Kest LogoKest
Get Started

Pre-built Cedar Policies

High-performance authorization policies implemented in Cedar.

Kest provides modern authorization policies implemented in Cedar for use with Cedar Agent or AWS Verified Permissions.

Brewer-Nash (Chinese Wall)

Location: kest/core/policies/advanced/brewer_nash.cedar

Dynamically prevents conflicts of interest by restricting subjects from accessing information in competing datasets if they have already accessed data in a conflicting one.

Biba (Integrity)

Location: kest/core/policies/advanced/biba.cedar

The Cedar implementation of the Biba integrity model.

Financial Core

Location: kest/core/policies/financial.cedar

Implements transaction limits and trust-based authorization for financial workloads.

Security Core

Location: kest/core/policies/security.cedar

Provides basic workload identity verification and MERKLE link validation.