chapter fourteen

14 Policy governance

 

This chapter covers

  • How to govern policies across teams and systems
  • The policy management lifecycle
  • The roles, artifacts, and structures that make governance effective
  • How Identity Governance and Administration (IGA) aligns with policy governance to ensure consistent access assurance
  • Using governance to meet regulatory requirements and build organizational trust in authorization decisions

When ACME first deployed Cedar as its policy engine, the engineering team celebrated what seemed like the end of a long journey. Policies were versioned in Git, automatically tested, and deployed to production alongside code. The company’s Customer Collaboration platform could finally make consistent, auditable authorization decisions across tenants and services. For a while, that was enough.

Then the problems started to multiply, not in the code itself but in the discussions surrounding it. Two product teams maintained nearly identical policies with subtle differences that no one could fully explain. The compliance team found that an old data-sharing policy was still active long after the retention period it referenced had expired. A new engineer, trying to resolve a support issue, discovered a temporary policy override that had been in place for nine months. Each incident uncovered the same core issue: ACME had mastered policy deployment but not policy governance.

14.1 Why governance matters for authorization

14.2 The policy management lifecycle

14.2.1 Create

14.2.2 Review and approve

14.2.3 Deploy and use

14.2.4 Monitor

14.2.5 Update

14.2.6 Retire

14.3 Governance frameworks for policy management

14.3.1 The structure of governance

14.3.2 Roles and responsibilities

14.4 Identity Governance and Administration (IGA) and policy governance

14.5 Regulatory compliance and authorization

14.6 Best practices for policy governance

14.6.1 Establish clear ownership and accountability

14.6.2 Use shared templates and metadata

14.6.3 Integrate governance into existing workflows

14.6.4 Close the feedback loop

14.6.5 Align with identity governance

14.6.6 Measure and iterate

14.7 Governance as the foundation of trust

14.8 Summary