Compliance Exception Request with Escalation Framework
Operational teams need to request exceptions to compliance rules while maintaining audit trail and governance.
The problem
Exception requests (e.g., extended payment terms for a key customer, a rule waiver for a pilot program) are evaluated by Corules. Low-risk exceptions within established parameters auto-approve with required documentation. High-risk exceptions escalate with business justification and required compensating control. Every exception carries an expiration date enforced at policy runtime.
Without deterministic enforcement, AI agents either block every edge case (adding manual overhead) or silently approve decisions that violate policy — with no audit trail to show auditors or regulators.
How Corules solves it
Corules sits between your AI agent and the action it wants to take. When the agent proposes a decision, Corules evaluates the full context against your compiled policy set in a single deterministic pass — no LLM, no ambiguity.
The result is a structured outcome: ALLOW — Low-risk exception with documented compensating control. Auto-approved for 45 days.
Decision outcome: ALLOW
Low-risk exception with documented compensating control. Auto-approved for 45 days.
Policy example
Corules policies are written in CEL (Common Expression Language). They are compiled once at publish time and evaluated deterministically at request time — no LLM, no variability.
// Exception approval policy (CEL)
context.exception_risk_level <= params.auto_approve_risk_threshold
&& context.compensating_control_documented == true
&& context.expiration_date <= timestamp_add(now(), duration('90d'))This expression is evaluated against the structured context your agent sends in the /v1/validate request.
Integration options
Corules integrates with the tools your teams already use. All integrations call the same REST API or MCP server — your policy logic stays in one place.
Frequently Asked Questions
What is a compensating control?
A compensating control is an alternative measure that mitigates risk when a standard rule cannot be followed. The exception approval requires it to be documented in the request payload.
What happens when an exception expires?
Policy evaluation at runtime checks the expiration date. Expired exceptions return BLOCK with a specific 'exception_expired' reason code.
Ready to enforce this policy?
Start free — evaluate up to 1,000 decisions per month with no credit card required.
Get started free