Policies
Overview
Environment Policies in Bluebricks provide a centralized way to define, enforce, and automate rules that govern how deployments operate across your environments. These policies allow platform and DevOps teams to create guardrails that ensure consistency, compliance, and security—without restricting developer velocity. By applying policies directly at the environment level, Bluebricks ensures that every deployment—regardless of artifact type or triggering interface—follows a predictable, controlled, and auditable workflow.
Types of Environment Policies
Bluebricks supports several built-in policies that address common governance, security, and cost-control needs. These policies can be combined to create tailored guardrails per environment.
Owner Approval
The Owner Approval policy ensures that deployments to sensitive environments—such as staging or production—cannot proceed without explicit approval from designated environment owners. This helps organizations enforce:
Controlled access to mission-critical environments
Review workflows for changes with high impact
Separation of duties between developers and environment custodians
When triggered, the run pauses until an approved owner confirms the change.
Cost Limit
The Cost Limit policy helps prevent unexpected or runaway infrastructure changes by enforcing a maximum allowed cost threshold for all deployments in the environment. Bluebricks evaluates the projected cost impact of a IaC change, and:
Blocks changes that exceed defined cost boundaries
Allows exceeding cost limit only with owner approval, allowing better control over spend
Ensures budget control and predictable spending across environments
This allows for managing cloud spend at a much granular scope and create smaller cost centers.
Allowed Blueprints
The Allowed Blueprints policy restricts which blueprints can be deployed to a given environment. This allows platform teams to tightly control the types of workloads permitted to run, in edition to who can run them. Use this policy to:
Ensure only vetted or approved blueprints reach production
Prevent experimental, untested, or internal-only blueprints from being deployed to critical environments
Enforce architectural standards defined by the platform team
Ensure team members only have access to deploy certain blueprints.
This eliminates misconfigurations and ensures consistent use of validated patterns. Moreover, users can only see Blueprints and versions based on their environment membership.
Key Capabilities
Bluebricks enhances Environment Policies with features designed for safety, transparency, and scale:
Fine-grained policy definitions, scoped per environment (Dev, QA, Staging, Production)
Unified enforcement across Terraform/OpenTofu, Bicep, CloudFormation, Helm, and Generic artifacts
Automatic policy validation before a run executes
Clear, actionable violation messages, shown directly in the run details
RBAC-aligned governance, ensuring policies reflect your organization’s access model
Example Use Cases
Environment Policies are valuable when you need to:
Prevent accidental production changes without review
Enforce budget controls for expensive infrastructure
Restrict access to certain deployment patterns or blueprints
Operational Workflow
Whenever a run is triggered Bluebricks automatically evaluates all relevant environment policies before execution begins. If a policy is violated:
The run is immediately paused or blocked
A clear explanation is shown, detailing which rule failed and why
The user can update inputs, request approval, or revise the policy before retrying
This ensures that every environment stays compliant and protected by default.
Last updated
Was this helpful?

