A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
-
Updated
Jan 20, 2026 - Rust
A Kubewarden Policy that detects usage of deprecated and dropped Kubernetes resources
A Kubewarden Policy that verifies all the signatures of the container images referenced by a Pod
A Kubewarden Policy that limits the ability to create privileged containers
This Kubewarden Policy is a replacement for the Kubernetes Pod Security Policy that controls containers user and groups
A Kubewarden policy that restricts what registries, tags and images can pods on your cluster refer to
Replacement for the Kubernetes Pod Security Policy that controls the usage of /proc mount types
A Kubewarden Pod Security Policy that controls usage of allowPrivilegeEscalation
A Pod Security Policy that controls Container Capabilities
A policy that can run CEL expressions
A Kubewarden Pod Security Policy that controls usage of AppArmor profiles
A Kubewarden Policy that detects secrets (ssh private keys, API tokens, etc) leaked via environment variables
Policy to enforce requirements on Kubernetes Ingress resources.
A Kubewarden Pod Security Policy that controls usage of Seccomp profiles
A Kubewarden Policy that controls the usage of Pod runtimeClass
Kubewarden policy that validates Kubernetes' resource annotations
Kubewarden policy that validates Kubernetes' resource labels
Replacement for the Kubernetes Pod Security Policy that controls the usage of fsGroup in the pod security context
A collection of Rego policies that can be used to enforce best practices in Kubernetes clusters
Replacement for the Kubernetes Pod Security Policy that controls the usage of volumes
Policy that validates workloads based on the vulnerability of the images they make use of
Add a description, image, and links to the kubewarden-policy topic page so that developers can more easily learn about it.
To associate your repository with the kubewarden-policy topic, visit your repo's landing page and select "manage topics."