Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
-
Updated
Nov 14, 2024 - Rust
Webhook server that evaluates WebAssembly policies to validate Kubernetes requests
Go-to CLI tool for Kubewarden users
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden rust policy template to be used with cargo-generate
Kubewarden Policy SDK for the Rust programming language
Crate used by Kubewarden that is able to pull policies from OCI registries and HTTP servers.
A Kubewarden Policy that limits the ability to create privileged containers
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
A Pod Security Policy that controls Container Capabilities
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A Kubewarden Policy that controls the usage of Pod runtimeClass
A Kubewarden policy that enforces root filesystem to be readonly
A Kubewarden Policy that controls the usage of `volumeMounts`
Add a description, image, and links to the kubernetes-security topic page so that developers can more easily learn about it.
To associate your repository with the kubernetes-security topic, visit your repo's landing page and select "manage topics."