<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Policy on</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/tags/policy/</link><description>Recent content in Policy on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Fri, 26 Sep 2025 10:00:00 +0000</lastBuildDate><atom:link href="https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/tags/policy/index.xml" rel="self" type="application/rss+xml"/><item><title>Kubernetes Policy Enforcement with OPA Gatekeeper</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/opa-gatekeeper/</link><pubDate>Tue, 02 Sep 2025 10:00:00 +0000</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/opa-gatekeeper/</guid><description>Gatekeeper is an admission controller that enforces policies in Kubernetes clusters. This article describes how it can be leveraged to ensure resources follow best practices related to the use of Chainguard Containers.
Prerequisites To follow the examples in this guide, you will need the following:
kubectl — the command line interface tool for Kubernetes — installed on your local machine. Administrative access to a Kubernetes cluster where OPA Gatekeeper is already installed.</description></item><item><title>Disallowing Non-Default Capabilities</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-non-default-capabilities-with-policy-controller/</link><pubDate>Thu, 02 Mar 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-non-default-capabilities-with-policy-controller/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to prevent running containers with extra capabilities. You will create a ClusterImagePolicy that uses the CUE language to examine a pod spec, and only allow admission into a cluster if the pod is running with one or many Linux capabilities from defined set of safe capabilities flags.
Prerequisites To follow along with this guide, you will need the following:
A Kubernetes cluster with administrative access.</description></item><item><title>Disallowing Privileged Pods</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-privileged-containers-with-policy-controller/</link><pubDate>Thu, 02 Mar 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-privileged-containers-with-policy-controller/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to prevent running containers with elevated privileges. You will create a ClusterImagePolicy that uses the CUE language to examine a pod spec, and only allow admission into a cluster if the pod is running without the privileged: true setting.
Prerequisites To follow along with this guide, you will need the following:
A Kubernetes cluster with administrative access. You can set up a local cluster using kind or use an existing cluster.</description></item><item><title>Disallowing Run as Root User</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-run-as-root-user-with-policy-controller/</link><pubDate>Thu, 02 Mar 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-run-as-root-user-with-policy-controller/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to prevent running containers as the root user in a Kubernetes cluster. You will create a ClusterImagePolicy that uses the CUE language to examine a pod spec, and only allow admission into a cluster if the pod is running as a non-root user.
Prerequisites To follow along with this guide, you will need the following:
A Kubernetes cluster with administrative access.</description></item><item><title>Maximum Container Image Age</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/maximum-image-age-policy-controller/</link><pubDate>Thu, 02 Mar 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/maximum-image-age-policy-controller/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to verify image signatures before admitting an image into a Kubernetes cluster. In this guide, you will create a ClusterImagePolicy that checks the maximum age of a container image verifying that isn’t older than 30 days. For that, we’ll attempt to create two distroless images one older than 30 days and a fresh one.
Prerequisites To follow along with this guide, you will need the following:</description></item><item><title>Disallowing Unsafe sysctls</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-unsafe-sysctls-with-policy-controller/</link><pubDate>Wed, 01 Mar 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/disallowing-unsafe-sysctls-with-policy-controller/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to only allow pods that use sysctls to modify kernel behaviour to run with the safe set of parameters. You will create a ClusterImagePolicy that uses the CUE language to examine a pod spec that uses sysctls, and only allow admission into a cluster if the pod is running a safe set parameters.
Prerequisites To follow along with this guide, you will need the following:</description></item><item><title>Verify Signed Chainguard Containers</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/using-policy-controller-to-verify-signed-chainguard-images/</link><pubDate>Wed, 22 Feb 2023 13:11:29 +0829</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/using-policy-controller-to-verify-signed-chainguard-images/</guid><description>This guide demonstrates how to use the Sigstore Policy Controller to verify image signatures before admitting an image into a Kubernetes cluster. In this guide, you will create a ClusterImagePolicy that checks for a keyless Cosign image signature, and then test the admission controller by running a signed nginx image.
Prerequisites To follow along with this guide, you will need the following:
A Kubernetes cluster with administrative access. You can set up a local cluster using kind or use an existing cluster.</description></item><item><title>Kubernetes Policy Enforcement with Kyverno</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/kyverno/</link><pubDate>Fri, 26 Sep 2025 10:00:00 +0000</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/kyverno/</guid><description>Kyverno is an admission controller that enforces policies in Kubernetes clusters. This article describes how it can be leveraged to ensure resources follow best practices related to the use of Chainguard Containers.
Prerequisites To follow the examples in this guide, you will need the following:
kubectl — the command line interface tool for Kubernetes — installed on your local machine. Administrative access to a Kubernetes cluster where Kyverno is already installed.</description></item><item><title>Limit High or Critical CVEs in your Images Workloads</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/critical-cve-policy/</link><pubDate>Wed, 12 Apr 2023 15:22:20 +0100</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/critical-cve-policy/</guid><description>While Common Vulnerabilities and Exposures (CVEs) are undesirable at any time, the software security standards of certain industries strictly regulate the allowance of high or critical CVEs. For example, in the payment industry, the PCI Security Standards Council requires that all vulnerabilities with a Common Vulnerability Scoring System (CVSS) score higher than 4 are addressed.
For engineers and security professionals working in these contexts, it’s essential to know if container images have high or critical CVEs before deploying them.</description></item><item><title>Rego Policies</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/chainguard-enforce-rego-policies/</link><pubDate>Thu, 12 Jan 2023 15:56:52 -0700</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sigstore/policy-controller/policies/chainguard-enforce-rego-policies/</guid><description>The Sigstore Policy Controller supports the Rego Policy Language, which is a declarative policy language that is used to evaluate structured input data such as Kubernetes manifests and JSON documents. This feature enables users to apply policies that can evaluate Kubernetes admission requests and object metadata to make comprehensive decisions about the workloads that are admitted to their clusters. Rego support also enables users to enhance existing cloud-native policies by adding additional software supply chain security checks.</description></item></channel></rss>