Date]**Owner:** Information Security
**Review Cycle:** Quarterly / Per Major Release
## 1. Purpose
This policy defines security requirements for GitHub Copilot usage
within [Organization Name].
## 2. Scope
All employees with GitHub Copilot licenses.
## 3. Policy Requirements### 3.1 Approved Use Cases- Development of [approved project types]- Code completion and assistance
- Test generation
- Documentation generation
### 3.2 Prohibited Use Cases- Classified or restricted code
- Code under NDA without vendor approval
- Generation of security-critical algorithms without review
- Processing of PII/PHI without authorization
### 3.3 Required Controls| Control | Setting | Enforcement ||---------|---------|-------------|| Public code filter | Enabled | Enterprise policy || Content exclusion |[Patterns]| Enterprise policy || Agent Mode |[Enabled/Disabled]| Enterprise policy || Coding Agent |[Enabled/Disabled]| Enterprise policy |### 3.4 Review Requirements- All Copilot-generated code subject to standard code review
- Security-sensitive code requires security review
- No automatic commits of Copilot suggestions
## 4. Compliance
Violations subject to [standard disciplinary process].
## 5. Exceptions
Exceptions require CISO approval.
## 6. Review History| Version | Date | Changes ||---------|------|---------|| 1.0 |[Date]| Initial policy |
4.4.2 — Ongoing Security Review Process (10 min)
Release Review Cadence
flowchart LR
A["GitHub Release<br/>(~Monthly)"] --> B["Security Review<br/>(2-5 days)"]
B --> C{"New Features?"}
C -->|Yes| D["Risk Assessment"]
C -->|No| E["Confirm Controls"]
D --> F["Update Policy"]
E --> F
F --> G["Communicate to Admins"]
Loading
New Feature Review Checklist
For each new Copilot feature:
What data does it access?
Does it respect content exclusion?
Does it require new permissions?
What audit events are generated?
Is it enabled by default?
Should we enable, disable, or defer?
Security Incident Response
Scenario
Response
Suspected data leak via Copilot
Disable for affected users, audit logs, investigate
Vulnerability in Copilot extension
Update extension, communicate to users
GitHub security incident
Monitor GitHub status, review audit logs
Malicious code suggestion accepted
Standard incident response, add to test cases
Track Assessment
Security Review Deliverables
After completing this track, you should produce:
Risk assessment document (Module 1.3 template)
Control configuration recommendations (Module 2.2)
Compliance mapping relevant to your frameworks (Module 3)