Skip to main content

Policies

Policies are the foundation of the governance framework. Each policy defines a set of stages, validators, enforcement rules, and applicable resource types that together create a compliance workflow for platform resources.

Policy Structure

A policy definition includes:

FieldTypeDescription
nameStringDescriptive name (e.g., "Production Deployment Approval")
descriptionStringPurpose and scope of the policy
versionStringSemantic version for change tracking (e.g., 1.0.0)
categoryEnumSecurity, Compliance, Quality, or Operational
severityEnumCritical, High, Medium, Low, or Info
applicableResourceTypesString[]Resource types this policy applies to
stagesArrayOrdered list of approval stages with fields and validators
enforcementRulesArrayPer-environment enforcement actions
isActiveBooleanWhether the policy is currently enforced
isDraftBooleanWhether the policy is still in draft mode
tagsString[]Organizational tags for categorization
complianceFrameworksString[]Associated frameworks (SOC 2, HIPAA, GDPR, etc.)
yamlSourceStringOriginal YAML content if imported
versionHistoryArrayChange log with version, author, timestamp, and reason

Creating a Policy

Step 1: Open the Policy Builder

  1. Navigate to Governance in the sidebar
  2. Click Create Policy (or navigate to /governance/policies/new)
  3. The Policy Builder opens with a tabbed wizard interface

Step 2: Define Policy Basics (General Tab)

Configure the core policy metadata:

  • Name — A descriptive name that clearly identifies the policy's purpose (e.g., "Production Deployment Approval", "AI Model Bias Review")
  • Description — Detailed explanation of what the policy enforces and why it exists
  • Version — Semantic version string (e.g., 1.0.0)
  • Category — Choose the policy's domain:
    • Security — Access control, encryption, vulnerability management
    • Compliance — Regulatory requirements, data handling, privacy
    • Quality — Code review, testing, performance standards
    • Operational — Deployment procedures, monitoring, incident response
  • Severity — Set the importance level: Critical, High, Medium, Low, or Info
  • Applicable Resource Types — Select which resources this policy applies to: Applications, Add-ons, Workflows, Data Sources, ML Models, AI Gateway Models, Workspaces, Projects

Step 3: Configure Stages (Stages Tab)

Policies consist of ordered stages that resources must complete sequentially. Each stage collects information and requires validator approval before advancing.

Adding a Stage

Click Add Stage and configure:

SettingDescription
NameDescriptive stage name (e.g., "Security Review", "Technical Approval")
OrderSequential position in the workflow (auto-assigned)
RequiredWhether this stage must be completed or can be skipped
SLA HoursExpected completion time — notifications escalate when overdue
DependenciesOther stage IDs that must complete first

Stage Fields

Build custom form fields for data collection at each stage. Users must complete all required fields before submitting the stage for approval.

Field TypeDescriptionUse Case
textSingle-line text inputShort answers, identifiers, names
textareaMulti-line text inputDescriptions, justifications
richtextRich text editor with formattingDocumentation, analysis reports
radioSingle selection from optionsYes/no, severity level
checkboxMultiple selection checkboxesCompliance checklist items
dropdownSingle selection dropdownCategory selection, environment
multiselectMultiple selection dropdownSelect tags or frameworks
fileFile uploadEvidence documents, test reports, screenshots
numberNumeric input with min/maxMetrics, scores, counts
dateDate pickerTarget dates, review dates
datetimeDate and time pickerScheduled events, deadlines
urlURL input with validationExternal documentation, dashboards
emailEmail input with validationContact for responsible parties

Each field supports these properties:

  • Label — Human-readable display label
  • Required — Whether the field must be completed before submission
  • Default Value — Pre-populated value
  • Help Text — Guidance shown below the field to explain what is expected
  • Placeholder — Placeholder text in empty fields
  • Options — Available choices (for radio, checkbox, dropdown, multiselect)
  • Validation — Regex patterns, min/max values, or custom rules
  • Conditional Display — Show/hide based on another field's value

Stage Validators

Assign approvers who must sign off on each stage:

Validator TypeDescriptionBest For
UserSpecific user by ID — only that user can approveDesignated reviewers, compliance officers
RoleAny user with the specified role can approveFlexible team assignments
GroupOrganization membership checkCross-team approvals, committees

Approval logic for multiple validators:

  • All — Every validator must approve (unanimous)
  • Any — A single validator approval is sufficient
  • Majority — More than 50% of validators must approve

Each validator has an isActive flag that can be toggled to temporarily disable them during absences.

