One policy change, applied everywhere it should be.
PortEden's AI policy groups bundle access control, redaction, and audit policies into named groups with org → team → user inheritance and per-AI-client overrides. Define the parent once. Override the exceptions narrowly. Stop making the same change in 47 places — and stop missing one.
Free tier · No credit card · Works with any AI client
Without policy groups, every change has to be made everywhere.
Policy without inheritance scales linearly with the number of teams times the number of integrations times the number of AI clients. The matrix gets too big to read, then too big to change reliably, then too big to audit. The fix isn't more policy — it's structure.
Same change in 47 places
When legal updates the privileged-tag rule, you have to update it on every team's policy, every integration, every AI client. Most orgs miss one — and the miss is the audit finding.
No place to express "Engineering is like Sales but stricter"
Without inheritance, every group is hand-authored from zero. Engineering's bundle and Sales' bundle drift apart over time, and the org-wide rules quietly stop being org-wide.
An AI client needs different rules than another
Cursor needs repo write access; Claude desktop doesn't. Without per-client overrides, you choose between too loose (give every AI write access) and too tight (block AI writes entirely).
Author the parent. Override the exceptions.
A simple, three-level group hierarchy. Teal pills are inherited policies. Purple pills are overrides. The total policy count drops 5–10x compared to authoring each group from zero.
Six dimensions, composed however you need.
Groups can be authored along any dimension that matters to your business. Mix and match — a user can be in a team group, a role group, and a sensitivity group at the same time, with explicit precedence resolving any conflicts.
Team groups
By team — straight from your IdP.
Engineering, Sales, Legal, HR, Finance — auto-synced from Okta, Entra ID, or Google Workspace.
- Engineering — full repo and ticket access
- Sales — CRM, customer drives, pipeline data
- Legal — privileged tags, all-matter visibility
- HR — personnel records with PII redaction
- Finance — ledger and ERP, write-blocked for AI
- Marketing — campaign data and analytics
- IdP-driven membership (auto-add and auto-remove)
Role groups
By role — across team boundaries.
Manager vs IC, contractor vs employee, on-call vs off-call.
- Manager — broader visibility into team data
- Individual contributor — own work, scoped peers
- Contractor — explicit allow-list, time-bounded
- Employee — default org policy
- On-call — production-data access for the rotation
- Auditor / read-only — visibility without action
- Break-glass role — approval-required overrides
Project groups
By project — for matter, client, or deal scope.
Per-matter for legal, per-client for agencies, per-deal for M&A or banking teams.
- Per-matter (legal) — only attorneys on the matter
- Per-client (agency) — isolation between client work
- Per-deal (banking) — sell-side vs buy-side walls
- Per-product (engineering) — repo and ticket scope
- Per-campaign (marketing) — analytics and assets
- Time-bounded (project ends, access ends)
- Cross-team membership without cross-team leak
Environment groups
By environment — separating real data from training data.
Production data vs sandbox vs training corpus vs synthetic test fixtures.
- Production — real customer data, strictest policy
- Staging — production-shaped, redacted defaults
- Sandbox — synthetic-only, broad action limits
- Training corpus — explicit consent gates
- Demo — fully synthetic, public-safe
- Per-region environments (EU vs US data)
- Approval-gated promotion between environments
AI-client groups
By AI tool — different clients, different rules.
Claude desktop vs ChatGPT vs Cursor vs Copilot vs an MCP server identity.
- Claude desktop — read-broad, write-narrow
- ChatGPT — drafts only, never send-on-behalf
- Cursor — repo writes allowed, prod-data denied
- GitHub Copilot — code context, no customer data
- Microsoft 365 Copilot — Office scope, time-bounded
- Custom MCP servers — per-server identity policies
- New AI clients fall to a default-deny policy
Sensitivity groups
By data class — public to regulated.
Public, internal, confidential, regulated — by label, not by location.
- Public — broadest AI access
- Internal — employees only, AI allowed
- Confidential — approval-required for AI access
- Regulated (PHI, PCI, NPI) — hard policy floor
- Privileged (legal) — work-product protection
- Label-based scoping (Microsoft Information Protection, Google labels)
- Override-resistant on regulated data classes
Define. Attach. Inherit. Override.
1. Define
Create a group along any dimension that matters: by team (Engineering, Sales, Legal), by AI client (Cursor, Claude desktop, MCP server), by environment (production, sandbox), by project, or by sensitivity tier.
2. Attach
Attach access-control policies, redaction profiles, and audit settings to the group. One bundle, all three policy types — versioned and deployed together as a single unit.
3. Inherit
Set a parent. The child inherits the parent's full bundle automatically. Author the parent once and let every child group pick up future improvements without manual propagation.
4. Override
Override individual policies at the child level — without rewriting the whole bundle. Per-AI-client and per-environment overrides apply on top of the inheritance chain.
A real request, resolved through every level.
An SRE on Cursor opens a Drive file. Here's how PortEden resolves the policy bundle by walking up the inheritance chain — and what each level contributed to the final decision.
Cursor reads the file with free/busy on calendar, PII redaction, and repo writes allowed. Production-data access fired an approval requirement from the SRE override. Claude desktop on the same user would have been denied repo writes by the per-AI-client override.
Resolution path: Organization Default → Engineering → SRE → per-AI-client override (Cursor). Every contributing policy is recorded with the version that was live at request time, so the same trace can be replayed from the audit log.
Six everyday changes, one structural difference.
Real citations, mapped to real groups.
Every clause your auditor cares about maps to a concrete policy-group lifecycle event — authoring, deployment, review, or removal — with exportable evidence.
Every integration the AI tries to reach into.
One inheritance model, six regulated industries.
Inheritance is the unit of authoring.
Most policy systems author at the leaf — every team, every integration, every AI client gets its own bundle. PortEden flips it: you author the parent, override the exceptions, and the leaves resolve themselves. Three structural choices make that model durable at scale.
Inheritance is the unit of authoring
You don't author leaves; you author the parent and override the exceptions. Total policy count drops 5–10x compared to per-leaf authoring, and one change at the top propagates instantly.
Versioned together, deployed together
A policy group is one versioned bundle of access, redaction, and audit policies. Deploying changes the whole bundle atomically with audit — no half-deployed state, no straggling rules.
Per-AI-client overrides without explosion
One override on the AI-client dimension covers every team that uses it. No per-team-per-client matrix to maintain — adding a new AI client requires zero changes to existing groups.
Pairs well with
Policy group questions
What is an AI policy group?
How does inheritance work in practice?
Can a group inherit from multiple parents?
How do I see what a child group resolves to?
What happens when policies conflict?
Can I version a policy group in Git?
How are policy-group changes audited?
Does this work for redaction policies too — not just access?
How are per-AI-client overrides expressed?
Can I copy a group as a starting point for a new one?
How do I delete a group safely?
What pricing tier includes policy groups?
Ready to author policy at the parent and override the exceptions?
Set up your first policy group hierarchy in under 15 minutes. Enterprise adds dimensional overrides, Git versioning, and change-control workflows.