Policy Actions vs Policy Rule Categories¶
Policy rule categories and policy actions are closely related, but they serve different purposes within BoostSecurity’s policy engine.
Understanding the distinction helps you design clearer rules and avoid unexpected policy behavior.
Policy Rule Categories¶
Policy rule categories define what type of security findings a rule applies to.
They act as the scope of a rule by grouping findings based on their origin or domain, such as:
- SAST
- SCA
- Secrets
- IaC
- Kubernetes
- Repository metadata
In other words, the rule category answers the question:
Question
“Which class of findings should this rule evaluate?”
A rule can only evaluate actions that are relevant to its selected category.
Policy Actions¶
Policy actions define how findings within a rule category are evaluated.
They act as filters or conditions that refine which findings match a rule. Actions evaluate specific attributes of a finding—such as severity, exploitability, reachability, confidence level, or repository context.
Policy actions answer the question:
Question
“Under what conditions should this rule trigger?”
Actions are combined within a rule to express precise intent, for example:
- Only critical vulnerabilities
- Only internet-reachable components
- Only exploitable vulnerabilities with high confidence
- Only findings in public repositories
How They Work Together¶
Policy rule categories and policy actions work together in a layered way:
- Rule category determines which findings are eligible
- Policy actions narrow that set by applying conditions
- Rule response defines what happens when a finding matches
You can think of it as:
Category = scope
Actions = filters
Response = outcome
When building policies, start by thinking of the right category, then use policy actions to precisely target the findings that matter most.