Guardrail Requirements (AI Gateway Models)

For policies that apply to AI Gateway Models, stages can include guardrail requirements specifying which AI guardrails must be enabled:

  • Required Guardrails — Must be active on the model (hard requirement)
  • Recommended Guardrails — Should be active (soft requirement, generates warnings)
  • Configuration Requirements — Specific guardrail settings (e.g., PII detection must mask SSN)

The enforcement engine verifies guardrail compliance during pre-deployment checks. See Guardrails for the complete list of available guardrails.

Step 4: Set Enforcement Rules (Enforcement Tab)

Enforcement rules define how policy violations are handled per environment:

ActionBehavior
hard_blockResource cannot be deployed or promoted until the policy completes. No workaround without an admin override.
soft_blockDeployment is blocked but can be overridden by an admin with a written justification.
warningA warning is logged but deployment proceeds normally.
post_reviewDeployment is blocked until a manual post-deployment review is completed.

Configure different enforcement levels per environment:

Development:  warning        (track compliance, don't block)
Staging: soft_block (block but allow override)
Production: hard_block (strict enforcement)

Each rule can also specify:

  • Override Roles — Roles allowed to override blocks (default: admin only)
  • Require Justification — Whether overrides must include a written reason

Step 5: Review and Activate

  1. Review all stages, fields, validators, and enforcement rules in the Advanced tab (shows YAML preview)
  2. Save as Draft to test the policy with sample resources
  3. When ready, set isActive: true and isDraft: false to begin enforcement
  4. Share the policy with specific users or teams as needed

Importing Policies from YAML

Policies can be imported from YAML files for version-controlled governance-as-code:

  1. Navigate to Governance > Policies and click Import Policy
  2. Paste or upload YAML content
  3. The system validates the required fields
  4. The policy is created in draft mode (isActive: false, isDraft: true)
  5. Review and activate when ready

Required YAML fields:

  • name — Policy name
  • categorySecurity, Compliance, Quality, or Operational
  • targetResourceTypes — Array of resource type strings

Optional YAML fields: description, severity, stages, enforcementRules, resourceSpecificFields, guardrailRequirements, tags, complianceFrameworks

Example YAML:

name: Production AI Model Approval
description: Ensures all AI models pass safety and quality checks before production
category: Quality
severity: High
targetResourceTypes:
- aiGatewayModel
- mlModel
complianceFrameworks:
- NIST AI RMF
- EU AI Act
stages:
- name: Performance Review
order: 1
isRequired: true
fields:
- name: accuracy_score
label: Model Accuracy Score
type: number
required: true
helpText: Enter the model's accuracy on the test dataset (0-100)
- name: test_report_url
label: Test Report URL
type: url
required: true
validators:
- type: role
identifier: data-scientist
isActive: true
- name: Safety & Bias Review
order: 2
isRequired: true
fields:
- name: bias_assessment
label: Bias Assessment
type: richtext
required: true
helpText: Document the bias analysis across protected groups
- name: guardrails_enabled
label: Required Guardrails
type: checkbox
options:
- Content Filter
- PII Detection
- Prompt Injection Prevention
required: true
validators:
- type: role
identifier: ai-safety-reviewer
isActive: true
enforcementRules:
- environment: development
action: warning
requireJustification: false
- environment: staging
action: soft_block
requireJustification: true
- environment: production
action: hard_block
requireJustification: true

Policy Catalog (Templates)

The Policy Catalog provides a shared repository of reusable policy templates that can be discovered, reviewed, and instantiated across the organization.

Browsing the Catalog

Navigate to Governance > Catalog (or /governance/catalog) to browse templates:

  • Search — Full-text search on name, description, and tags
  • Filter by Category — Security, Compliance, Quality, or Operational
  • Filter by Resource Type — Show templates for specific resource types
  • Filter by Framework — SOC 2, HIPAA, GDPR, ISO 27001, PCI DSS, etc.
  • Filter by Tags — Custom organizational tags
  • Verified Only — Show only administrator-verified templates
  • Sort By — Rating, usage count, creation date, or name

Each template card displays: name, description, target resource types, compliance frameworks, average rating, and usage count. Verified templates show a badge indicating administrator review.

