Skip to content

leewalter/kritis

This branch is 1054 commits behind grafeas/kritis:master.

Folders and files

NameName
Last commit message
Last commit date
Aug 20, 2018
Aug 31, 2018
Aug 31, 2018
Sep 7, 2018
Aug 15, 2018
Jul 30, 2018
Oct 3, 2018
Aug 15, 2018
Sep 21, 2018
Oct 8, 2018
Oct 8, 2018
Aug 2, 2018
Jun 28, 2018
Aug 20, 2018
Jun 21, 2018
Aug 13, 2018
Jun 13, 2018
Aug 31, 2018
Oct 8, 2018
Oct 8, 2018
Jun 13, 2018
Sep 5, 2018
Sep 26, 2018
Jul 30, 2018
Oct 20, 2018
Aug 16, 2018
Sep 25, 2018
Oct 20, 2018

Repository files navigation

Kritis

GoDoc Widget BuildStatus Widget GoReport Widget

Kritis logo

Kritis (“judge” in Greek), is an open-source solution for securing your software supply chain for Kubernetes applications. Kritis enforces deploy-time security policies using the Google Cloud Container Analysis API, and in a subsequent release, Grafeas.

Here is an example Kritis policy, to prevent the deployment of Pod with a critical vulnerability unless it has been whitelisted:

imageWhitelist:
- gcr.io/my-project/whitelist-image@sha256:<DIGEST>
packageVulnerabilityPolicy:
  maximumSeverity: HIGH
  whitelistCVEs:
    providers/goog-vulnz/notes/CVE-2017-1000082
    providers/goog-vulnz/notes/CVE-2017-1000082

In addition to the enforcement this project also contains signers that can be use to create Grafeas Attestation Occurrences to be used in other enforcement systems like Binary Authorization. For details see Kritis Signer.

Getting Started

Contributing

See CONTRIBUTING for details on how you can contribute.

See DEVELOPMENT for details on the development and testing workflow.

License

Kritis is under the Apache 2.0 license. See the LICENSE file for details.

About

Software supply chain security for #Kubernetes apps

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 86.4%
  • Shell 6.5%
  • Makefile 2.9%
  • Dockerfile 2.1%
  • Python 1.8%
  • Smarty 0.3%