Overview
Policies in Cascade define the rules that govern acceptable agent behavior. A policy is a declarative object that is evaluated against agent traces captured at runtime. Policies do not execute code and do not directly enforce behavior. Instead, they produce structured evaluations that enforcement modes act upon. Cascade supports multiple policy types, each designed to address a different class of agent behavior. Policies are defined as structured configuration files (for example JSON) and can be reused across agents and workflows. At runtime, traces emitted by the agent are compared against the active policies to determine whether behavior remains in compliance.Policy Structure
All policies share a common top-level structure.name: Unique policy identifiertype: Policy typedescription: Human-readable descriptionseverity: Impact level if violatedrules: Type-specific configuration
Policy Types
Cascade currently supports the following policy types.Tool Policies
Tool policies define which tools an agent is allowed or disallowed to use, including indirect usage through other agents or third-party systems. Tool policies are evaluated whenever a tool is invoked. If a section is left empty, it is treated as unrestricted by default.- If
allowed_toolsis specified, only those tools may be used - If
disallowed_toolsis specified, those tools are always blocked - If both are empty, no tool restrictions are applied
Categorization Policies
Categorization policies classify agent outputs into semantic categories and mark certain categories as out of policy. These policies are evaluated on LLM outputs and final agent responses.- Agent outputs are categorized at runtime
- If an output is assigned to a disallowed category, the policy is violated
- Categories are used as structured signals across safety and security systems
Semantic Policies
Semantic policies define behavioral constraints using natural language. These policies are evaluated using semantic reasoning over agent traces and outputs.- Natural language rules define unacceptable behavior
- Semantic evaluation considers intent and context
- Optional pattern exclusion provides deterministic safeguards for sensitive data
Severity Levels
Each policy includes a severity level that indicates the impact of a violation.- Enforcement modes
- Alerting systems
- Risk aggregation and reporting
Policy Integration
Policies are stored as standalone files and referenced during agent initialization or execution. This allows policies to be updated without modifying agent code.Referencing Policies at Initialization
Referencing Policies per Workflow
Policy Validation
Before using a policy in production, Cascade provides a validation utility to ensure the policy format is correct. This helps catch configuration errors early and prevents runtime failures.- Schema correctness
- Required fields
- Supported policy types
- Valid severity values
Templates and Examples
Cascade provides a set of ready-to-use policy templates for common use cases. Examples include:- Restricting tool access for production agents
- Preventing harmful or unsafe outputs
- Blocking sensitive data exposure
- Enforcing scope boundaries for autonomous agents
Next Steps
After defining policies:- Validate policy files
- Attach policies to agents or workflows
- Start in Observe mode to understand behavior
- Progress to Detect or Enforce as confidence increases