Using a Template

  1. Find a template in the catalog
  2. Click Use Template
  3. Optionally customize the name, description, stages, or enforcement rules
  4. A new policy is created in draft mode from the template
  5. The template's usage count is incremented automatically

Publishing Templates

Create templates to share governance patterns across the organization:

  1. Create a policy template from the Policy Builder
  2. Set isPublic: true or call publish to make it visible to all users
  3. Associate tags, compliance frameworks, and target resource types
  4. Administrators can mark templates as Verified after review

Reviewing Templates

Users can rate templates from 1-5 stars and leave written reviews. Each user can review a template once. The template's average rating and review count update automatically. Reviews help teams identify the most effective governance patterns.

Policy Instance Lifecycle

When a policy is applied to a resource, a policy instance is created that tracks progress through the stages:

not_started → in_progress → pending_approval → approved → completed
→ denied (requires revision)

Instance States

StatusDescription
not_startedInstance created, no stages begun
in_progressAt least one stage has been started
pending_approvalA stage has been submitted and is awaiting validator action
approvedCurrent stage was approved (may proceed to next stage)
deniedCurrent stage was denied by a validator — requestor must revise
completedAll required stages have been approved
expiredInstance has passed its expiration date

Instance Operations

OperationWho Can Do ItNotes
Create instanceAny user with resource accessApplies a policy to a specific resource
Update metadataInstance creator or adminModify stage field data
Submit for approvalInstance creator or adminSends to validators for review
Approve stageAuthorized validators or adminAdvances workflow to next stage
Deny stageAuthorized validators or adminSends back for revision
Add commentAny user with instance accessDiscussion during review
Delete instanceCreator or adminCannot delete completed instances
Share instanceCreator or adminGrant view/comment access to users

Signoff Records

Each approval or denial creates an immutable signoff record:

FieldDescription
stageIdWhich stage was reviewed
validatorId / validatorNameWho made the decision
decisionapproved, denied, or conditional
commentsReviewer's comments and feedback
conditionsArray of conditions for conditional approvals
timestampWhen the decision was made

Sharing Policies and Instances

Both policies and instances support sharing with specific users:

  • Share policy — Allows specified users to view and use the policy
  • Unshare policy — Removes access for specified users
  • Share instance — Allows specified users to view and comment on the instance
  • Unshare instance — Removes access for specified users

Only the owner (creator) or administrators can share or unshare.

Policy Examples

Production Deployment Approval

Category: Operational | Severity: High | Resources: Applications, Workflows

StageValidatorPurpose
1. Security ReviewSecurity team (role)Validate security requirements and scans
2. Technical ApprovalLead engineer (user)Approve technical implementation
3. Business Sign-offProduct owner (user)Confirm business requirements met

Enforcement: hard_block in Production, soft_block in Staging, warning in Development

Data Privacy Compliance

Category: Compliance | Severity: Critical | Resources: Data Sources, Applications

StageValidatorPurpose
1. Data ClassificationData steward (role)Classify data sensitivity level
2. Privacy Impact AssessmentPrivacy officer (user)Document privacy implications
3. Legal ReviewLegal team (group)Approve data handling procedures

Enforcement: hard_block in all environments

AI Model Safety Validation

Category: Quality | Severity: High | Resources: AI Gateway Models, ML Models

StageValidatorPurpose
1. Performance MetricsData scientist (role)Document accuracy, precision, recall
2. Bias AnalysisAI ethics reviewer (user)Assess model for bias across protected groups
3. Guardrail VerificationSecurity team (role)Verify required guardrails are enabled
4. Model ApprovalData science lead (user)Final deployment approval

Enforcement: hard_block in Production, soft_block in Staging, warning in Development

Infrastructure Security

Category: Security | Severity: Critical | Resources: Add-ons, Data Sources

StageValidatorPurpose
1. Encryption VerificationDevOps (role)Verify encryption at rest and in transit
2. Access Control ReviewSecurity (role)Review access policies and IAM
3. Network IsolationInfrastructure lead (user)Confirm network segmentation

Enforcement: hard_block in Production and Staging

Important

Policies with hard_block enforcement prevent resource deployment until all required stages are completed. Use warning enforcement in development environments to avoid blocking developer workflows while still tracking compliance.