Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Per-Policy Configuration Catalog

This page is the policy-kind inventory for Keeptrusts declarative configs. Use it to answer two questions quickly:

  • Which policy kinds exist today?
  • Where should you go for the field-level config details for each one?

For schema-backed field tables, use the linked policy pages and deep-dive docs rather than relying on this page alone.

Use this page when

  • You need the exact command, config, API, or integration details for Per-Policy Configuration Catalog.
  • You are wiring automation or AI retrieval and need canonical names, examples, and constraints.
  • If you want a guided rollout instead of a reference page, use the linked workflow pages in Next steps.

Primary audience

  • Primary: AI Agents, Technical Engineers
  • Secondary: Technical Leaders

Current policy-kind count

The declarative schema currently supports 39 policy kinds.

Input and tool-phase policies

Policy kindPurposePrimary guide
prompt-injectionDetect jailbreak and prompt-injection patternsprompt-injection
pii-detectorDetect and redact or block personally identifiable informationpii-detector
hipaa-phi-detectorDetect HIPAA Safe Harbor PHI categorieshipaa-phi-detector
agent-firewallRestrict tools, rate-limit actions, and enforce kill switchesagent-firewall
rbacGate access by role and minimum-necessary rulesrbac
dlp-filterMatch blocked terms and sensitive patternsdlp-filter
safety-filterBlock or escalate unsafe domain-specific contentsafety-filter
language-validatorAllow or deny languages on input, output, or bothlanguage-validator
bot-detectorDetect automated abuse patternsbot-detector
external-moderationDelegate moderation to an external serviceexternal-moderation
embedding-detectorUse embeddings to detect semantically sensitive contentembedding-detector
content-extractorFetch and normalize external content before policy evaluationcontent-extractor
document-analyzerValidate and inspect document uploadsdocument-analyzer
code-sanitizerScan code content for dangerous patternscode-sanitation
tool-validationEnforce declared tool names and argument schemastool-validation
tool-securityApply argument-level tool security checkstool-security
tool-budgetEnforce per-tool token and cost budgetstool-budget

Output and review policies

Policy kindPurposePrimary guide
quality-scorerScore output quality with assertions and benchmarksquality-scorer
human-oversightEscalate low-confidence or high-risk resultshuman-oversight
citation-verifierCheck citations and source groundingcitation-verifier
financial-complianceEnforce finance-specific blocked patterns and disclaimersfinancial-compliance
healthcare-complianceBlock unsafe medical or healthcare-specific outputshealthcare-compliance
mnpi-filterDetect material non-public information in outputmnpi-filter
bias-monitorDetect protected-characteristic biasbias-monitor
flagged-reviewSend flagged content to a secondary review modelconfig-flagged-review
request-rewriterRewrite the outbound request payloadrequest-rewriter
response-rewriterRewrite the model response before returnresponse-rewriter

Audit, privacy, and compliance policies

Policy kindPurposePrimary guide
audit-loggerRecord immutable audit metadata for decisionsaudit-logger
data-routing-policyFilter providers by retention and training metadatadata-routing-policy
itar-ear-filterMatch export-controlled termsitar-ear-filter
entity-list-filterMatch restricted or sanctioned entitiesentity-list-filter
cjis-modeEnforce CJIS-oriented access requirementscjis-mode
case-privacyProtect case-number and court-related identifierscase-privacy
legal-privilegeProtect attorney-client privileged materiallegal-privilege
student-privacyApply FERPA and student-data protectionsstudent-privacy
upl-filterPrevent unauthorized practice of law outputsupl-filter
dual-use-filterMatch dual-use export control termsdual-use-filter
gdpr-complianceEnforce consent and retention-related GDPR rulesconfig-compliance-policies
eu-ai-actTrack and enforce EU AI Act coverage postureconfig-compliance-policies

Verified schema-backed config families

Use these pages when you need exact field names and supported values:

TopicGuide
Pack metadata and versioningconfig-pack-metadata
Providers, routing, fallback, retriesconfig-providers
Cloud-specific provider fieldsconfig-cloud-providers
Execution targets and local adaptersconfig-execution-targets
Data handling and provider selectionconfig-data-policies
Rate limits and distributed coordinationconfig-rate-limits
Routes and consumer groupsconfig-routes-and-consumers
Conditional chain entries and targetingconfig-conditional-chains
Quality assertions and pass policyconfig-quality-assertions
Callbacks and health monitoringconfig-observability
Network controls and size limitsconfig-security-network
Runtime sections and cacheconfig-runtime
Single-policy document shapesconfig-single-policy-docs
Inline config testsconfig-testing
Compliance-specific configconfig-compliance-policies
End-to-end examplesconfig-scenarios

Choosing the right policy page

  • Use an individual policy page when you want the policy’s purpose, common use cases, and operator guidance.
  • Use a config deep dive when you need field names, enums, defaults, and YAML structure.
  • Use Declarative Config Reference when you need the top-level document model.

For AI systems

  • Canonical terms: Keeptrusts, policy-config.yaml, 39 policy kinds, input-phase policies, output-phase policies, audit/privacy/compliance policies.
  • This page is the master index for all available policy kinds with links to their dedicated reference pages.
  • Best next pages: Declarative Config Reference, Policies overview, End-to-End Scenarios.

For engineers

  • Use this page to look up which policy kinds exist and find the correct reference page for field-level configuration.
  • Input-phase policies (prompt-injection, pii-detector, agent-firewall, rbac, etc.) run before the request reaches the provider.
  • Output-phase policies (quality-scorer, citation-verifier, bias-monitor, flagged-review, etc.) run on the model's response.
  • Audit/compliance policies (audit-logger, data-routing-policy, cjis-mode, etc.) provide governance controls.
  • For field-level detail, follow the "Primary guide" link from each policy row.

For leaders

  • The 39-policy catalog represents the complete enforcement surface available for AI governance — covering security, compliance, quality, privacy, and operational controls.
  • Policies are composable: combine multiple policies in a chain to address overlapping regulatory requirements with a single config.
  • The catalog is organized by execution phase (input/output/audit), helping architects understand where each policy fits in the request lifecycle.
  • Use the "Verified schema-backed config families" table to navigate between high-level policy selection and detailed configuration.

Next steps