Policy Library
**Kest** provides a library of battle-tested security policies that implement foundational security models. These are designed to be used as primitive building
Kest provides a library of battle-tested security policies that implement foundational security models. These are designed to be used as primitive building blocks for Zero-Trust architectures and decentralized authorization.
๐ The Multi-Engine Approach
Every policy in this library is implemented with semantic parity in both Rego and Cedar.
- Rego (OPA): Ideal for Kubernetes Admission, Envoy/Istio sidecars, and standard OPA deployments.
- Cedar: Optimized for performance and readability, compatible with Cedar Agent and AWS Verified Permissions.
This dual-language support ensures your security posture remains identical across polyglot infrastructures, from the edge to the cloud.
๐ ๏ธ Quick Integration
To evaluate these policies, initialize a PolicyEngine with the desired modules:
from kest.core.engine import RegoLocalEngine
from kest.core.policies import get_policy
# 1. Load Bell-LaPadula model
modules = {"blp": get_policy("bell_lapadula")}
# 2. Use the engine of your choice
engine = RegoLocalEngine(modules=modules)[!TIP] See the Core Engine Reference for detailed configuration and evaluation documentation.
๐๏ธ Foundational Security Models
The library includes the following standard security models, ready for production use:
๐ Confidentiality & Integrity
- Bell-LaPadula (MLS): The gold standard for multi-level confidentiality. Prevents unauthorized disclosure via "no read up, no write down".
- Biba Integrity Model: The integrity-focused counterpart to BLP. Prevents data corruption by untrusted subjects ("no read down, no write up").
๐๏ธ Operational Trust
- Clark-Wilson: A commercial integrity model focused on well-formed transactions and separation of duties.
- Brewer-Nash (Chinese Wall): A dynamic model to mitigate commercial conflicts of interest by tracking historical access patterns.
๐ก๏ธ Privacy & Isolation
- Goguen-Meseguer: A formal non-interference model ensuring strict domain isolation and deterministic privacy.