Skip to main content

Policies Overview

LangGuard's policy engine enables automated governance and compliance for AI operations. Define rules, detect violations, and ensure your AI systems meet organizational standards.

What Are Policies?

Policies are rules that evaluate AI agent traces to detect:

  • Security risks - PII exposure, injection attacks, unauthorized access
  • Compliance violations - Data retention, model usage, audit requirements
  • Cost overruns - Token limits, budget thresholds
  • Quality issues - Hallucination risk, response quality

How It Works

LangGuard uses Open Policy Agent (OPA) with policies written in Rego:

Trace Ingested → Policy Evaluation → Violations Logged → Alerts (coming soon)
┌─────────────────┐     ┌─────────────────┐     ┌─────────────────┐
│ New Trace │────▶│ OPA Server │────▶│ Violations │
│ Arrives │ │ (Rego Eval) │ │ Recorded │
└─────────────────┘ └─────────────────┘ └─────────────────┘

Policy Components

Policy Definition

Each policy includes:

ComponentDescription
NameUnique identifier
DescriptionWhat the policy detects
CategorySecurity, Compliance, Cost, Performance
SeverityCritical, High, Medium, Low
Rego CodeThe evaluation logic
EnabledActive or disabled

Example Policy

package langguard.pii_detection

# Detect personally identifiable information in outputs
violation[result] {
trace := input.trace
output := trace.output

# Check for email patterns
regex.match(`[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}`, output)

result := {
"policy": "pii_detection",
"severity": "critical",
"message": "Email address detected in output",
"evidence": output
}
}

Built-in Policies

LangGuard includes 10 pre-configured policies:

PolicyCategorySeverity
PII Data DetectionSecurityCritical
SQL Injection PreventionSecurityHigh
Token Usage LimitsCostMedium
Prompt Injection DetectionSecurityCritical
Sensitive Data AccessComplianceHigh
Rate LimitingPerformanceMedium
Output Length LimitsCostMedium
Hallucination RiskComplianceMedium
Data RetentionComplianceHigh
Model Version ControlComplianceMedium

Quick Start

1. Start OPA Server

# Using Docker
docker-compose up opa -d

# Or run directly
docker run -d -p 8181:8181 openpolicyagent/opa:latest-static run --server --addr 0.0.0.0:8181

2. Seed Built-in Policies

# Find your tenant ID
npm run list:tenants

# Seed policies
npm run seed:policies <tenant-id>

3. Enable Policies

  1. Navigate to Policies in LangGuard
  2. Browse available policies
  3. Toggle Enabled for desired policies

4. View Violations

  1. Go to Policies > Violations
  2. See traces that triggered policies
  3. Click to view details and evidence

Policy Dashboard

The Policies page shows:

┌──────────────────────────────────────────────────────────────┐
│ Policy Statistics │
├──────────────────────────────────────────────────────────────┤
│ Active Policies: 8/10 │
│ Violations (24h): 47 │
│ Critical: 3 │ High: 12 │ Medium: 25 │ Low: 7 │
└──────────────────────────────────────────────────────────────┘

Violation Breakdown

SeverityColorAction Required
CriticalRedImmediate investigation
HighOrangeReview within 24 hours
MediumYellowReview when possible
LowGrayInformational

Documentation

Built-in Policies

Details on all pre-configured policies.

Creating Policies

Write custom policies with Rego.

Policy Violations

Understanding and managing violations.

Best Practices

1. Start with Built-in Policies

Enable built-in policies first to establish baseline governance:

  • Enable "PII Detection" for all environments
  • Enable "Token Limits" to control costs
  • Enable "SQL Injection" for security

2. Tune Severity Levels

Adjust severity based on your risk tolerance:

  • Critical: Must be addressed immediately
  • High: Review same day
  • Medium: Review weekly
  • Low: Informational only

3. Review Violations Regularly

Establish a violation review process:

  • Daily: Check critical violations
  • Weekly: Review all violations
  • Monthly: Analyze trends, adjust policies

4. Create Custom Policies

After understanding built-in policies, create custom ones for:

  • Company-specific compliance requirements
  • Application-specific guardrails
  • Industry regulations

Next Steps