get_user_data), HipoCap checks the active policy. If the user doesn’t have the required role, the function execution is blocked at the code level.
Ensure your “Support Agent” can read emails but never delete databases. Define strict permissions for every tool call.
What is Governance?
Governance in HipoCap provides runtime enforcement of access control policies:- Who can call which functions (Function-Level RBAC) - Enforced before execution, not logged after
- What functions can be called together (function chaining) - Prevents unauthorized function chains
- How functions are evaluated (severity rules) - Real-time policy enforcement
- When functions require review (decision thresholds) - Runtime decision making
Key Components
1. Policies
Policies define the rules for function access and security evaluation. You can create multiple policies for different environments or use cases.2. Roles & Permissions
Define user roles (e.g., admin, user, guest) and assign permissions to control function access. Enforce least privilege—users only get the minimum permissions needed for their role.3. Function Access Control
Control which functions can be called by which roles, with fine-grained permissions. The HipoCap Shield’s RBAC Engine checks permissions before function execution, blocking unauthorized calls at the code level.4. Function Chaining
Restrict which functions can be called together, preventing unauthorized function chains.5. Severity Rules
Define how different threat levels are handled (block, allow, review).How It Works
- User makes a function call - The call includes user role information
- Policy is selected - HipoCap selects the appropriate policy (default or specified)
- RBAC check - The Shield’s RBAC Engine verifies the user’s role has permission for this function before execution
- Function chaining check - Verifies the function chain is allowed
- Security analysis - Runs multi-stage security analysis (Input Guard, Output Guard)
- Decision - Makes ALLOW/BLOCK decision based on policy rules—unauthorized calls are blocked at runtime
Example Use Case
Scenario: Email processing system- Admin role: Can call
send_email,delete_email,modify_email - User role: Can call
read_email,search_email - Guest role: Can only call
read_email(read-only)
read_email→send_emailis blocked (prevent email forwarding)read_email→search_emailis allowed
- High severity threats → BLOCK
- Medium severity → BLOCK
- Low severity → ALLOW
Benefits
- Security - Prevent unauthorized function access
- Compliance - Meet regulatory requirements with audit trails
- Control - Fine-grained control over AI operations
- Flexibility - Multiple policies for different scenarios
- Visibility - Complete audit trail of all decisions
Next Steps
- Policies - Create and manage policies
- Roles & Permissions - Set up RBAC
- Function Access Control - Configure function permissions
- Function Chaining - Control function chains
