Governance Workflow Guide
This guide covers the policy governance workflow in the TealTiger Playground — how policies move through approval stages, how to handle emergencies, and how to use impact analysis to make informed decisions before promoting changes.Governance features require authentication and a team workspace. See the Getting Started Guide for setup.
Policy States
Every policy in a workspace has one of four states, shown as a colored badge on the policy card:| State | Badge Color | Description |
|---|---|---|
| Draft | Gray | Work in progress. Authors can freely edit the policy code and metadata. |
| Review | Yellow | Submitted for approval. Designated approvers are notified and can approve or reject. |
| Approved | Green | All required approvals received. The policy is locked — edits require a new version. |
| Production | Blue | Deployed and active. Like Approved, the policy is immutable at this version. |
Immutability Rule
Policies in Approved or Production state cannot be edited directly. To make changes, create a new version — the original version remains intact in the version history. This ensures a complete audit trail of every policy that was ever approved or deployed.State Transitions
Policies follow a forward lifecycle, with rollback paths available when needed:Forward Transitions
| From | To | Requires Approval? | Who Can Do It |
|---|---|---|---|
| Draft | Review | No | Policy author (Editor/Owner) |
| Review | Approved | Yes | Designated approvers |
| Approved | Production | No | Owner/Editor |
Rollback Transitions
| From | To | Requires Approval? | When to Use |
|---|---|---|---|
| Review | Draft | No | Rejection — approver sends policy back for changes |
| Approved | Draft | No | Rollback before deployment |
| Production | Draft | No | Rollback a deployed policy |
Approval Process
The approval workflow ensures policies are reviewed before reaching production.Configuring Approvers
- Open Workspace Settings → Governance
- Set the number of required approvers (1–5)
- Add team members as designated approvers
- Click Save
Submitting for Review
- Open a policy in Draft state
- Click “Request Approval”
- The policy moves to Review state
- All designated approvers receive a notification
Reviewing a Policy
- Open the policy — you’ll see the Approval Panel on the right side
- Review the code changes using the Diff View
- Add inline comments on specific lines if you have feedback
- Choose: Approve (optional comment) or Reject (required reason)
Promoting to Production
After a policy reaches Approved state:- Open the policy
- Click “Deploy to Production”
- Confirm the deployment
- The policy moves to Production state
Emergency Bypass
Sometimes a critical fix needs to skip the normal approval process.Prerequisites
- Emergency bypass must be enabled in Workspace Settings
- Only workspace Owners can perform an emergency bypass
Using Emergency Bypass
- Click the “Emergency Bypass” button
- Enter a detailed reason (required)
- Click “Confirm Bypass”
- The policy is promoted immediately
Impact Analysis
Before promoting a policy, run an impact analysis to understand how changes affect existing test scenarios.Running Impact Analysis
- Open a policy with pending changes
- Click “Run Impact Analysis”
- Results appear in the Impact Analysis Panel
Understanding Results
| Change Type | Threshold | Severity | Example |
|---|---|---|---|
| Decision | Any change | Breaking | ALLOW → DENY or DENY → ALLOW |
| Cost | ±10% | Warning | Estimated cost changed by more than 10% |
| Latency | ±20% | Warning | Execution time changed by more than 20% |
| Metadata | Any change | Info | Tags, description, or other metadata changed |
Recommendations
| Recommendation | Meaning |
|---|---|
| Approve | No breaking changes detected. Safe to promote. |
| Review | Warnings found. Review the changes before promoting. |
| Reject | Breaking changes detected. Address issues before promoting. |
Auto-Approval Rules
For low-risk changes, configure rules that automatically approve policy versions.| Rule | Condition | Default Threshold |
|---|---|---|
| Lines Changed | lines_changed_lt | 5 lines |
| Metadata Only | metadata_only | N/A |
| Comment Only | comment_only | N/A |
Best Practices
Workspace Setup
- Start with 2 required approvers for production policies
- Assign approvers from different roles for diverse review perspectives
- Enable emergency bypass but establish team norms for when it’s acceptable
Policy Development
- Keep policies small and focused — one concern per policy
- Write test scenarios before requesting review
- Use meaningful version bumps
Production Governance
- Review emergency bypass events weekly
- Use auto-approval only for truly low-risk changes
- Monitor the audit trail for unusual patterns
- Export compliance reports monthly
Related Guides
- Getting Started — Sign in, create workspaces, write your first policy
- Compliance Mapping — Map policies to OWASP, NIST, SOC2, ISO 27001, GDPR
- Audit Trail — Immutable logging, filtering, and export
- CI/CD Integration — Automated policy testing with GitHub Actions

