Part I
The Three Layers of AI Usage
AI usage within an organization falls into three layers of increasing criticality. Each layer carries different risks, requires different controls, and activates different standards. The layers are not static — usage migrates between them over time.
Layer 1
Individual Support Use
Drafting emails, documents, plans
General Q&A and research
Not directly influencing project outputs
Includes ambient AI features (autocomplete, AI search)
Day-to-day activities where any employee uses AI for general support. The output is typically not a formal work product and has marginal or no influence on project-specific outcomes. The primary risk is data governance — what information (confidential, personal, NDA-protected) flows into external AI systems.
42001 A.2, A.3, A.4
23894
+ GDPR / Privacy
↓ Silent drift — often unnoticed
Layer 2
Individual Productive Use — "Shadow AI"
Technical work: engineering, design, safety analysis
Output directly influences project quality / safety
Self-built tools (scripts, prompt chains) — opaque, personal
External AI tools used in personal workflows
Often invisible to management
A qualified person (engineer, designer, project manager) uses AI as a personal productivity enhancer for their core technical work. The output directly influences project deliverables or organizational decisions. This is the highest-risk layer because it combines direct safety impact with low visibility.
26262 Pt.8 Cl.11, Pt.2
TR 5469 Cl.6, 9
42001 A.3.3, A.9.3
5338 §6.3
23894
↕ Deliberate promotion — requires qualification
Layer 3
Shared / Organizational AI Tools
Shared within team, across teams, or organization-wide
Requires validation, IT integration, access management
Internal or external (vendor-provided) tools
Distinction: built-with-AI vs. operates-with-AI at runtime
May need tool qualification per ISO 26262 Part 8
A tool that is officially deployed and shared. It requires proper development rigor, validation, user training, IT integration, and cybersecurity controls. A critical sub-distinction exists between tools that were built using AI but produce deterministic outputs, versus tools that use AI at runtime to generate outputs — the latter triggers significantly stricter requirements.
26262 Pt.8 Cl.11, Pt.2, Pt.10
TR 5469 Cl.6–9
42001 A.4, A.6, A.9, A.10
5338 full lifecycle
23894
PAS 8800
Standards color key
ISO 26262
ISO/IEC 42001
ISO/IEC 5338
ISO/IEC TR 5469
ISO/IEC 23894
ISO/PAS 8800
Part II
Discussion Topics & Open Work Items
Ten interconnected topics identified during brainstorming. Each requires further development — depth priority indicates where to focus first. All editable text sections can be clicked to modify directly.
01
Layer Definition & Classification Criteria
Depth: High
Formal definitions for Layers 1, 2, 3 and their sub-categories
Concrete criteria to classify any AI usage instance into a layer
Sub-distinctions: ambient AI in L1; self-built vs. external in L2; built-with vs. operates-with AI in L3
Foundation for the entire governance framework — everything else depends on this
42001 A.2.2, A.3.2, A.4.2–A.4.4, A.9.3
5338 Fig.2 lifecycle stages
TR 5469 Cl.6 Table 1 usage levels
02
Reclassification Triggers (Layer Transitions)
Depth: High
Silent drift L1→L2: support use becomes technical work product
Deliberate promotion L2→L3: personal tool becomes shared/official
Degradation path: unmaintained L3 tool reverts to uncontrolled state
Gate reviews as control points — add AI-specific checklists to existing confirmation measures
Lessons learned reviews should include AI usage as a standing topic
26262 Pt.2 §6.4.10 confirmation reviews, §6.5.3 safety plan
26262 Pt.2 Annex B safety culture / lessons learned
42001 A.2.4 policy review, §9.3 management review
5338 §6.4.14 continuous validation
Model-specific — original contribution
03
Shadow AI Detection & Mitigation
Depth: High
Three control layers: governance (policy), process (traceability/declaration), IT (approved tools/network)
Layer 2 is invisible by definition — users don't self-identify as "using a tool"
Biggest risk when functional safety, cybersecurity, and SOTIF are involved
Makes existing V&V and confirmation measures even more critical as safety nets
42001 A.2.2 policy, A.3.3 reporting, A.9.3 human oversight
5338 §6.3 audit trail for safety-related AI
23894 risk identification
26262 Pt.2 Annex B safety culture
IT controls → 21434 (future scope)
04
Criticality Axis (V-cycle Phase × ASIL × Activity Type)
Depth: Medium
Second axis beyond layer classification: what is the AI being used for?
