Aurva

Creating a Custom Policy

Define custom guardrail and detection policies for DAM and data security.

Policies list on uat.aurva.io

Overview

Aurva ships with a comprehensive library of built-in policies for database activity monitoring and data security. However, every organization has unique security requirements. The Create New Policy workflow lets you define custom policies tailored to your environment — from blocking risky queries and masking sensitive data in query results to setting up detection alerts for suspicious activity.

Policy creation follows a guided 3-step process: selecting a policy type, configuring the policy rules, and previewing before activation. This guide walks you through each step.

Understanding Policy Types

Aurva organizes policies into two categories based on how they respond to database activity:

Guardrail Policies (Prevention)

Guardrail policies actively intervene in database operations. They sit in the data path and can block or modify query results in real time. These require DAM and Prevention mode to be enabled (via proxy-based enforcement).

1. Block Risk Queries

Prevents queries from executing on your databases. Use this to stop dangerous operations before they can cause damage.

Common Use Cases:

  • Block DDL commands (DROP, ALTER, TRUNCATE)

  • Prevent DELETE/UPDATE without WHERE clause

  • Stop queries during maintenance windows

  • Block access from unauthorized users/IPs

2. Mask Sensitive Data in Query

Allows queries to execute but masks sensitive data in results. Users get the data they need without seeing raw sensitive information.

Common Use Cases:

  • Redact PII (SSN, email, phone)

  • Mask payment card numbers

  • Protect health information (PHI)

  • Hide customer identifiers

Detection Policies (Monitoring)

3. Detect & Alert

Monitors database activity and sends notifications when suspicious patterns or policy violations occur. Queries are logged but not blocked.

Common Use Cases:

  • Alert on configuration changes

  • Notify on unusual access patterns

  • Track sensitive data exposure

  • Monitor privileged user activity

Prerequisites

  • You have an active Aurva account with Admin or Policy Manager role.

  • At least one data asset is onboarded and associated with a controller.

  • For Guardrail policies: DAM must be enabled and the controller must be running in Prevention mode with proxy-based enforcement active.

  • For Detection policies: DAM must be enabled. Prevention mode is not required.

Important — If proxy-based enforcement is not enabled, Guardrail policy types will appear greyed out with a “Proxy Not Enabled” label. Contact Aurva to set up proxy before these policy types become available.

To access the policy creation flow, navigate to:

SettingsPoliciesCreate New Policy

Step-by-Step Instructions

Step 1: Open the Policies Page

From the left sidebar, go to Settings and select Policies. This opens the Policies list view, which displays all existing policies — both system-provided and custom. Each policy shows its name, category (DAM or Data Flow), severity level, alert routing configuration, and current status (enabled/disabled).

Click the + Create New Policy button in the top-right corner to begin.

Policies list view with Create New Policy button

Figure 1: Policies list view with Create New Policy button

Step 2: Select a Policy Type

The Create Policy workflow opens with a 3-step guided process. The progress indicator at the top shows: Policy Type → Configure Policy → Preview.

Choose the type of policy you want to create:

Policy TypeCategoryRequires Proxy
Block Risk QueriesGuardrail (Prevention)Yes
Mask Sensitive DataGuardrail (Prevention)Yes
Detect & AlertDetection (Monitoring)No

Selecting a type reveals a description panel on the right with details and common use cases. Click Continue to proceed.

Policy Type selection — Block Risk Queries selected with description panel

Figure 2: Policy Type selection — Block Risk Queries selected with description panel

What if Proxy is Not Enabled?

If proxy-based enforcement is not configured, the two Guardrail types will be greyed out with a “Proxy Not Enabled” badge. The right panel shows a Contact Aurva for Proxy Setup button. Continue button is disabled for Guardrail types, but you can still proceed with Detect & Alert.

Guardrail policies greyed out when proxy is not enabled

Figure 3: Guardrail policies greyed out when proxy is not enabled

Step 3: Configure the Policy

This is the most detailed step. You define the rules, schedule, alert routing, and metadata for your policy. The configuration screen is divided into several sections. The walkthrough below uses a Block Risk Queries policy as the reference example.

A. Add Conditions

Conditions define when the policy should trigger. You build conditions using a visual condition builder (with Builder and Visualize modes). Conditions are composed of condition groups connected by logical operators (AND/OR).

First, select a Policy Type from the dropdown (e.g., DSPM). Then build conditions using the available types:

Condition TypeDescription
By Actor/SourceMatch based on who is executing the query — filter by user type, tags, roles, or specific identities.
By Query ConditionsMatch based on what the query does — filter by query scope/type (e.g., DML, DDL, DCL).
On DataMatch based on which data is being accessed — filter by data asset name, sensitivity level, or specific tables/columns.

Use + Add Condition to add rules within a group, and + Add Condition Group to create new groups. Groups can be connected with AND or OR logic to build complex, layered rules. Click Save to confirm each condition group.

