aws cdk work with cloudformation guard demo.
-
Updated
Jul 17, 2024 - TypeScript
aws cdk work with cloudformation guard demo.
Recreation of common Pod Security Policy configuration in other common Kubernetes policy engines
GAMECHANGER Policy Analytics Site Crawlers
Regal is a linter for Rego, with the goal of making your Rego magnificent!
Secure, advanced, and flexible access management stack for web3.
An open source, cloud-native security to protect everything from build to runtime
Kubewarden's documentation
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
Workflow to rebuild and sign rancher/kubectl image
A template repository to quickly scaffold a Kubewarden policy written with Go language
A Kubernetes dynamic admission controller that uses WebAssembly policies to validate incoming requests
Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
Regorus - A fast, lightweight Rego (OPA policy language) interpreter written in Rust.
Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudFormation Templates, K8s configurations, and Terraform JSON plans/configurations against those rules. Take this survey to provide feedback about cfn-guard: https://amazonmr.au1.qualtrics.com/jfe/form/SV_bpyzpfoYGGuuUl0
IAMbic is Version-Control for IAM. It centralizes and simplifies cloud access and permissions. It maintains an eventually consistent, human-readable, bi-directional representation of IAM in Git.
Reports evaluation of existing Kubernetes resources with your already deployed Kubewarden policies.
Automate Kubernetes Configuration Editing
Manage admission policies in your Kubernetes cluster with ease
Go-to CLI tool for Kubewarden users
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
Add a description, image, and links to the policy-as-code topic page so that developers can more easily learn about it.
To associate your repository with the policy-as-code topic, visit your repo's landing page and select "manage topics."