AIUC-1
E010

Establish AI acceptable use policy

Establish and implement an AI acceptable use policy

Keywords
Acceptable Use
Breach
Application
Mandatory
Frequency
Every 12 months
Type
Preventative
Crosswalks
A.2.2: AI policy
A.2.4: Review of the AI policy
A.9.2: Processes for responsible use of AI systems
A.9.3: Objectives for responsible use of AI system
A.9.4: Intended use of the AI system
GOVERN 1.2: Trustworthy AI policies
MAP 1.6: System requirements
MAP 3.3: Application scope
MAP 3.4: Operator proficiency
MEASURE 2.4: Production monitoring
LLM10:25 - Unbounded Consumption

Control activities

Defining prohibited AI usage. For example, jailbreak attempts, malicious prompt injection, unauthorized data extraction, generation of harmful content, and misuse of customer data ideally with specific examples.

Implementing detection and monitoring tools. For example, prompt analysis, output filtering, usage pattern anomalies, and suspicious access attempts.

Real-time monitoring, blocking, or alerting capabilities.

Maintaining logging and tracking systems. For example, incident creation, violation tracking with case assignment and resolution documentation.

Establishing incident response procedures. For example, defining violation severity levels with corresponding response priorities, implementing escalation procedures with defined timeframes for user account restrictions and security notifications, documenting containment actions including system access modifications.

Conducting regular effectiveness reviews. For example, quarterly analysis of violation trends, tool performance assessment, policy updates based on emerging threats, and user training adjustments.

Organizations can submit alternative evidence demonstrating how they meet the requirement.

AIUC-1 is built with industry leaders

Phil Venables

"We need a SOC 2 for AI agents— a familiar, actionable standard for security and trust."

Google Cloud
Phil Venables
Former CISO of Google Cloud
Dr. Christina Liaghati

"Integrating MITRE ATLAS ensures AI security risk management tools are informed by the latest AI threat patterns and leverage state of the art defensive strategies."

MITRE
Dr. Christina Liaghati
MITRE ATLAS lead
Hyrum Anderson

"Today, enterprises can't reliably assess the security of their AI vendors— we need a standard to address this gap."

Cisco
Hyrum Anderson
Senior Director, Security & AI
Prof. Sanmi Koyejo

"Built on the latest advances in AI research, AIUC-1 empowers organizations to identify, assess, and mitigate AI risks with confidence."

Stanford
Prof. Sanmi Koyejo
Lead for Stanford Trustworthy AI Research
John Bautista

"AIUC-1 standardizes how AI is adopted. That's powerful."

Orrick
John Bautista
Partner at Orrick and creator of the YC SAFE
Lena Smart

"An AIUC-1 certificate enables me to sign contracts must faster— it's a clear signal I can trust."

SecurityPal
Lena Smart
Head of Trust for SecurityPal and former CISO of MongoDB
© 2025 Artificial Intelligence Underwriting Company. All rights reserved.