Policies
Policies define automated rules that evaluate SBOMs against security, compliance, and quality standards. When an SBOM is uploaded and policy evaluation is enabled, the platform checks each policy rule and reports violations — enabling organizations to enforce standards across products, environments, and CI/CD pipelines.
Overview
A Policy consists of one or more rules, each with a subject (what to evaluate), an operator (how to compare), and a value (the threshold or target). Policies can be scoped to specific Products and Environments, and their results can be surfaced as PR comments, notifications, and ticket creation.
Policies serve three primary purposes:
Gate enforcement — block releases that fail security thresholds (e.g., no critical vulnerabilities in production).
Compliance monitoring — track adherence to regulatory standards (e.g., SBOM quality score above 80%).
Risk alerting — notify teams when risk indicators exceed thresholds (e.g., EPSS score above 0.5).
Architecture
Policy Engine
├── Policy
│ ├── Rule 1: Subject + Operator + Value
│ ├── Rule 2: Subject + Operator + Value
│ └── Rule N: ...
│
├── Evaluation Trigger
│ ├── Automatic: on SBOM upload (when enabled in Settings)
│ └── Manual: on-demand scan
│
└── Results
├── Pass / Fail per rule
├── Violation details (component, vulnerability, value)
├── PR comments (when enabled)
├── Notifications (Slack, Teams, Email)
└── Ticket creation (Jira, Linear)Interactions:
Environment Settings — policies are evaluated per Environment when enabled.
Automation Rules — automation executes before policy evaluation, so automation fixes may resolve potential violations.
Notifications — policy failures trigger notifications based on configured integrations.
CI/CD — policy results can be posted as PR comments and used to fail builds.
Creating Policies
Via Dashboard
Navigate to the Policies page in the main navigation.
Click + Create Policy.
Enter a Policy Name — use a descriptive name that communicates the policy's purpose (e.g.,
Production Vulnerability Gate,SBOM Quality Minimum).Add one or more Rules (see Rule Configuration below).
Click Save.
Policy Scope
Policies can be applied at two levels:
Organization-wide
Policy is evaluated for all Products and Environments
Product-specific
Policy is applied only to selected Products
To assign a policy to specific Products:
Navigate to the Product's Environment page.
Click the Settings tab.
Under Policies, select the policies to apply.
Alternatively, from the Policy detail page, assign the policy to specific Product Environments.
Rule Configuration
Each rule defines a condition that is evaluated against SBOM data.
Rule Structure
Subject
The data attribute to evaluate (e.g., vulnerability severity, license type, component age)
Operator
The comparison type (e.g., IS, IS_NOT, LESS_THAN, MORE_THAN, EXISTS)
Value
The threshold or target value
Subject Categories
Vulnerability Subjects
Vulnerability Severity
CVSS severity level
IS, IS_NOT
CVSS Score
Numeric CVSS base score
LESS_THAN, MORE_THAN, RANGE
EPSS Score
Exploit prediction probability
LESS_THAN, MORE_THAN, RANGE
KEV Status
Whether in CISA KEV catalog
IS, IS_NOT
VEX Status
Vulnerability disposition
IS, IS_NOT
Vulnerability Count
Number of vulnerabilities by severity
LESS_THAN, MORE_THAN
Component Subjects
Component Name
Specific component name
IS, IS_NOT, EXISTS
Component Version
Component version string
IS, IS_NOT
Component License
License expression
IS, IS_NOT, EXISTS
Component Type
Component kind (library, framework, etc.)
IS, IS_NOT
Health Score
Component health score (0–100)
LESS_THAN, MORE_THAN, RANGE
Support Level
Component maintenance status
IS, IS_NOT
SBOM Subjects
SBOM Quality Score
Compliance quality score
LESS_THAN, MORE_THAN
Supplier
SBOM supplier field
EXISTS, NOT_EXISTS
Data License
SBOM data license field
IS, IS_NOT, EXISTS
Custom Field Subjects
Custom Text Field
User-defined text field
IS, IS_NOT, EXISTS, NOT_EXISTS
Custom Range Field
User-defined numeric field
LESS_THAN, MORE_THAN, RANGE
For custom field configuration, see Vulnerability Custom Fields.
Example Rules
Block critical vulnerabilities
Vulnerability Severity
IS
Critical
Require minimum quality score
SBOM Quality Score
MORE_THAN
80
Flag KEV-listed vulnerabilities
KEV Status
IS
True
Block high-EPSS vulnerabilities
EPSS Score
MORE_THAN
0.5
Require supplier information
Supplier
EXISTS
—
Flag abandoned components
Support Level
IS
Abandoned
Minimum health score
Health Score
LESS_THAN
30
Applying Policies
Automatic Evaluation
Policies are evaluated automatically on SBOM upload when the relevant settings are enabled:
Navigate to the Product's Environment Settings tab.
Ensure Run SBOM Checks is enabled (prerequisite for policy evaluation).
Assign policies to the Environment.
The policy evaluation runs as part of the SBOM processing pipeline, after automation rules and vulnerability scanning.
