{"id":4115,"date":"2026-05-21T09:06:16","date_gmt":"2026-05-21T09:06:16","guid":{"rendered":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/05\/21\/how-to-create-an-ai-acceptable-use-policy\/"},"modified":"2026-05-21T09:06:16","modified_gmt":"2026-05-21T09:06:16","slug":"how-to-create-an-ai-acceptable-use-policy","status":"publish","type":"post","link":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/05\/21\/how-to-create-an-ai-acceptable-use-policy\/","title":{"rendered":"How to Create an AI Acceptable Use Policy\u00a0"},"content":{"rendered":"<div><img data-opt-id=723960471  fetchpriority=\"high\" decoding=\"async\" width=\"770\" height=\"330\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2025\/06\/AI-model.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" \/><\/div>\n<p><img data-opt-id=1667573176  fetchpriority=\"high\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2025\/06\/AI-model-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/p>\n<p><span data-contrast=\"auto\">Artificial intelligence (AI) is everywhere in development operations (DevOps), from code suggestions and test generation to incident summaries and <a href=\"https:\/\/devops.com\/part-1-death-of-the-toil-how-ai-agents-are-replacing-traditional-runbooks\/\" target=\"_blank\" rel=\"noopener\">runbook drafts<\/a>. Simultaneously, shadow AI has become common, with teams using unapproved tools because they are faster or easier to access. This creates real exposure around sensitive data and regulated workflows. An AI Acceptable Use Policy (AUP) gives DevOps teams clear guardrails, so AI can support delivery without creating security,\u00a0privacy\u00a0and compliance issues.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Why the DevOps Team Needs an AI AUP<\/span><\/b><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">DevOps workflows move quickly, and AI can accelerate them further. Without a policy, speed often wins over scrutiny. A formal AUP sets expectations for tool\u00a0selection, data\u00a0handling\u00a0and review standards, so teams ship with fewer surprises and fewer avoidable incidents.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Shadow AI is the pressure point. A study published in the Journal of Accountancy found that\u00a0<\/span><a href=\"https:\/\/www.journalofaccountancy.com\/news\/2025\/nov\/lurking-in-the-shadows-the-costs-of-unapproved-ai-tools\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">59% of U.S. employees<\/span><\/a><span data-contrast=\"auto\">\u00a0reported using unapproved AI tools at work, and many admitted to sharing sensitive information through them. This is critical to DevOps because prompts can include stack traces, config fragments, customer\u00a0identifiers\u00a0or internal tickets that should never leave controlled systems.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">An AUP also supports compliance and audit readiness. When teams can show what tools are approved and how exceptions are handled, security and legal reviews become concrete. This results in fewer last-minute blockers and a clearer path to safely scaling AI use.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">What Makes\u00a0A\u00a0Strong AI Policy<\/span><\/b><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Governance connects day-to-day AI use to the organization\u2019s broader security and compliance strategy, including identity controls, data\u00a0classification\u00a0and auditability. The policy should spell out who can approve tools and which environments can access them.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Governance also reduces operational risk in direct ways. It\u00a0<\/span><a href=\"https:\/\/www.neosystemscorp.com\/blog\/from-data-to-defense-how-data-governance-and-ai-advance-compliance-and-security\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">lowers the odds of data breaches<\/span><\/a><span data-contrast=\"auto\">\u00a0and noncompliance by limiting access to authorized users and backing those limits with controls, audit logs and monitoring. These help defend against cyber threats and regulatory exposure.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For DevOps, governance must connect to the delivery system. If AI can write code, it needs the same change controls as any other contributor. If AI can read logs, it requires the same access boundaries as an\u00a0on call\u00a0engineer. Its permissions must be reviewable and revocable.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Key Components to Include in Your AI AUP<\/span><\/b><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">AI AUPs succeed when they translate risk into rules that DevOps teams can follow in their daily workflows. Core requirements include:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Acceptable use and approved tools:<\/span><\/b><span data-contrast=\"auto\">\u00a0List approved tool types and task-based uses, such as sanitized documentation and test generation. Define allowed and prohibited data classes, as small snippets can include credentials, client\u00a0data\u00a0or proprietary code.\u00a0<\/span><span data-ccp-props='{\"335559685\":720,\"335559991\":360}'>\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Privacy and confidentiality:<\/span><\/b><span data-contrast=\"auto\">\u00a0Ban proprietary code, customer PII and confidential business info from public models. Require a security review before using AI with regulated or contract-bound data.<\/span><span data-ccp-props='{\"335559685\":720,\"335559991\":360}'>\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Security controls and threat mitigation:<\/span><\/b><span data-contrast=\"auto\">\u00a0Require single sign-on, multi-factor authentication and role-based access. Address prompt injection and AI-assisted phishing risk with verification steps and training.<\/span><span data-ccp-props='{\"335559685\":720,\"335559991\":360}'>\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Accountability and enforcement:\u00a0<\/span><\/b><span data-contrast=\"auto\">Name the policy owner, define triage steps, document exceptions, and set a clear path for new-tool requests with security and data-handling reviews.<\/span><span data-ccp-props='{\"335559685\":720,\"335559991\":360}'>\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Real-world social engineering falls under the AUP because AI increases an attacker\u2019s efficiency. In one study, AI-generated phishing emails achieved\u00a0<\/span><a href=\"https:\/\/rehack.com\/cybersecurity\/ai-phishing\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">click rates of about 11%<\/span><\/a><span data-contrast=\"auto\">\u00a0compared with about 14% of human-written versions. The policy should turn that risk into routine practice by requiring out-of-band verification for unusual requests and strengthening account recovery controls.\u00a0\u00a0<\/span><span data-ccp-props='{\"335559685\":0,\"335559731\":0}'>\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Tips for Implementing Your AI AUP<\/span><\/b><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">DevOps teams should stick with what fits their day-to-day, so every rollout feels usable and ongoing. Focus on concrete enablement steps and work these into the routines. Run short training sessions built around real tasks and\u00a0designate\u00a0a place where everyone can find the approved tools and\u00a0allowed\u00a0use cases.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Review the internal policies versus external AI security guidance on a regular basis, so the team can remain aligned as models,\u00a0features\u00a0and risks evolve.\u00a0A good example of rules to follow is the Cybersecurity and Infrastructure Security\u00a0Agency\u2019s\u00a0<\/span><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/04\/15\/joint-guidance-deploying-ai-systems-securely\"><span data-contrast=\"none\">guidance on policy enforcement<\/span><\/a><span data-contrast=\"auto\">\u00a0and engineering controls.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Securely Innovating\u00a0With\u00a0AI in DevOps<\/span><\/b><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">AI is already part of the toolchain, whether or not a policy exists.\u00a0An AI AUP makes that reality governable by turning informal habits into transparent and reviewable decisions. When teams know which tools\u00a0are acceptable and which data\u00a0are off-limits, AI becomes a disciplined advantage rather than a quiet source of risk.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/devops.com\/how-to-create-an-ai-acceptable-use-policy\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\">Read More<\/a><\/p>\n<p>\u200b<\/p>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) is everywhere in development operations (DevOps), from code suggestions and test generation to incident summaries and runbook [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4116,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-4115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops"],"_links":{"self":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/4115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/comments?post=4115"}],"version-history":[{"count":0,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/4115\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media\/4116"}],"wp:attachment":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media?parent=4115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/categories?post=4115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/tags?post=4115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}