Member post originally published on Nirmata’s blog by Shuting Zhao The Kyverno team is delighted to share a new Kyverno release, v1.11! This release marks a significant milestone for Kyverno, with an extensive development period of around five…
Kyverno expands beyond Kubernetes
Project post by Kyverno maintainers Kyverno, the open-source policy engine originally built for Kubernetes, is pleased to announce support for non-Kubernetes workloads, by supporting policies that operate on JSON payloads. Due to its simplicity and wide range of…
Kyverno completes fuzzing security audit
Project post originally published on the Kyverno blog by Adam Korczynski Presenting the results from the fuzzing security audit Kyverno, a CNCF policy engine for Kubernetes, is happy to announce the completion of its fuzzing security audit. The…
Verifying images in a private Amazon ECR with Kyverno and IAM Roles for Service Accounts (IRSA)
Community post originally published on GitHub by Shuting Zhao, a maintainer of Kyverno When running workloads in Amazon Elastic Kubernetes Service (EKS), it is essential to ensure supply chain security by verifying container image signatures and other metadata….
One-time pass codes for Kyverno
Community post originally published on Neon Mirrors by Chip Zoller In real life, imposed rules often have cases where exceptions may be required but on a case-by-case basis. Policy is really no different here. While prevention of objectively…
Using Kyverno with Pod Security Admission
Guest post originally published on the Kyverno blog by Kyverno Maintainers Using Pod Security Admission with Kyverno for the best of both worlds. Pod Security Admission (PSA) is the built-in successor to Kubernetes PodSecurityPolicy (PSP) and is enabled by default starting…
PodSecurityPolicy migration with Kyverno
Project post originally published on the Kyverno blog As you’ve probably heard, PodSecurityPolicy (PSP) in Kubernetes is no more. After a deprecation beginning in v1.21, they were finally removed in v1.25. Many organizations out there are still relying on PSPs…
Project post originally published on the Kyverno blog Kyverno 1.10 released with featuring separate controllers, external service calls, Notary support, and tons more! The Kyverno team are proud to announce the release of Kyverno 1.10, a minor release…
Kyverno — verify Kubernetes control plane images
Guest post originally published on Medium by Charles-Edouard Brétéché In this story we are going to deploy a local Kubernetes cluster using kind, then we will deploy Kyverno and use it to verify Kubernetes control plane images signature. What is Kyverno ? Kyverno is an open-source policy engine for Kubernetes that allows you to…
Announcing the Kyverno 1.10 Pre-Release
Project post also on the Nirmata blog by the Kyverno maintainers Kyverno is a policy engine built for Kubernetes that helps secure and automate Kubernetes configurations. In Kubernetes policies are configurations that govern the configuration and runtime behaviors…