| ID | NAME | DEPT | CATEGORY | PRIORITY | CONDITION | ACTION | VER | STATUS | OPS |
|---|---|---|---|---|---|---|---|---|---|
The TauDIL Policy Engine is a AI governance rule management panel. It allows compliance and security teams to define, version, and enforce deterministic policy rules across multiple business departments without touching application code.
| PAGE | PURPOSE | KEY ACTIONS |
|---|---|---|
| π€ AI Guardrails | Central view of all AI safety rules. Filter by department, search by name/condition/action. | Edit Β· Toggle Β· Delete Β· Version history |
| βοΈ AI Rules | DSL reference guide and quick-add form. Use for rapid AI rule creation without opening the modal. | Quick Add Β· DSL cheatsheet |
| πͺ Orchestration | Per-department coverage overview. Shows rule count, active/inactive split, and full rule list per dept. | Coverage metrics Β· Dept drill-down |
| π Summary | Aggregate rule health β total counts, active/inactive split, breakdown by department and category. | Health bars Β· Category analysis |
| π€ Export | Download policy files in JSON or YAML. Filter by department for targeted exports. | JSON Β· YAML Β· Dept filter Β· Preview |
| π Assessment Rules | Domain-specific UAE governance rules. Define conditions that fire during candidate or vendor assessments. Separate from AI Guardrails β these govern business decisions, not AI sessions. | Create Β· Edit Β· Toggle Β· Domain filter |
Conditions are written in TauDIL's Safe Condition DSL β a whitelist-evaluated expression language.
| SYNTAX | DESCRIPTION | EXAMPLE |
|---|---|---|
| entity IN list | Check entity membership in a named list | entity IN sanctions_list |
| field MATCHES regex(...) | Regex pattern match on input/output | output MATCHES regex(ssn|cc_number) |
| field CONTAINS value | Substring containment check | output CONTAINS internal_ip |
| field == value | Exact equality check | domain == 'finance' |
| field > / < / >= value | Numeric comparison | confidence_score < 0.7 |
| A AND B / A OR B | Logical composition | domain == 'hr' AND score > 0.8 |
| ACTION | EFFECT | USE CASE |
|---|---|---|
| BLOCK:reason | Hard stop β request rejected | Sanctions, prohibited content |
| REDACT:reason | Output masked before delivery | PII, credentials, secrets |
| ESCALATE:reason | Route to human reviewer | High-risk decisions, edge cases |
| MONITOR:reason | Log only β no blocking | Audit trail, drift detection |
| ALLOW:reason | Explicit permit (overrides lower rules) | Whitelisting known-safe patterns |
Every rule edit bumps the version counter and appends a changelog entry with timestamp and author. Click the π icon on any rule to view its full version history. All mutations (CREATE, UPDATE, DELETE, TOGGLE) are recorded in the Aelthered Chronicles hash-chained audit ledger via log_rule_change() β tamper-evident and ED25519-signed.
v2 β Updated condition β author: admin β hash: 9c1bβ¦
v3 β Priority changed 50β90 β author: admin β hash: 7e4dβ¦
{
"rules": [{
"id": 1,
"name": "PII Leak Prevention",
"department": "security",
"condition": "output MATCHES regex(ssn)",
"action": "REDACT:PII detected",
"priority": 90,
"version": 2
}]
}
rules:
- id: 1
name: PII Leak Prevention
department: security
condition: output MATCHES regex(ssn)
action: REDACT:PII detected
priority: 90
version: 2
| METHOD | ENDPOINT | DESCRIPTION |
|---|---|---|
| GET | /api/rules | List all rules (filter: status, department) |
| POST | /api/rules | Create new rule |
| GET | /api/rules/<id> | Get single rule by ID |
| PUT | /api/rules/<id> | Update rule β auto-bumps version |
| DELETE | /api/rules/<id> | Delete rule permanently |
| POST | /api/rules/<id>/toggle | Toggle active/inactive |
| GET | /api/rules/export?format=yaml | Export rules as JSON or YAML |
| GET | /api/rules/summary | Aggregated rule statistics |
| METHOD | ENDPOINT | DESCRIPTION |
|---|---|---|
| GET | /api/assessment-rules/ | List rules (filter: domain_id) |
| POST | /api/assessment-rules/ | Create rule β requires domain_id |
| PUT | /api/assessment-rules/<id> | Update rule |
| DELETE | /api/assessment-rules/<id> | Delete rule |
| GET | /api/escalation/ | List escalations |
| POST | /api/escalation/<id>/decide | Approve or reject β authority enforced |
| GET | /api/escalation/config | Get deadline config per role |
| POST | /api/escalation/config | Update deadline hours per role |
| NAME | DEPT | DIMENSION | SEVERITY | PRIORITY | DELTA | STATUS | OPS |
|---|---|---|---|---|---|---|---|