Gatekeeper introduces the following functionality: An extensible, parameterized policy library Native Kubernetes CRDs for instantiating the policy library (aka "constraints") Native Kubernetes CRDs for extending the policy library (aka "constraint templates") Native Kubernetes CRDs for mutation support Audit functionality External data support Get started with the installation instructions to deploy Gatekeeper components to your Kubernetes cluster. Documentation is available on the Gatekeeper website. Policy Library: See the Gatekeeper policy library for a collection of constraint templates and sample constraints that you can use with Gatekeeper. Community & Contributing: Refer to Gatekeeper's contribution guide to find out how you can help. Code of conduct: This project is governed by the CNCF Code of conduct. Security: For details on how to report vulnerabilities and security release process, please refer to Gatekeeper Security for more information.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
Tool for analyzing cloud resources against best practices and generating reports.
Krampus is a security solution for managing AWS objects and can be used as a cost-control tool.
A CLI utility that makes it easier to switch between different AWS roles
Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.
A tool for building Open Container Initiative (OCI) container images with various functionalities.
Burp extension for identifying cloud buckets and testing for vulnerabilities
A multi-cloud tool for centralizing assets across multiple clouds with minimal configuration.
A search engine for open Amazon S3 buckets and their contents, allowing users to search for files using keywords, filename extensions, and full path.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.