Policy Reference

Keypost supports 17 policy types organized into 6 categories. Policies are evaluated in order and can be combined for layered protection.

How policies work

When a request arrives, Keypost evaluates all policies attached to that Keypost. The request is allowed only if all policies pass. A single deny stops the request.

Request → Policy 1 (pass) → Policy 2 (pass) → Policy 3 (deny) → BLOCKED

Policy categories

Access

PolicyDescription
AllowExplicitly allow specific tools
DenyBlock specific tools entirely

Constraints

PolicyDescription
ParametersValidate and constrain parameter values
ScheduleTime-based access windows
GeoGeographic restrictions
EnvironmentDifferent rules per environment
RequiresDependency on prior tool calls

Rate Limits

PolicyDescription
ThrottleLimit calls per time window
QuotaDaily/monthly usage caps

Data Protection

PolicyDescription
DLPBlock or redact sensitive data patterns
Field RedactionRemove specific fields from audit logs
Response DLPScrub sensitive data from responses

Cost Control

PolicyDescription
BudgetTrack and limit spend
ReuseCache responses to avoid duplicate calls

Compliance

PolicyDescription
ApprovalRequire human approval for sensitive ops
AuditEnhanced logging for compliance

Creating policies

From your Keypost dashboard:

  1. Select a Keypost
  2. Click Add Policy
  3. Choose a template or start from scratch
  4. Configure the policy settings
  5. Save and activate

Policies take effect immediately. No restart required.