Manual Evaluation
To run policy evaluation on demand:
Navigate to the Product and select a Version.
Click ... (Actions) on the Version.
Select Run Policy Scan.
CI/CD Integration
Policy results can be integrated into CI/CD workflows:
Fail-the-build pattern:
The pylynk status command returns the policy evaluation status. In CI/CD pipelines, check the exit code to determine whether to proceed or fail the build.
PR comments:
When Enable PR Comments is turned on in Environment Settings, policy results are automatically posted as comments on pull requests via the configured source control integration (GitHub, GitLab, Bitbucket).
Reviewing Policy Results
Version-Level Results
Navigate to the Product and select a Version.
Click the Policy tab.
The results display:
Policy Name
Name of the evaluated policy
Status
Pass or Fail
Violations
Number of rule violations
Details
Expandable list of specific violations with affected components/vulnerabilities
Policy Detail View
Navigate to the Policies page.
Click on a policy to view its detail page.
The detail page shows:
Policy rules and their configuration.
Evaluation history across Products and Environments.
Aggregated violation counts.
Managing Policies
Editing Policies
Navigate to the Policies page.
Click on the policy to edit.
Modify rules, add new rules, or remove existing ones.
Click Save.
Disabling Policies
Policies can be disabled without deletion:
Navigate to the Product's Environment Settings tab.
Remove the policy from the Environment's policy list.
Deleting Policies
Navigate to the Policies page.
Click ... (Actions) on the policy row.
Select Delete.
Confirm the deletion.
Deleting a policy removes all historical evaluation results for that policy. Disable policies instead of deleting them if you need to retain evaluation history.
Notification and Ticketing on Violations
Notifications
Policy failures can trigger notifications through configured integrations:
Slack — violation summary posted to configured channels.
Microsoft Teams — violation summary posted to configured channels.
Email — violation details sent to subscribed users.
Subscribe to policy notifications on the Product Environment page by clicking the Bell icon and selecting Policies.
Automatic Ticket Creation
When ticketing integrations are configured (Jira, Linear), policy violations can automatically create tickets for remediation tracking. This links the violation to a trackable work item.
For integration setup, see Administration: Integrations.
Permission Matrix
View policies
✓
✓
✓
Edit policies
✓
✓
—
Run policy scans
✓
✓
—
Delete policies
✓
✓
—
Edit product policies
✓
✓
—
For full permission details, see Role Management.
Security Warnings
Deleting a policy removes all historical results. Evaluation history is permanently lost. Disable policies by removing them from Environments instead of deleting them if you need to preserve history.
Overly permissive policies create a false sense of security. Regularly review policy rules to ensure thresholds match your organization's risk tolerance. A policy that allows critical vulnerabilities in production defeats its purpose.
Policy evaluation requires vulnerability scanning. If "Run Vulnerability Scan" is disabled, vulnerability-related policy rules will not have data to evaluate against and may produce incomplete results.
Common Misconfigurations
No policies created
No policy results on any Version
Create policies on the Policies page and assign them to Product Environments
Policy not assigned to Environment
Policy exists but never evaluates
Assign the policy to the target Environment in Product Settings
Vulnerability scanning disabled
Vulnerability-related rules produce no violations
Enable "Run Vulnerability Scan" in Environment Settings
SBOM checks disabled
Quality score rules cannot evaluate
Enable "Run SBOM Checks" in Environment Settings
Policy too broad
Excessive violations overwhelm the team
Narrow rules — use specific severity levels, EPSS thresholds, or KEV-only targeting
Policy too narrow
Critical issues not caught
Review rules to ensure they cover your minimum security requirements
PR comments not posting
Policy results not visible on pull requests
Enable "Enable PR Comments" in Environment Settings and verify source control integration
Policy results stale
Results do not reflect current SBOM state
Run a manual policy scan or re-upload the SBOM
Recommended Best Practices
Start with a minimal production gate. Create a policy that fails on critical vulnerabilities and KEV-listed issues. Expand coverage over time.
Differentiate policies by Environment. Production should have stricter policies than development. Use separate policies or environment-specific assignments.
Combine CVSS with EPSS for prioritization. A rule that triggers on
CVSS > 7.0 AND EPSS > 0.1catches high-severity, likely-exploited vulnerabilities while reducing noise.Use policies to enforce SBOM quality. Add rules for minimum quality scores, required supplier information, and data license compliance.
Enable PR comments in CI/CD Environments. This gives developers immediate feedback on policy violations before merge.
Review policies quarterly. As your security posture matures, tighten thresholds and add new rule categories.
Name policies descriptively. Use names like
Production Critical GateorFDA Compliance Minimumrather thanPolicy 1.Avoid creating too many policies. Consolidate related rules into a single policy to simplify management and reduce evaluation overhead.
Use Custom Fields in policy rules to enforce organization-specific risk thresholds (e.g., fail if custom risk score > 80).
Document policy rationale. Maintain internal documentation of why each policy exists and what risk it mitigates.
Last updated