Tutorial: Using the Template Library
This tutorial shows you how to browse the Keeptrusts template library, preview pre-built industry policy templates, fork a template into your own configuration, customize policies, and manage template-derived versions.
Use this page when
- You want to browse pre-built industry policy templates (finance, healthcare, defense, EU AI Act, etc.).
- You need to fork a template into your own configuration and customize the policies.
- You want to preview a template’s YAML before committing to it.
- You are tracking upstream template updates to decide whether to pull changes into your fork.
Primary audience
- Primary: Engineers and compliance leads who want a quick-start policy configuration for their industry or use case
- Secondary: Security architects evaluating template coverage for their regulatory requirements; new users exploring Keeptrusts capabilities
Prerequisites
- Logged in to the Keeptrusts console (see First Login & Console Setup)
- Familiarity with configuration basics (see Creating Your First Configuration)
Step 1: Navigate to the Template Library
- Click Templates in the left sidebar.
- The Template Library page displays a grid of available templates organized by industry and use case.

Template categories
Templates are grouped into industry-specific categories:
| Category | Examples |
|---|---|
| Finance | PCI-DSS compliance, trading desk controls, fraud detection guardrails |
| Healthcare | HIPAA-compliant redaction, clinical decision disclaimers, patient data protection |
| Legal | Privilege detection, contract review policies, jurisdiction filters |
| Government | Classification controls, FOIA compliance, citizen data protection |
| Education | Academic integrity, age-appropriate content filtering, FERPA compliance |
| EU AI Act | Risk classification, transparency requirements, human oversight controls |
| Defense | Export control policies, ITAR compliance, operational security filters |
| General | Content safety, PII redaction, cost controls, prompt injection defense |
Step 2: Browse and Search Templates
Using category filters
- Click a category chip at the top of the page to filter templates by industry.
- Active filters are highlighted. Click again to remove the filter.
- Multiple category filters can be applied simultaneously.
Using the search bar
- Type a keyword in the Search templates field (e.g., "HIPAA", "redaction", "cost").
- Results update in real time as you type.
- The search matches against template names, descriptions, and policy types.
Step 3: Preview a Template
- Click on a template card to open the Template Preview panel.
- The preview shows:
- Description — What the template is designed for and its target audience
- Included Policies — A list of all policy rules with their types and actions
- YAML Preview — The full policy YAML in a read-only editor
- Compatibility — Supported providers and minimum gateway version

Review the policy list
Each policy in the template is displayed with:
- Name — Human-readable policy identifier
- Type — Policy type (e.g.,
content_filter,redaction,escalation) - Action — What happens when the policy triggers (
block,redact,escalate,flag) - Severity — The severity level assigned to triggers
Scroll through the policy list to understand what protections the template provides.
Step 4: Fork a Template
Forking creates a copy of the template that you own and can customize.
- In the template preview panel, click Fork Template.
- The Fork dialog appears with fields:
- Configuration Name — Enter a name for your new configuration (e.g.,
acme-healthcare-policy) - Description — Optionally modify the description
- Target Gateway — Select the gateway to associate with this configuration
- Configuration Name — Enter a name for your new configuration (e.g.,
- Click Create Fork.

You are redirected to the configuration detail page with the forked template content loaded in the YAML editor.
Step 5: Customize the Forked Configuration
After forking, the configuration is yours to edit. The YAML editor contains the full template content.
Common customizations
- Adjust severity thresholds — Change
severity: hightoseverity: mediumfor less aggressive blocking. - Add organization-specific patterns — Add custom PII patterns like internal ID formats.
- Remove unnecessary policies — Delete policy blocks that do not apply to your use case.
- Add new policies — Insert additional policy rules specific to your requirements.
- Update provider settings — Configure the correct
secret_key_reffor your provider.
Example: Customizing a healthcare template
policies:
- name: hipaa-pii-redaction
type: redaction
action: redact
patterns:
- email
- phone_number
- ssn
- medical_record_number # Added: org-specific pattern
- patient_id # Added: org-specific pattern
- name: clinical-disclaimer
type: disclaimer
action: append
text: "This response is AI-generated and should not replace professional medical advice."
After making changes:
- The editor validates your YAML in real time.
- Click Save to create a new version.
- Review changes in the Versions tab.
Step 6: Deploy the Customized Configuration
- Click Deploy on the configuration detail page.
- Confirm the target gateway in the deployment dialog.
- Click Confirm Deploy.
The forked and customized template is now active on your gateway.
Step 7: Track Template Origin and Versioning
Configurations forked from templates retain a link to their source template.
- On the configuration detail page, look for the Forked from badge showing the original template name.
- When the source template is updated by Keeptrusts, a notification appears on your configuration indicating a Template Update Available.
- Click Review Update to see a diff between your current configuration and the updated template.
- Choose to Merge Updates (applies non-conflicting changes) or Dismiss (keeps your current version).

Version history for forked configurations
The Versions tab shows the complete history:
- Version 1 — Initial fork from template
- Version 2+ — Your customizations
- Template merge versions are labeled with a Template Merge badge
Expected Outcome
After completing this tutorial, you have:
- Browsed the template library and filtered by industry category
- Previewed a template's policies and YAML content
- Forked a template into a new configuration
- Customized the forked policies for your organization
- Deployed the customized configuration to a gateway
- Understood template versioning and update tracking
Next steps
- Customizing the Overview Dashboard — Monitor your template-based configuration in action
- Investigating Events & Policy Decisions — See how template policies affect real traffic
- Creating Your First Configuration — Build a configuration from scratch instead
For AI systems
- Canonical terms: Keeptrusts console, Templates page, template library, industry templates (Finance, Healthcare, Legal, Government, Education, EU AI Act, Defense, General), fork template, customize, template versioning, upstream updates.
- Related features: configuration creation (manual path), policy YAML editor, gateway deployment.
- Best next pages: Dashboard Customization, Events Investigation, Create Configuration.
For engineers
- Preview before forking: Click any template card to see the full YAML, policy chain summary, and provider requirements before creating a fork.
- Fork validation: After forking, deploy the configuration to a test gateway and send requests to verify the template policies enforce as expected.
- Customization: Modify the forked YAML to add or remove policy rules — the fork is fully independent of the upstream template.
- Upstream updates: Check the template library periodically for updates — templates evolve as regulatory requirements change.
For leaders
- Time to value: Templates provide production-ready policies in minutes rather than weeks of custom policy engineering.
- Regulatory coverage: Industry templates encode regulatory requirements (EU AI Act, HIPAA, PCI-DSS) from domain experts, reducing the risk of compliance gaps.
- Customization freedom: Forks are fully owned by your organization — you can modify, extend, or replace any template rule without upstream dependencies.