Generating Kubernetes ValidatingAdmissionPolicies from Kyverno policies
Project post originally published on Kyverno’s blog by Mariam Fahmy In the previous blog post, we discussed writing Common Expression Language (CEL) expressions in Kyverno policies for resource validation. CEL was first introduced to Kubernetes for the Validation rules for CustomResourceDefinitions,…
Securing OpenTofu with Nirmata powered by Kyverno
Member post originally published on Nirmata’s blog by Anusha Hegde As Infrastructure as Code (IaC) continues to gain popularity among DevOps practitioners for its efficiency and scalability, the recent Terraform license ambiguity has prompted the emergence of alternative…
Securing services meshes easier with Kyverno
Project post originally published on Kyverno’s blog Service meshes are all too common these days in Kubernetes with some platforms even building them into clusters by default. Service meshes are no doubt useful in a variety of ways…
The need for speed: optimizing Kyverno’s performance
Member post originally published on Nirmata’s blog by Jim Bugwadia and Khaled Emara About Kyverno Kyverno is a policy engine designed for Kubernetes and cloud native workloads. Policies can be managed as Kubernetes resources, and no new language…
Kyverno completes third-party security audit
Member post originally published on Kyverno’s blog by Kyverno maintainers The Kyverno project is pleased to announce the completion of its third-party security audit. The audit was conducted by Ada Logics in collaboration with the Kyverno maintainers, the Open Source Technology…
Member post originally published on Nirmata’s blog by Shuting Zhao The Kyverno team is delighted to share a new Kyverno release, v1.11! This release marks a significant milestone for Kyverno, with an extensive development period of around five…
Kyverno expands beyond Kubernetes
Project post by Kyverno maintainers Kyverno, the open-source policy engine originally built for Kubernetes, is pleased to announce support for non-Kubernetes workloads, by supporting policies that operate on JSON payloads. Due to its simplicity and wide range of…
Kyverno completes fuzzing security audit
Project post originally published on the Kyverno blog by Adam Korczynski Presenting the results from the fuzzing security audit Kyverno, a CNCF policy engine for Kubernetes, is happy to announce the completion of its fuzzing security audit. The…
Verifying images in a private Amazon ECR with Kyverno and IAM Roles for Service Accounts (IRSA)
Community post originally published on GitHub by Shuting Zhao, a maintainer of Kyverno When running workloads in Amazon Elastic Kubernetes Service (EKS), it is essential to ensure supply chain security by verifying container image signatures and other metadata….
One-time pass codes for Kyverno
Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention of objectively…