Policy Lifecycle & Governance
Summary
Policy Lifecycle and Governance provides controls for managing policy changes from creation through retirement. It includes versioning, status management, approval workflows, and audit trails to ensure policies are reviewed, tested, and deployed safely.
Why It Exists
Policies control access to sensitive resources and operations. Uncontrolled changes can create security vulnerabilities or block legitimate access. Governance ensures that policy changes are intentional, reviewed, and traceable for compliance requirements.
Where It Fits in Keymate
Policy lifecycle features are integrated into the Policy Engine and Admin Console. Policies are stored with version metadata, and all changes are logged to the audit system for compliance reporting.
Boundaries
What it covers:
- Policy status transitions (draft, enabled, disabled)
- Version tracking and history
- Audit logging of policy changes
- Shared policy management across tenants
What it does not cover:
- Policy authoring syntax (see Policy DSL)
- Real-time policy simulation (see Simulation & Why Denied)
How It Works
Policy Status
| Status | Description | Effect |
|---|---|---|
DRAFT | Policy is being authored, not yet submitted | No effect on decisions |
REVIEW | Policy submitted for approval, pending review | No effect on decisions |
ENABLED | Policy is active and evaluated | Affects authorization decisions |
DISABLED | Policy exists but is not evaluated | No effect on decisions |
Policy Versioning
Each policy maintains a version identifier (default: 1.0.0). When policies are updated, the version can be incremented to track changes over time. The audit log records:
- Who made the change
- When the change occurred
- What was modified
- Previous and new values
Shared Policies
Policies can be marked as isShared to indicate they apply across multiple resources or tenants. Shared policies:
- Are managed centrally
- Apply to all matching contexts
- Require elevated permissions to modify
Policy Templates
Reusable policy templates allow organizations to define standard patterns:
- Templates store policy structure without tenant-specific values
- New policies can be created from templates
- Templates are versioned independently from policies
Governance Controls
| Control | Purpose |
|---|---|
| Audit Trail | Complete history of policy changes |
| Status Management | Enable/disable without deletion |
| Version Tracking | Track policy evolution |
| Template Governance | Standardize policy patterns |
Diagram
Example Scenario
Scenario
A compliance team requires that all policy changes to financial resource access must be reviewed before taking effect.
Input
- Actor: Policy administrator
- Resource: Financial access policy
- Action: Update policy conditions
- Context: Compliance-controlled environment
Expected Outcome
- Policy is updated in DISABLED status
- Change is logged to audit trail
- Reviewer approves the change
- Policy status changes to ENABLED
- Audit record shows full approval chain
Common Misunderstandings
- Disabling vs deleting — Disabled policies remain in the system for audit purposes; deletion removes them permanently
- Version numbers — Versions are metadata for tracking; they do not affect policy evaluation
Deleting a policy removes it permanently and cannot be undone. Use DISABLED status to temporarily remove a policy from evaluation.
Design Notes / Best Practices
- Use DISABLED status during policy development
- Increment versions for significant changes
- Use templates for organizational standards
- Review audit logs regularly for compliance
- Mark cross-tenant policies as shared
Create a naming convention for policies that includes the purpose and scope (e.g., finance-report-access-managers).
Related Use Cases
- Compliance reporting with policy change history
- Staged rollout of policy changes
- Emergency policy disablement
- Cross-tenant policy standardization