Policy Reference
Keypost supports 17 policy types organized into 6 categories. Policies are evaluated in order and can be combined for layered protection.
How policies work
When a request arrives, Keypost evaluates all policies attached to that Keypost. The request is allowed only if all policies pass. A single deny stops the request.
Request → Policy 1 (pass) → Policy 2 (pass) → Policy 3 (deny) → BLOCKEDPolicy categories
Constraints
| Policy | Description |
|---|---|
| Parameters | Validate and constrain parameter values |
| Schedule | Time-based access windows |
| Geo | Geographic restrictions |
| Environment | Different rules per environment |
| Requires | Dependency on prior tool calls |
Data Protection
| Policy | Description |
|---|---|
| DLP | Block or redact sensitive data patterns |
| Field Redaction | Remove specific fields from audit logs |
| Response DLP | Scrub sensitive data from responses |
Cost Control
Compliance
Creating policies
From your Keypost dashboard:
- Select a Keypost
- Click Add Policy
- Choose a template or start from scratch
- Configure the policy settings
- Save and activate
Policies take effect immediately. No restart required.