Policy Gates evaluate governed AI events against organization-defined policy conditions. Each gate produces an explicit outcome: Approve, Deny, Escalate, or Inspect. The result is stored as a tamper-evident receipt so the organization can prove what decision was made, why it was made, and which policy version was active at the time.
The event satisfies the required policy conditions. Action proceeds automatically.
The event violates policy and is blocked. No further action permitted.
The event requires human review or higher authority before proceeding.
The event is allowed to continue but flagged for additional review or monitoring.
Policies are defined as JSON documents that specify conditions, thresholds, and failure actions.
Requires validation, approval, and lineage before model deployment
{
"policy_id": "credit-model-deployment-policy",
"policy_version": "1.0.0",
"gate": "model_deployment_gate",
"description": "Require validation, approval, and lineage before deployment",
"conditions": [
{
"field": "validation.accuracy",
"operator": ">=",
"value": 0.92,
"on_fail": "deny",
"reason_code": "ACCURACY_BELOW_THRESHOLD"
},
{
"field": "validation.bias_review_completed",
"operator": "==",
"value": true,
"on_fail": "escalate",
"reason_code": "BIAS_REVIEW_REQUIRED"
},
{
"field": "lineage.dataset_hash_present",
"operator": "==",
"value": true,
"on_fail": "deny",
"reason_code": "MISSING_DATASET_LINEAGE"
}
],
"default_outcome": "deny"
}When an event is evaluated, AGEI produces a structured outcome with policy context, reason codes, and timestamp.
Model deployment request escalated for bias review
{
"event_type": "model_deployment_requested",
"model_id": "credit-risk-v3",
"policy_id": "credit-model-deployment-policy",
"gate": "model_deployment_gate",
"outcome": "escalate",
"reason_code": "BIAS_REVIEW_REQUIRED",
"policy_version": "1.0.0",
"evaluated_at": "2026-05-04T15:20:00Z",
"receipt_id": "rcpt_gate_001",
"content_hash": "sha256:a3f2e1..."
}1. AI Lifecycle Event
Model deployment, agent action, or governed workflow triggers gate evaluation
2. Metadata Collected
Event payload, identifiers, and context gathered for policy evaluation
3. Policy Gate Evaluates Conditions
Each condition in the policy is checked against event data
4. Outcome Determined
Approve / Deny / Escalate / Inspect based on condition results
5. Receipt Written to Evidence Vault
Tamper-evident record of the decision with policy version, reason codes, and hash
Policy gates are not dashboards. They are control points that block, escalate, or flag governed events based on organizational rules.
Every gate evaluation creates a tamper-evident receipt showing the policy version, evaluation timestamp, and reason for the outcome.
Gates reference immutable policy versions. Organizations can prove which policy was active when a decision was made.
Policy gates evaluate technical conditions. Human reviewers make governance decisions. Evidence receipts capture both.
Read the technical documentation or explore a working example.