Skip to content

Enterprise Governance and Compliance

Your security team wants to know: who ran what, when, against which repository, and what model was used. Your compliance team needs audit logs exportable to your SIEM. Your CTO wants adoption dashboards. And your developers want all of this to happen without slowing them down. This article covers the governance layer that makes Codex enterprise-ready.

  • A complete enterprise setup checklist: enabling local and cloud Codex, configuring GitHub connectors, and managing environments
  • RBAC configuration using ChatGPT workspace roles and groups
  • Three approaches to usage monitoring: Analytics Dashboard, Analytics API, and Compliance API
  • Security controls including requirements.toml, MCP allowlisting, and zero data retention
  1. Enable Codex local in Workspace Settings > Settings and Permissions. Turn on “Allow members to use Codex Local.”

  2. Enable Codex cloud by turning on the ChatGPT GitHub Connector and “Allow members to use Codex cloud.”

  3. Configure the GitHub Connector IP allowlist with the ChatGPT egress ranges and Codex container egress ranges.

  4. Create your first environment by connecting a repository and adding collaborator email addresses.

  5. Configure RBAC to control who can access local, cloud, and admin features.

  6. Set up the Slack integration if your team uses Slack, and configure answer posting policies.

  7. Enable code review in Settings > Code review.

  8. Deploy Team Config with shared config.toml, rules, and skills across your organization.

Codex integrates with ChatGPT’s RBAC system. Navigate to Settings & Permissions > Custom Roles in the admin page.

Create roles for different access levels:

RoleLocal AccessCloud AccessAdmin Access
DeveloperYesYesNo
Senior EngineerYesYesEnvironment edit
Platform TeamYesYesFull admin
Security AuditorNoNoAnalytics + Compliance API

Assign roles to groups created in the Groups tab. This controls who can use Codex locally, who can run cloud tasks, and who can administer environments and view analytics.

Standardize Codex across your organization with Team Config, which ships shared defaults without duplicating setup:

TypePathPurpose
Configconfig.tomlSandbox mode, approval policy, model, reasoning effort
Rulesrules/Which commands Codex can run outside the sandbox
Skillsskills/Shared skills available to all team members

Deploy Team Config through your existing configuration management (Chef, Puppet, Ansible) or include it in your developer environment setup.

requirements.toml constrains security-sensitive settings that users cannot override:

# Only allow these sandbox modes
allowed_sandbox_modes = ["read-only", "workspace-write"]
# Only allow these approval policies
allowed_approval_policies = ["untrusted", "on-failure", "on-request"]
# Restrict MCP servers to approved list
[mcp_servers.linear]
identity = { url = "https://mcp.linear.app/mcp" }
# Enforce command rules
[[rules.prefix_rules]]
pattern = [{ token = "rm" }, { token = "-rf" }]
decision = "forbidden"
justification = "Recursive force delete is not allowed"

The analytics dashboard provides real-time visibility:

  • Daily users by surface (CLI, IDE, Cloud, Code Review)
  • Daily code reviews and findings by priority
  • Cloud task volume and completion rates
  • Session and message counts per user

Export data in CSV or JSON for integration with your BI tools.

Automate reporting with the Analytics API:

  • Daily time-series metrics with optional per-user breakdowns
  • Code review activity: PRs reviewed, comments generated, severity breakdown
  • User engagement: replies, reactions, and feedback on Codex comments

The Compliance API provides audit-grade logs:

  • Prompt text sent to Codex
  • Responses generated
  • Identifiers: workspace, user, timestamp, model
  • Token usage and request metadata

Route these into your SIEM, eDiscovery, or DLP pipeline.

Codex supports organizations with ZDR enabled. The CLI and IDE Extension have zero data retention by default. Cloud features follow your ChatGPT Enterprise retention policies.

As an admin, you control whether users can enable agent internet access in cloud environments. Turn on Allow Codex agent to access the internet in workspace settings. Users then configure domain allowlists and HTTP method restrictions per environment.

  • At rest: AES 256
  • In transit: TLS 1.2+
  • Secrets in cloud environments: additional encryption layer, removed before agent phase
  • Users get “403 Unauthorized”: The admin has not enabled “Allow members to use Codex Local” or “Allow members to use Codex cloud” for their group.
  • Codex does not appear in ChatGPT: After enabling in workspace settings, allow up to 10 minutes for Codex to appear.
  • RBAC changes not taking effect: Role changes propagate within minutes but may require users to log out and back in.
  • Compliance API returns empty results: Verify the API token has the correct scopes and that the time window includes active sessions.
  • requirements.toml not enforced: The file must be at the correct system path. Check precedence: cloud-fetched requirements override local files for Business and Enterprise users.