This is a simple tool to help our developers test their apps, they can simply run docker run --rm -ti -v $(pwd):/apps ghcr.io/example-policy-org/policy-checker when in the app and it’ll test if the app passes.
-
Updated
May 28, 2024 - Shell
This is a simple tool to help our developers test their apps, they can simply run docker run --rm -ti -v $(pwd):/apps ghcr.io/example-policy-org/policy-checker when in the app and it’ll test if the app passes.
This app is compliant with version 1.0.0 of the company policy only
A template repository to quickly scaffold a Kubewarden policy written with C#
HTTP load to stress policy-server
This infra is compliant with version 2.0.1 of the company policy
Demo policy showing how to write a raw mutating policy
Policy validates pods sharing processes PID namespace
A Chimera Policy written in Rust that ensures only trusted users can create workloads tolerating a chosen taint
This infra is compliant with version 1.0.0 of the company policy only
Demo policy showing how to write a raw WASI validating policy
GCP Policy as Code (gcp-pac) for your Pulumi typescript apps
The new and improved oscal.club website.
This app is compliant with version 2.0.0 of the company policy but its only using 1.0.0 and can be updated with a pull-request.
This is an example of everything coexisting on a single cluster for simplicity and keeping this free to run I stand up the cluster each time using KiND, but this could just as well be a real cluster(s).
CDK app that makes use of Checkmarx's KICS Validator plugin for checking the security of a S3 bucket
Demo policy showing how to write a raw WASI mutation policy
This Project uses Terraform Sentinel to apply Policy-as-Code on Terraform Workflow. Get more details:
Add a description, image, and links to the policy-as-code topic page so that developers can more easily learn about it.
To associate your repository with the policy-as-code topic, visit your repo's landing page and select "manage topics."