Every Command. Your Rules.
Block dangerous operations, warn on risky commands, or observe silently across every database protocol. Automatic risk classification, and a full audit trail.
Three Enforcement Modes
Every policy is configurable per endpoint. Start in observe mode, promote to warn, then block when you're confident. Roll out gradually without disrupting traffic.
Block
Command rejected immediately. Native error returned to the client in the database's wire protocol. Metric emitted. Full stop.
Warn
Command allowed through to the backend. Warning metrics emitted. Visible in dashboards and the audit trail for review.
Observe
Command allowed silently. Metrics recorded for analysis. Zero client-side impact. Use this mode to baseline your traffic before enforcing.
Redis Policy Presets
15 built-in presets covering every category of Redis command risk. Mix and match per endpoint, or build custom policies from scratch.
Blocks FLUSHALL, FLUSHDB, SHUTDOWN, DEBUG, CONFIG SET, and other dangerous commands
Production plus KEYS, RANDOMKEY, SCAN-without-COUNT, and unbounded iteration
Minimal blocking — only commands that could crash or corrupt the server
Blocks FLUSHALL and FLUSHDB specifically
Blocks KEYS command to prevent O(N) full-keyspace scans
Blocks ACL SETUSER, ACL DELUSER, ACL SAVE — prevents privilege escalation
Blocks CONFIG SET, CONFIG REWRITE — prevents runtime config tampering
Blocks DEBUG SLEEP, DEBUG SEGFAULT, DEBUG SET-ACTIVE-EXPIRE
Blocks SHUTDOWN to prevent accidental instance termination
Blocks BGSAVE, BGREWRITEAOF, RDB/AOF manipulation
Blocks MODULE LOAD/UNLOAD to prevent arbitrary code execution
Blocks MIGRATE, DUMP, RESTORE — prevents data exfiltration
Blocks SLAVEOF, REPLICAOF, CLUSTER FAILOVER
Blocks EVAL, EVALSHA, FUNCTION — prevents arbitrary Lua/function execution
Blocks CLUSTER RESET, CLUSTER FLUSHSLOTS, and other destructive cluster operations
PostgreSQL Risk Classification
Every PostgreSQL operation is automatically classified by impact level. Commands are categorized as they pass through the proxy and enforced through your chosen policy mode.
Normal queries — SELECT, INSERT, UPDATE, DELETE
Standard CRUD operations that operate within normal transaction boundaries. Always allowed regardless of policy mode.
COPY operations — bulk data ingestion and export
COPY IN/OUT, CopyData, CopyDone, CopyFail. Can move large volumes of data and consume significant I/O. Warned by default in production mode.
VACUUM, REINDEX, CLUSTER — table-locking operations
Operations that acquire exclusive locks and can block other queries for extended periods. These should be scheduled during maintenance windows.
DROP, TRUNCATE, ALTER — destructive and schema-altering
Irreversible operations that destroy data or modify schema. Blocked by default in strict and production modes. OTel metrics emitted: postgres.policy.blocked.
Cross-Protocol Enforcement
The same three-tier enforcement model applies to every wire protocol Eden supports. One policy framework, every database.
Redis
RESP protocol interception. 15 named presets, 200+ commands classified. Blocks at the command parser before the backend ever sees the request.
PostgreSQL
PG wire protocol interception including Extended Query Protocol. Risk classification for Parse, Simple Query, and COPY operations.
MongoDB
MongoDB wire protocol interception. Policy enforcement on operation type with the same Block/Warn/Observe model.
Audit & Compliance
Every policy decision is recorded. Know who ran what, when, and from where — across every database protocol.
Service Attribution
Automatic service identification from PostgreSQL application_name startup parameter and Redis CLIENT SETINFO LIB-NAME. Know which service issued every command without any instrumentation.
Query Recording
Full query capture for blocked and warned commands. BlockedCommandRecorder and PgQueryRecorder traits with global OnceLock singletons ensure every policy decision includes the complete command context.
mTLS & Encryption
Mutual TLS for proxy connections with full certificate chain verification. TLS termination at the gateway layer with HTTP/2 support. All traffic between Eden and your backends is encrypted in transit.
Security Model
Configurable expiry, per-organization scoping
Role-based access control across all endpoints
Governor-based middleware per API route
Organization-scoped credential and endpoint isolation
Enforce Policy at the Gateway Layer
Stop dangerous commands before they reach your databases. Start in observe mode and promote to block when you're ready.