B. Policy Schedule

Choose when the policy should be evaluated:

Schedule OptionBehavior
Always ActiveEvaluated continuously until you manually disable it.
Ends On…Evaluated until a specified end date and time, then automatically disabled.
Recurring ScheduleEvaluated on a repeating schedule — e.g., weekdays only, specific time windows, weekends only.

C. Test Your Conditions

Before deploying, test the policy’s impact using the Test Policy button. This performs an impact analysis against the last 24 hours of query data and shows:

  • How many queries would have been affected (e.g., “100 of 10,847 queries would have been blocked”).

  • The match rate as a percentage.

  • A qualitative assessment of whether the policy is well-targeted or too broad.

Click View Queries to review matched queries, and Refresh Results to re-run after adjusting conditions.

Tip — Use the Test Policy feature before every deployment. A match rate above 10–15% typically indicates the policy may be too broad and could disrupt normal operations. Review matched queries to confirm they align with your intent.

D. Alert Routing (Optional)

Enable Generate alerts on policy violations to activate notifications.

Policy Severity: Set the severity level (High, Medium, or Low) to prioritize alerts.

Alert Routing Through: Route alerts to integrated channels:

IntegrationDetails
JiraCreate tickets automatically in your Jira project when the policy triggers.
SlackSend notifications to one or more Slack channels. Select channels and sync with Aurva.

E. Remediation (Optional)

Add remediation steps for responders when this policy triggers. This field supports free-text instructions. You can also use the Ask AI feature to generate remediation suggestions automatically.

F. Basic Details

Provide identifying information for the policy:

FieldDescription
Policy NameA descriptive name. Use Ask AI to generate a suggested name.
DescriptionOptional explanation of what the policy detects and why it matters. Ask AI available here too.
CategorySelect a Compliance Framework and Control Code for reporting purposes.

Once all sections are configured, click Continue to proceed to Preview.

Configure Policy screen — conditions, schedule, test results, alert routing, and basic details

Figure 4: Configure Policy screen — conditions, schedule, test results, alert routing, and basic details

Configuration Variations by Policy Type

While the overall structure of the Configure step is consistent, there are key differences depending on which policy type you selected:

Mask Sensitive Data in Query

This policy type includes an additional configuration section: Columns to Redact. Here you specify exactly which database columns should have their values masked in query results. Define target columns so that sensitive fields (e.g., SSN, credit card numbers, email addresses) are automatically redacted while other columns return normally.

Note — The Columns to Redact section is unique to the Mask Sensitive Data policy type and does not appear for Block Risk Queries or Detect & Alert.

Detect & Alert

For Detect & Alert policies, configuration begins with an additional initial selection: Policy Type. Choose the monitoring domain before building conditions:

Policy TypeMonitors
DSPMData security posture — asset classification, sensitivity levels, access permissions, and configuration risks.
DAMDatabase activity — query patterns, user sessions, privilege usage, and operational events.
Data Flow MonitoringData movement — egress patterns, cross-environment transfers, and data pipeline activity.
Data PrivacyPrivacy compliance — PII access, consent management, data subject requests, and regulatory adherence.

The condition builder dynamically adapts based on your selection — each policy type surfaces different condition types, operators, and value options relevant to that monitoring domain.

Tip — If you’re unsure which Detect & Alert policy type to choose, start with DAM for monitoring query-level activity, or DSPM for monitoring security posture and data classification risks.

Step 4: Preview and Deploy

The final step presents a complete summary of your policy before deployment. The progress bar shows all three steps completed. Every configuration element is displayed in a read-only format for verification.

The preview includes:

SectionWhat’s Shown
Policy TypeThe selected type (e.g., Block Risk Queries). An Edit link lets you go back and change it.
When to TriggerA human-readable summary of all conditions — condition logic, actor/source filters, query conditions, and data filters. A Copy button is available.
Policy ScheduleComplete schedule configuration — always active, end date, or recurring schedules with day and time windows.
Alert RoutingWhether alerts are enabled, configured integrations (Jira, Slack), and their current status.
RemediationRemediation instructions for responders, if configured.
Basic DetailsPolicy name, description, and compliance tags (e.g., Payment Security Guidelines, RBI Infosec Framework, SEBI).

Each section has an Edit link to go back and make changes. Once verified, the message “Your Policy is ready to deploy” confirms the policy is complete.

Click Continue to create and activate the policy, or Cancel to discard.

Preview screen — complete policy summary before deployment

Figure 5: Preview screen — complete policy summary before deployment

Tip — After deployment, the policy appears in the Policies list with a “Custom” tag. You can enable/disable it at any time using the status toggle, or edit it via the pencil icon in the Actions column.

Quick Reference: Policy Creation Workflow

StepActionKey Decision
1. Policies PageNavigate to Settings › PoliciesReview existing policies
2. Policy TypeSelect Guardrail or Detection typeProxy required for Guardrail
3. ConfigureBuild conditions, set schedule, configure alertsTest policy before deploying
4. PreviewReview full summary, edit if neededConfirm and deploy