--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-architecture" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-arch...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/CAO_RewbkEKHVj2DxGxszDEGC9iBeZPfA4VPf7%3D6M8O6iHij5jg%40mail.gmail.com.
To view this discussion visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/c9320379-6e9e-4ffc-9515-8a1d39382981n%40googlegroups.com.
Hi everyone,
Regarding this discussion, I wanted to highlight that the Kubescape project already offers a solution for this.
Kubescape has a repository with Validating Admission Policy (VAP) policies available here: https://github.com/kubescape/cel-admission-library.
Additionally, Kubescape CLI includes a dedicated flag for deploying the CEL admission policy library: https://kubescape.io/docs/frameworks-and-controls/validating-admission-policy/#deploying-the-cel-admission-policy-library.
As a CNCF incubating project, Kubescape is committed to providing comprehensive Kubernetes security solutions and would be a perfect home for such an initiative. It offers posture and vulnerability management, automatic hardening policies, and eBPF-based threat detection. Kubescape is deeply integrated with the CNCF ecosystem, leveraging eBPF (via Inspektor Gadget) for runtime observability and Open Policy Agent (OPA) for configuration scanning. It integrates with tools like ArgoCD, Prometheus, and Headlamp.
I hope this information is helpful.
Best regards,
Matthias