The Cerbos PDP v0.51.0 release introduces new Admin API capabilities for policy lifecycle management, enhanced audit logging with request context, and several important updates to scope handling that improve consistency across the evaluation engine.
Managing policy lifecycles in production environments just got easier. The new DeletePolicies RPC enables secure removal of policies from database-backed stores through the Admin API. Critically, the endpoint includes integrity validation; any deletion request that would compromise policy store integrity is automatically rejected.
This feature is particularly useful for teams managing large policy repositories who need to clean up deprecated or superseded policies without risking broken authorization.
Database stores accumulate backup copies of policies with each add or update operation. Over time, this can consume significant storage. The new PurgeStoreRevisions RPC allows administrators to reclaim this space by removing historical policy revisions.
Note: Database users will require DELETE privileges on the policy_revision table to use this feature.
A new optional requestContext field is now available in CheckResources and PlanResources requests. This field allows applications to attach arbitrary metadata, such as correlation IDs, user session identifiers, or trace context, that flows through to audit logs.
This enhancement significantly improves the ability to correlate authorization decisions with broader application activity during debugging and compliance audits.
Role policies now support optional explicit version declarations rather than assuming "default." While currently optional for backward compatibility, explicit versioning will become mandatory in a future release. Teams using role policies should begin adding explicit version fields to prepare for this change.
The cerbos compile command introduces a new --test-filter flag, replacing the now-deprecated --run flag. The new flag offers filtering across five dimensions:
This provides much finer control when running specific subsets of policy tests during development and CI pipelines.
This release includes several important updates to scope handling:
CheckResources and PlanResources evaluationsFor the complete list of changes, see the full changelog.
Book a free Policy Workshop to discuss your requirements and get your first policy written by the Cerbos team




Join thousands of developers | Features and updates | 1x per month | No spam, just goodies.
What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.