Policies

Centralized control over how your organization uses AI.

Kairro’s policy engine governs both browser activity and collector-backed workstation workflows. Policies combine DLP rules, tool restrictions, domain controls, review actions, and contextual logic into one enforcement layer for real AI usage.

Kairro policies dashboard

What Policies Control

Define allow, warn, block, and review actions with shared policy logic across browsers and collectors.

1) Allowed?

Allow, Warn, or Block an AI action.

2) Scope

Org-wide, team-level, or identity-level application.

3) Criteria

DLP severity, regex patterns, tools and domains, target surfaces, contextual metadata, and review thresholds.

4) Aftermath

Generate findings, update investigations, log telemetry, and trigger notifications or downstream integrations.

Policy Model

Core entities that drive real-time AI enforcement.

Policy

Type: DLP, SHADOW_AI, ACCESS_CONTROL, OTHER

Status: DRAFT, ACTIVE, DISABLED

Scope: ORG, TEAM, IDENTITY

Priority: lower = earlier evaluation

isDefault: auto-applied by system

Policy Rules

Rule kinds: DLP, ALLOW_TOOLS, DENY_TOOLS, DOMAIN_RESTRICTION, TOKEN_LIMIT, OTHER.

Actions: ALLOW, BLOCK, WARN, MASK, ALERT.

Criteria (JSON): minSeverity, regex (prompt/completion/both), allow/deny tools, token threshold, custom matching.

How Policy Evaluation Works

Evaluated with deterministic sequencing across browser prompts and collector-safe policy bundles.

1) Load policy context

Managed browsers receive approved and unapproved tool definitions; collectors receive signed policy bundles and review-safe rules.

2) DLP scan

maxSeverity, matches, snippets, totalMatches feed the policy engine.

3) Evaluate by priority

Org/team/identity policies; ruleMatchesContext; strongest severity wins. Fallback: HIGH/CRITICAL→BLOCK, MEDIUM→WARN, else ALLOW.

4) Return decision

Action, risk level, reasons, event ID, DLP summary, and any command sync metadata needed by the client.

Default Policies

Safe baselines for day-one rollout, then customizable rules for real operating needs.

Block on HIGH/CRITICAL DLP

Warn on MEDIUM DLP

Risky domains and tools

Paste sites, unapproved AI tools, and targeted model or domain restrictions.

Targeted review paths

Escalate specific collector-side actions into deterministic review workflows when needed.

Admin Policy Management

Policy list

Active, Draft, Disabled, Default, Custom.

Policy editor

Add or refine rules, adjust action and severity, target tools or domains, scope by org/team/identity, and publish confidently.

Policy sandbox & audit log

Test policies before rollout, then retain actor, timestamp, and change history for governance traceability.

Policy Delivery to Managed Endpoints

Policies stay centralized, while browsers and collectors receive only the delivery format they need.

Browser policy sync

Returns approved AI tools, unapproved tool definitions, and version metadata so extensions stay current without exposing unnecessary internals.

Collector-safe bundles

Collectors sync signed policy bundles and review instructions so workstation coverage stays aligned with the central policy engine.

Subscription Enforcement & Delivery Guardrails

Managed endpoint coverage, policy delivery, and subscription state all stay aligned.

Valid license required

Active subscription

Endpoint limits enforced

Reliable policy delivery

Browser and collector clients keep policy state synchronized with the admin control plane.

Why Kairro’s Policy Engine Is Different

Designed for AI

Evaluates prompt content, model details, identity, DLP matches, tool classification, and token usage.

Real-time & zero-trust

Prompt-by-prompt enforcement before data is sent; redacted, privacy-safe logging.

Deep integration

Policies interact with DLP, Shadow AI, governance, event telemetry, integrations, notifications.

Predictable & auditable

Clear priorities, structured rules, transparent fallback logic; fully logged for audits.

The Result

Kairro policies let organizations embrace generative AI with confidence.

Your data stays protected

AI tools remain controlled

Risk managed proactively

Compliance is met

Shadow AI is manageable

Behavior is consistent