Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -60,11 +60,15 @@ You can set an enforcement level for each policy that determines what happens wh

### Sentinel

Sentinel provides three policy enforcement levels:
You can enable one of the following options to set the enforcement level when creating a Sentinel policy:

- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-policy-overrides) can override these failures and allow the run to complete.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure.
- **Advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **Soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-policy-overrides) can override these failures and allow the run to complete.
- **Hard mandatory:** Failed policies stop the run. Unless the set containing the policy is configured to [allow overrides](#allow-policy-level-overrides), Terraform does not apply runs until a user fixes the issue that caused the failure.

#### Allow policy level overrides

When adding policies to a policy set, you can enable the **This policy set can be overridden in the event of mandatory failures** option. Enabling this option lets users with the appropriate permissions, such as admins or team owners, override any failed policy checks in that set, even policies set to **Hard mandatory**. This override setting takes precedence over the individual policy’s enforcement level.

### OPA

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,15 +55,19 @@ Policy evaluations **cannot** access cost estimation data, so use policy checks

## Policy enforcement levels

You can set an enforcement level for each policy that determines what happens when a Terraform plan does not pass the policy rule. Sentinel and OPA policies have different enforcement levels available.
You can set an enforcement level for each policy. Enforcement levels determine what happens when a Terraform plan does not pass the policy rule. Sentinel and OPA policies have different enforcement levels available.

### Sentinel

Sentinel provides three policy enforcement levels:
You can enable one of the following options to set the enforcement level when creating a Sentinel policy:

- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure.
- **Advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **Soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete.
- **Hard mandatory:** Failed policies stop the run. Unless the set containing the policy is configured to [allow overrides](#allow-policy-level-overrides), Terraform does not apply runs until a user fixes the issue that caused the failure.

#### Allow policy level overrides

When adding policies to a policy set, you can enable the **This policy set can be overridden in the event of mandatory failures** option. Enabling this option lets users with the appropriate permissions, such as admins or team owners, override any failed policy checks in that set, even policies set to **Hard mandatory**. This override setting takes precedence over the individual policy’s enforcement level.

### OPA

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -59,11 +59,15 @@ You can set an enforcement level for each policy that determines what happens wh

### Sentinel

Sentinel provides three policy enforcement levels:
You can enable one of the following options to set the enforcement level when creating a Sentinel policy:

- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete.
- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure.
- **Advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI.
- **Soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete.
- **Hard mandatory:** Failed policies stop the run. Unless the set containing the policy is configured to [allow overrides](#allow-policy-level-overrides), Terraform does not apply runs until a user fixes the issue that caused the failure.

#### Allow policy level overrides

When adding policies to a policy set, you can enable the **This policy set can be overridden in the event of mandatory failures** option. Enabling this option lets users with the appropriate permissions, such as admins or team owners, override any failed policy checks in that set, even policies set to **Hard mandatory**. This override setting takes precedence over the individual policy’s enforcement level.

### OPA

Expand Down
Loading