Understanding Developer Identity: Securing the SDLC Through Developer Identity and Action Attribution

74% of Software Security Risks Originate with Developers—Human and AI.
Yet most security programs lack visibility into who created code, how it was created, and which identity—human, AI, or both—introduced risk across the SDLC.

Developer Identity is a critical but often missing layer in modern software security. Traditional tools analyze code, infrastructure, and runtime—but fail to reliably connect risks back to developer identity and actions. This blind spot limits accountability, investigation, and effective remediation.

Archipelo addresses this gap with developer-level observability and telemetry—linking developer identity and actions to proactively identify and mitigate risks before, during, and after code is committed.

What is Developer Identity?

Developers are the custodians of modern software systems. Their actions—whether performed directly, AI-assisted, or fully automated—directly influence security outcomes across the SDLC.

Developer Identity focuses on establishing clear attribution between code, tools, and actions and the human or AI identities behind them. This visibility enables organizations to enforce governance, reduce insider risk, and maintain audit-ready accountability across development workflows.

Developer Identity is foundational to Developer Security Posture Management (DevSPM), which links scan results and security findings to developer identity and actions across the SDLC.

Key elements include:

  • Identity Attribution
    Associating commits, pull requests, and code changes with the responsible developer or AI agent.

  • Action Context
    Linking tools used, workflows followed, and decisions made to specific identities.

  • Risk Ownership
    Mapping vulnerabilities, policy violations, and insecure practices to identifiable actors for clear remediation and accountability.

Without identity-aware visibility, organizations struggle to understand how risk entered the SDLC—or how to prevent recurrence.

Developer risk often emerges when vulnerabilities are introduced without clear attribution to identity and action. This includes:

  • Insider Threats
    Malicious or compromised developer credentials can expose proprietary code, introduce vulnerabilities, or enable unauthorized access. Identity-linked telemetry is essential to detect and investigate these risks.

  • Unapproved Tools and Shadow IT
    When developers or AI agents use ungoverned tools, organizations lose visibility into how code is created and modified.

  • AI-Assisted Development Risk
    AI-generated code introduces new attribution challenges. Without visibility into whether code was authored by a developer, AI, or both, teams cannot reliably assess or remediate risk.

  • Leaked Secrets and Sensitive Data
    API keys, tokens, or credentials embedded in source code must be traceable to the identity and action that introduced them.

Developer Security Posture Management addresses these challenges by linking risks directly to developer identity and actions—providing the context needed for effective investigation and response.

Developer Identity and Risk
Real-World Examples of Poor Developer Identity Management

Several incidents underscore the dangers of unmanaged Developer Posture:

  • Identity Mismanagement and Insider Risks, Uber Breach (2022): Compromised developer credentials allowed a hacker to access Uber’s internal systems, exposing sensitive user and driver data. This incident emphasized the need for robust identity and access controls in development environments.

  • AI-Driven Code Vulnerabilities, GitHub Copilot Flaw (2024): Researchers found that GitHub’s Copilot AI tool occasionally suggested insecure code, such as functions prone to SQL injection or XSS, especially when paired with vulnerable codebases. While Copilot itself is not inherently insecure, the risks are amplified by how individual developers interact with it—especially when pairing AI-generated suggestions with pre-existing vulnerable codebases.

Managing Developer Identity with Archipelo

Archipelo embeds Developer Identity within Developer Security Posture Management, creating a system of record that ties security outcomes to developer identity and actions across the SDLC.

Archipelo creates a historical record of coding events across the SDLC tied to developer identity and actions—human and AI—enabling teams to understand who acted, how risk was introduced, and where remediation is required.

Key Capabilities

  • Developer Vulnerability Attribution
    Trace scan results and vulnerabilities to the developers and AI agents who introduced them.

  • Automated Developer Tool Governance
    Scan developer and CI/CD tools to verify tool inventory and mitigate shadow IT risks.

  • AI Code Usage & Risk Monitor
    Monitor AI code tool usage to ensure secure and responsible software development.

  • Developer Security Posture
    Generate insights into security risks introduced by developer actions across individuals and teams.

Archipelo integrates with existing ASPM and CNAPP stacks, strengthening security programs with developer-aware visibility and accountability.

Developer Identity as a Strategic Priority

Without identity-aware visibility, organizations face:

  • Security findings with no clear owner

  • Limited investigation and root-cause analysis

  • Repeated risk across teams and workflows

  • Increased exposure from insider threats and ungoverned AI usage

Developer Security Posture Management makes developer identity observable—human and AI—so organizations can address risk at its source, not after it becomes an incident.

Contact us to learn how Archipelo strengthens your existing ASPM and CNAPP stack with Developer Security Posture Management.

Get started today

Archipelo helps organizations ensure developer security, resulting in increased software security and trust for your business.