Here are
39 public repositories
matching this topic...
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules. Take this survey to provide feedback about cfn-guard: https://amazonmr.au1.qualtrics.com/jfe/form/SV_bpyzpfoYGGuuUl0
Updated
Sep 13, 2024
Rust
Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
Updated
Sep 11, 2024
Rust
Cedar-agent is the easiest way to deploy and run Cedar
Updated
May 27, 2024
Rust
Go-to CLI tool for Kubewarden users
Updated
Sep 11, 2024
Rust
Zed extension for the Rego policy language from Open Policy Agent (OPA)
Updated
Aug 13, 2024
Rust
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
Updated
Sep 10, 2024
Rust
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden rust policy template to be used with cargo-generate
Kubewarden Policy SDK for the Rust programming language
Crate used by Kubewarden that is able to pull policies from OCI registries and HTTP servers.
Updated
Sep 11, 2024
Rust
A Kubewarden Policy that limits the ability to create privileged containers
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
A Pod Security Policy that controls Container Capabilities
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
Improve this page
Add a description, image, and links to the
policy-as-code
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
policy-as-code
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.