Skip to content

AI Coding Agent Governance

Most teams do not struggle with AI coding because the model is weak. They struggle because every developer assembles a different runtime, a different plugin set, and a different safety posture.

SCC gives teams one governed runtime for AI coding agents. It lets organizations standardize the environment, then delegate the right parts of maintenance to team leads without giving up core security boundaries.

Governance is not only about blocking risky behavior. It is also about making day-to-day use predictable.

Governance SurfaceWhat SCC Controls
Provider policyAllow Claude, Codex, or both
Plugin policyApprove, block, and distribute plugins
MCP accessControl which servers teams may use
Network postureSet open, web-egress-enforced, or locked-down-web
Team defaultsGive each team its own profile and defaults
Project additionsLet repositories extend within allowed bounds
OnboardingGive developers one setup flow instead of tribal setup steps

Without a shared runtime, teams usually end up with:

  • different plugin sets on every machine
  • ad hoc network access and safety settings
  • onboarding that depends on a teammate remembering the right commands
  • no clear boundary between org-level policy and team-level customization
  • more friction when one team prefers Claude and another prefers Codex

SCC addresses those problems with one org config and a delegated profile model.

Org admins define the hard boundaries:

  • blocked plugins
  • blocked MCP servers
  • stdio MCP policy
  • default network posture
  • default team-wide plugins

These are the controls that should not vary from one team to the next.

Team leads work inside those boundaries:

  • choose team-specific plugins
  • choose team-specific MCP servers
  • adjust team defaults
  • maintain team config through inline or federated setup

That lets the people closest to the work shape the developer experience without rewriting the organization security model.

Developers should not have to install and tune the full stack by hand.

In the best case, they run:

Terminal window
scc setup
scc

SCC then pulls the team-approved setup into the sandboxed environment and lets them choose the provider that fits the task if both are allowed.

One of SCC’s strongest properties is that governance does not have to be rebuilt every time a team changes provider preference.

That matters in real organizations:

  • one team may prefer Claude for exploratory UI work
  • another may prefer Codex for backend-heavy work
  • some teams may want both available and decide per session

SCC keeps the same governance model either way. Provider choice changes the adapter and image, not the org rollout model.

1. One org config

Define the baseline once: providers, plugins, MCP policy, safety settings, and network posture.

2. Team-specific profiles

Let each team add only what it needs within org rules.

3. Simple developer onboarding

Developers run scc setup, connect allowed providers, and start working.

4. Safer day-to-day operation

Sessions run in sandboxes with the same baseline guardrails every time.

SCC is strongest when you need one or more of these:

  • multiple teams adopting AI coding at the same time
  • a platform or security function that wants one rollout model
  • delegated maintenance by team leads
  • support for both Claude Code and Codex without separate governance stacks
  • a controlled baseline for plugins, MCP, and network access

If you are a solo developer, you may not need this level of structure. For teams, it quickly pays for itself.

If this is the problem you are solving, read in this order:

  1. What is SCC?
  2. Security Model
  3. Organization Admin Overview
  4. Delegation