Policies API
Customer policies define the security rules that Layer 3 (Policy Violation) evaluates against. Policies are scoped per customer and support glob pattern matching for flexible action control.Endpoints
POST /policies/{id}
Create a new policy configuration
GET /policies/{id}
Retrieve current policy configuration
PUT /policies/{id}
Update policy configuration
Policy Schema
Policy Fields
| Field | Type | Description |
|---|---|---|
sensitive_fields | string[] | Field names to flag as PII (e.g., “email”, “ssn”) |
allowed_tools | string[] | Legacy allowlist of tool names |
blocked_actions | string[] | Legacy blocklist of action strings |
allowed_action_patterns | string[] | Glob patterns for permitted actions |
blocked_action_patterns | string[] | Glob patterns for blocked actions (overrides allowed) |
sensitive_classifications | DataClassification[] | Data classifications that trigger PII checks |
custom_rules | object | Custom rule definitions (JSON) |
Pattern Matching
Policies use glob patterns for flexible action matching:blocked_action_patternstakes precedence overallowed_action_patterns- More specific patterns override less specific ones
- If an action matches both
blockandpermit,blockwins
Scoring Impact
When policies match an event during Layer 3 evaluation:| Match | Score Impact |
|---|---|
| Explicitly permitted by matching policy | -20 (reduces score) |
| No matching policy | +0 |
Matches a block pattern | +70 minimum (floors the score) |
Matches sensitive_classifications | +30 per sensitive field type |