Policies

Centralized control over how your organization uses AI.

Kairro’s policy engine defines exactly what AI usage is allowed, when, and under what conditions. Policies combine DLP rules, tool restrictions, severity thresholds, and contextual logic into a unified enforcement layer—executed in real time inside AI workflows.

Kairro policies dashboard

What Policies Control

Define allow/warn/block, scope, criteria, and downstream actions.

1) Allowed?

Allow, Warn, or Block an AI action.

2) Scope

Org-wide, team-level, or identity-level application.

3) Criteria

DLP severity, regex patterns, AI tool/domain, input type, token limits, contextual metadata.

4) Aftermath

Log events, store DLP matches, update Shadow AI, trigger notifications/integrations.

Policy Model

Core entities that drive real-time AI enforcement.

Policy

Type: DLP, SHADOW_AI, ACCESS_CONTROL, OTHER

Status: DRAFT, ACTIVE, DISABLED

Scope: ORG, TEAM, IDENTITY

Priority: lower = earlier evaluation

isDefault: auto-applied by system

Policy Rules

Rule kinds: DLP, ALLOW_TOOLS, DENY_TOOLS, DOMAIN_RESTRICTION, TOKEN_LIMIT, OTHER.

Actions: ALLOW, BLOCK, WARN, MASK, ALERT.

Criteria (JSON): minSeverity, regex (prompt/completion/both), allow/deny tools, token threshold, custom matching.

How Policy Evaluation Works

Evaluated in /v1/extension/evaluate with deterministic sequencing.

1) Load tools

approvedSites (applyPolicies true/false), unapprovedTools (action/severity). Short-circuit unapproved; bypass if applyPolicies=false.

2) DLP scan

maxSeverity, matches, snippets, totalMatches feed the policy engine.

3) Evaluate by priority

Org/team/identity policies; ruleMatchesContext; strongest severity wins. Fallback: HIGH/CRITICAL→BLOCK, MEDIUM→WARN, else ALLOW.

4) Return decision

action, riskLevel, reasons, eventId, DLP summary. Extension enforces instantly and logs for telemetry.

Default Policies

Safe baseline via ensureDefaultPolicies.

Block on HIGH/CRITICAL DLP

Warn on MEDIUM DLP

Risky domains/tools

Paste sites, unapproved AI tools, optional model/domain blocks.

Identity-sensitive defaults

Admin Policy Management

Policy list

Active, Draft, Disabled, Default, Custom.

Policy editor

Add/remove rules, adjust action/severity, regex, tool lists, scope, priority, advanced matching.

Policy audit log

Actor, timestamp, change description, policy reference for compliance traceability.

Policy Delivery to Extensions

Policies enforced server-side; extensions fetch optimized config.

/v1/extension/policy

Returns approved AI tools (patterns + applyPolicies), unapproved tools (action/severity), and version metadata for caching.

Client-side safeguards

Unapproved tool detection, fail-closed on invalid license/expired subscription; sensitive policy data stays server-side.

Subscription Enforcement & Fail-Closed

Subscription validation before any policy evaluation.

Valid license required

Active subscription

Endpoint limits enforced

Fail-closed on errors

Evaluate failures trigger fail-closed behavior in the extension.

Why Kairro’s Policy Engine Is Different

Designed for AI

Evaluates prompt content, model details, identity, DLP matches, tool classification, and token usage.

Real-time & zero-trust

Prompt-by-prompt enforcement before data is sent; redacted, privacy-safe logging.

Deep integration

Policies interact with DLP, Shadow AI, governance, event telemetry, integrations, notifications.

Predictable & auditable

Clear priorities, structured rules, transparent fallback logic; fully logged for audits.

The Result

Kairro policies let organizations embrace generative AI with confidence.

Your data stays protected

AI tools remain controlled

Risk managed proactively

Compliance is met

Shadow AI is manageable

Behavior is consistent