The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.
-
Updated
May 27, 2024 - Open Policy Agent
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.
Meshery, the cloud native manager
Regal is a linter for Rego, with the goal of making your Rego magnificent!
Cloud-native authorization for modern applications and APIs
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Audit Dependency-Track findings and policy violations via policy as code
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
Regorus - A fast, lightweight Rego (OPA policy language) interpreter written in Rust.
Open Policy Agent (OPA) Plugins for Backstage
Recreation of common Pod Security Policy configuration in other common Kubernetes policy engines
📚 The OPA Gatekeeper policy library
🐊 Gatekeeper - Policy Controller for Kubernetes
Traefik plugin which checks JWT tokens for required fields. Supports Open Policy Agent (OPA) and signature validation with JWKS
Open-source Platform for learning kubernetes and aws eks and preparation for for Certified Kubernetes exams (CKA ,CKS , CKAD)
This repository has a policy file of the Open Policy Agent to check that resources defined in CloudFormation templates are tagged.