All
βš–οΈ Legal
πŸ”’ Security
πŸ’° Finance
πŸ“¦ Procurement
πŸ“‹ General
ID NAME DEPT CATEGORY PRIORITY CONDITION ACTION VER STATUS OPS
DSL REFERENCE
entity IN sanctions_list β€” entity check
output MATCHES regex(...) β€” pattern match
domain == 'finance' β€” domain gate
score > 0.8 β€” numeric compare
A AND B / A OR B β€” logical ops
ACTIONS:
BLOCK:reason β€” hard block
REDACT:reason β€” mask output
MONITOR:reason β€” log only
ESCALATE:reason β€” escalate
ALLOW:reason β€” explicit allow
QUICK ADD
NAME
DEPARTMENT
PRIORITY
CONDITION
ACTION
EXPORT OPTIONS
FORMAT
DEPARTMENT FILTER
EXPORT PREVIEW

        
πŸ“‹ OVERVIEW

The TauDIL Policy Engine is a AI governance rule management panel. It allows compliance and security teams to define, version, and enforce deterministic policy rules across multiple business departments without touching application code.

Core Principle
Rules are evaluated deterministically β€” same input always produces same output. No AI guessing.
IFA Alignment
Implements IFA Core Specification v1.0 β€” TauDIL is the reference implementation of the framework.
πŸ—‚ PAGES & FEATURES
PAGEPURPOSEKEY ACTIONS
πŸ€– AI Guardrails Central view of all AI safety rules. Filter by department, search by name/condition/action. Edit Β· Toggle Β· Delete Β· Version history
✏️ AI Rules DSL reference guide and quick-add form. Use for rapid AI rule creation without opening the modal. Quick Add · DSL cheatsheet
πŸͺ„ Orchestration Per-department coverage overview. Shows rule count, active/inactive split, and full rule list per dept. Coverage metrics Β· Dept drill-down
πŸ“Š Summary Aggregate rule health β€” total counts, active/inactive split, breakdown by department and category. Health bars Β· Category analysis
πŸ“€ Export Download policy files in JSON or YAML. Filter by department for targeted exports. JSON Β· YAML Β· Dept filter Β· Preview
πŸ“‹ Assessment Rules Domain-specific UAE governance rules. Define conditions that fire during candidate or vendor assessments. Separate from AI Guardrails β€” these govern business decisions, not AI sessions. Create Β· Edit Β· Toggle Β· Domain filter
πŸ’» DSL CONDITION REFERENCE

Conditions are written in TauDIL's Safe Condition DSL β€” a whitelist-evaluated expression language.

SYNTAXDESCRIPTIONEXAMPLE
entity IN listCheck entity membership in a named listentity IN sanctions_list
field MATCHES regex(...)Regex pattern match on input/outputoutput MATCHES regex(ssn|cc_number)
field CONTAINS valueSubstring containment checkoutput CONTAINS internal_ip
field == valueExact equality checkdomain == 'finance'
field > / < / >= valueNumeric comparisonconfidence_score < 0.7
A AND B / A OR BLogical compositiondomain == 'hr' AND score > 0.8
⚑ ACTION REFERENCE
ACTIONEFFECTUSE CASE
BLOCK:reasonHard stop β€” request rejectedSanctions, prohibited content
REDACT:reasonOutput masked before deliveryPII, credentials, secrets
ESCALATE:reasonRoute to human reviewerHigh-risk decisions, edge cases
MONITOR:reasonLog only β€” no blockingAudit trail, drift detection
ALLOW:reasonExplicit permit (overrides lower rules)Whitelisting known-safe patterns
πŸ“œ VERSIONING & AUDIT

Every rule edit bumps the version counter and appends a changelog entry with timestamp and author. Click the πŸ“œ icon on any rule to view its full version history. All mutations (CREATE, UPDATE, DELETE, TOGGLE) are recorded in the Aelthered Chronicles hash-chained audit ledger via log_rule_change() β€” tamper-evident and ED25519-signed.

v1 β†’ Created β†’ author: system β†’ hash: 3f2a…
v2 β†’ Updated condition β†’ author: admin β†’ hash: 9c1b…
v3 β†’ Priority changed 50β†’90 β†’ author: admin β†’ hash: 7e4d…
πŸ“€ EXPORT FORMATS
JSON
{
  "rules": [{
    "id": 1,
    "name": "PII Leak Prevention",
    "department": "security",
    "condition": "output MATCHES regex(ssn)",
    "action": "REDACT:PII detected",
    "priority": 90,
    "version": 2
  }]
}
YAML
rules:
  - id: 1
    name: PII Leak Prevention
    department: security
    condition: output MATCHES regex(ssn)
    action: REDACT:PII detected
    priority: 90
    version: 2
πŸ”Œ API ENDPOINTS
METHODENDPOINTDESCRIPTION
GET/api/rulesList all rules (filter: status, department)
POST/api/rulesCreate new rule
GET/api/rules/<id>Get single rule by ID
PUT/api/rules/<id>Update rule β€” auto-bumps version
DELETE/api/rules/<id>Delete rule permanently
POST/api/rules/<id>/toggleToggle active/inactive
GET/api/rules/export?format=yamlExport rules as JSON or YAML
GET/api/rules/summaryAggregated rule statistics
Assessment Rules API
METHODENDPOINTDESCRIPTION
GET/api/assessment-rules/List rules (filter: domain_id)
POST/api/assessment-rules/Create rule β€” requires domain_id
PUT/api/assessment-rules/<id>Update rule
DELETE/api/assessment-rules/<id>Delete rule
GET/api/escalation/List escalations
POST/api/escalation/<id>/decideApprove or reject β€” authority enforced
GET/api/escalation/configGet deadline config per role
POST/api/escalation/configUpdate deadline hours per role
NAME DEPT DIMENSION SEVERITY PRIORITY DELTA STATUS OPS