Skip to Content
How-To GuidesSet Up Governance Policies

Set Up Governance Policies

This guide walks you through creating and deploying a governance policy that automatically responds to sensitive data findings.

Time required: 10 minutes

Prerequisites:

  • Editor or Admin role in the Customer Dashboard
  • At least one completed scan with findings

Step 1: Navigate to Governance

  1. In the Customer Dashboard, navigate to Governance > Policies in the sidebar.
  2. Click Create Policy.
  3. Select YAML Editor.

Step 2: Write the Policy YAML

Here is an example policy that alerts on high-confidence SSN findings and tokenizes credit card numbers:

apiVersion: slim.io/v1 kind: Policy metadata: name: protect-financial-pii description: "Tokenize credit cards, alert on SSNs in production data" tags: - pci-dss - production spec: mode: dry-run scope: connectors: [] # empty = all connectors file_types: - csv - json - parquet - xlsx conditions: - category: Credit Card min_confidence: 0.75 # tune for your environment, see Settings > Detection - category: SSN min_confidence: 0.75 # tune for your environment, see Settings > Detection actions: - type: tokenize config: algorithm: aes-256 key_scope: tenant - type: alert config: channels: - slack://security-alerts severity: high

Always start with mode: dry-run. This evaluates the policy against existing findings and logs what would happen, without actually executing any actions.

Step 3: Validate

  1. Click Validate in the editor.
  2. Slim.io verifies:
    • YAML syntax and schema compliance
    • Referenced connectors exist (if specified)
    • Action configurations are valid
    • No conflicting policies
  3. Resolve any errors before deploying.

Step 4: Deploy in Dry-Run Mode

  1. Click Deploy.
  2. The policy activates in dry-run mode.
  3. Navigate to Governance > Policies to see the policy in the active list.
  4. The policy will evaluate against all future scan findings and log matches.

Step 5: Review Dry-Run Results

After the next scan completes (or manually trigger a reconciliation):

  1. Navigate to the policy detail page.
  2. Review Matched Findings — the findings that would trigger this policy.
  3. Check that the matches are correct:
    • Are the right categories being matched?
    • Are false positives being included? (Adjust min_confidence if so.)
    • Is the scope correct? (Are findings from expected connectors appearing?)

Step 6: Switch to Enforced Mode

Once you are satisfied with the dry-run results:

  1. Edit the policy YAML.
  2. Change mode: dry-run to mode: enforced.
  3. Click Deploy to update.

The policy now executes actions (tokenize, alert) on all matching findings from this point forward.

Step 7: Monitor

  1. Navigate to Governance > Policies to see the policy status.
  2. Check Last Triggered to see when the policy last executed.
  3. Review the Audit Log for detailed execution records.
  4. Monitor Slack (or configured channels) for incoming alerts.

Policy Patterns

Alert-Only Policy

spec: mode: enforced conditions: - category: PHI min_confidence: 0.75 # tune for your environment, see Settings > Detection actions: - type: alert config: channels: - email://compliance@company.com severity: medium

Quarantine Public Data

spec: mode: enforced conditions: - risk_score_min: 75 actions: - type: quarantine - type: alert config: channels: - slack://security-critical severity: critical

Tag for Review

spec: mode: enforced conditions: - category: API Key min_confidence: 0.75 # tune for your environment, see Settings > Detection actions: - type: tag config: tags: ["needs-review", "api-credential"] - type: alert config: channels: - slack://dev-ops severity: medium

Next Steps

Last updated on