Policies & Governance
Highflame's governance model is built around typed Cedar policies, project-scoped administration, and runtime evidence captured across the platform. Instead of managing AI controls as ad hoc allowlists, prompt rules, and application-specific conditionals, the control plane gives you a shared policy layer that can be enforced by Shield, Firehog, and other runtime services.
Policy System
The policy foundation is provided by @highflame/policy package:
Cedar schemas define the valid entity types, actions, and context keys
generated types keep policy constants consistent across TypeScript, Go, Python, and Rust
runtime services such as Shield evaluate those policies during enforcement
This allows policy changes to remain explicit, reviewable, and portable across products.
Schema-Backed Authoring
Policies in Highflame are not free-form text pasted into a single service. They are tied to service-specific schemas so authors can work against the right action model and context surface for the product they are configuring.
Today that includes schemas for areas such as:
Guardrails for prompt, tool, file, and response enforcement
Overwatch for code agent and IDE operations
In Studio, teams can work with Cedar-aware editors and policy builders that validate policies against those schemas before they are deployed.
What Governance Looks Like In Practice
In day-to-day use, governance in the control plane usually means:
defining baseline guardrail policies that apply across a project
layering stricter rules for higher-risk agents, tools, or environments
controlling which MCP servers and tool operations are allowed
validating changes before rollout instead of discovering syntax or schema errors at runtime
investigating the exact policy and signal path behind a deny decision
Because policies are enforced against rich runtime context, teams can write rules that go beyond role checks. For example, a policy can depend on tool type, environment, detector score, MCP trust level, or whether earlier turns exposed sensitive data.
Governance Evidence
Governance is only useful if you can prove what the system decided. Highflame captures that evidence through Observatory and the runtime services:
Shield returns determining policies and policy reasons for enforcement decisions
observability events retain the signals and policy metadata that contributed to a decision
sessions and traces preserve the surrounding execution context for later review
This gives security, platform, and compliance teams a concrete path from policy definition to runtime evidence, without relying on screenshots or manual log collection.
Working With Policies In Studio
Studio acts as the control surface for governance. Teams use it to:
manage policies by product and project scope
validate Cedar text against the correct schema
inspect policy status and deployment state
review policy-backed outcomes alongside runtime investigations
The result is a governance model that stays close to the actual execution path. Policies are authored centrally, enforced at runtime, and visible again during investigation.
Last updated