Distinguish V-cycle activities from supporting/general project activities
Within V-cycle: criticality increases with project advancement (fewer downstream checks remain)
ASIL level of affected safety requirements modulates the risk
26262 Pt.2 Table 1 confirmation measures × ASIL
26262 Pt.8 Cl.11 TCL vs. ASIL
TR 5469 Cl.9 AI-specific V&V challenges
05
Tool Qualification Adaptation for AI
Depth: Very High
Part 8 Cl.11 TCL framework designed for deterministic tools — AI breaks the model
Non-deterministic output, prompt-dependent behavior, version instability
Part 10 alternative: boost TD to achieve TCL1 (avoid qualifying the tool, add process checks)
Which AI standards fill the gap that Part 8 can't cover alone?
Most technically novel contribution of the model
26262 Pt.8 Cl.11 (TI/TD/TCL, Tables 4–5)
26262 Pt.10 Cl.13 alternative approach
TR 5469 Cl.6, 9, Annex A (extended measures)
42001 A.4.4 tooling resources
5338 lifecycle processes for AI tools
06
External Tool / Vendor Dependency
Depth: High
Organization can qualify its use but not the model itself
Vendor may update model overnight — qualification invalidated
Distinction: vendor allows version/model locking vs. transparent updates
Controllable vendor → regression testing with golden dataset at intervals
Uncontrollable vendor → full human review of every output
42001 A.10.2–A.10.3 supplier management
42001 B.10.3 supplier guidance
26262 Pt.8 §11.4.2 revalidation on change
26262 Pt.10 Cl.13 re-qualification effort
5338 §5.3 supply chain risks
07
Shadow AI & Functional Safety Evidence Chain
Depth: High
Undeclared AI breaks the traceability/evidence chain ISO 26262 safety cases depend on
AI errors propagate downstream: plausible, internally consistent, systematically biased
Confirmation reviews must be designed to catch AI-specific error types
AI-specific additions needed for existing confirmation review checklists
26262 Pt.2 §6.4.10 confirmation reviews, Annex C guidance
TR 5469 Cl.9 AI-specific failure modes
42001 A.9.3 human oversight
Model-specific — new checklist items
08
Operationalization Format
Depth: Medium-High
How to package the model so it's usable by project managers and individual engineers
Decision tree: classify usage → identify layer → look up obligations
Understandable for both company management and individual employees
Clear "when and where the model applies"
42001 PDCA management system structure
5338 lifecycle process structure
26262 Pt.2 safety plan + confirmation scheduling
Packaging/design — original contribution
09
Organizational Maturity & Scalability
Depth: Low (for now)
Build complete model for complex cases first, simplify later
ISO 26262 rarely applies fully to very small organizations (<20 people)
Important differences: 30–50 people vs. thousands; product type matters
Eskube expertise: customization and simplification for deployment
42001 risk-based control selection
5338 process tailoring
26262 tailoring provisions
10
Review Cadence & Change Management
Depth: Medium
How often to review layer classifications, tool qualifications, vendor assessments
Aligned to project milestones at minimum
Vendor update pace may force more frequent reviews
Merged with Topics 2 (reclassification triggers) and 6 (vendor dependency)
42001 A.2.4 AI policy review cadence
26262 Pt.8 §11.4.2 revalidation on tool change
TR 5469 §8.7 technology maturity monitoring