List All Policies
Returns a list of all access control policies.Unique policy identifier
Policy name
Policy description
Whether the policy is active
Posture check IDs applied to source groups
List of policy rules defining access controls
Get a Policy
Retrieve detailed information about a specific policy.The unique identifier of the policy
Example
Create a Policy
Create a new access control policy with rules.Policy name
Policy description
Whether the policy is active
Posture check IDs to apply to source groups
List of policy rules
Update a Policy
Update an existing policy and its rules.The unique identifier of the policy
Policy name
Whether the policy is active
Complete list of policy rules (replaces existing rules)
Example
Delete a Policy
Remove a policy from the network.The unique identifier of the policy
Example
Policy Rules
Each policy contains one or more rules that define access controls.Rule Fields
Rule name
Rule description
Whether the rule is active
Action to take:
accept or dropWhether the rule applies in both directions
Protocol type:
all, tcp, udp, icmp, or netbird-sshList of port numbers (for TCP/UDP)
List of port range objects with
start and end fieldsSource group IDs
Destination group IDs
Source resource object (alternative to sources)
Destination resource object (alternative to destinations)
Protocol Examples
Policy Actions
Accept
Allow traffic matching the rule
Drop
Block traffic matching the rule
Bidirectional Rules
Whenbidirectional: true, the rule applies in both directions:
- Group A → Group B
- Group B → Group A
Posture Checks
Apply security requirements to source groups:Common Policy Patterns
Allow All Within Group
Database Access
Zero Trust Access
Best Practices
Start with deny-all - Create policies that explicitly allow only required traffic
Use specific protocols and ports - Avoid using
"protocol": "all" when possibleEnable posture checks - Require security compliance for sensitive access
Document policies - Add clear descriptions explaining the purpose of each policy
Test before deploying - Verify policies in a test environment first
Review regularly - Audit policies periodically to ensure they’re still needed