checkov
Kyverno
checkov | Kyverno | |
---|---|---|
63 | 43 | |
7,729 | 6,506 | |
2.0% | 2.3% | |
9.9 | 9.9 | |
2 days ago | 3 days ago | |
Python | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
checkov
-
Ditched Terraform for OpenTofu. Why Devs Everywhere Are Making the Same Move (cheatsheet included)
Checkov https://www.checkov.io A static analysis tool to scan infrastructure code for misconfigs, secrets, and best practice violations.
-
Custom Security Checks for AWS Cloud Control Provider with Checkov
PR #6647
-
DevOps in 2025: the future is automated, git-ified, and kinda scary but fun.
Checkov infrastructure-as-code misconfig detection
-
Boas Práticas de Segurança e Qualidade no Terraform.
Link do repo
-
Top Terraform/OpenTofu tools to Use in 2025
Link: https://github.com/bridgecrewio/checkov
-
Terraform Cookbook: Development Environment Recipe
Checkov: static analysis for IaC
-
Building Web Applications Using Amazon EKS : AWS Project
Prior to deploying kubernetes manifest files to EKS Cluster, supplementary steps need to be added to prevent security and misconfiguration issue by using both *Checkov *and Trivy . Also, we will use seperate ArgoCD account from admin user that we’ve used in the previous lab. This will follow ArgoCD RBAC rule to secure ArgoCD and EKS cluster ultimately.
-
Automating Snowflake Resource Deployment using Terraform and GitHub Actions
The workflow also includes a step for infrastructure code scan to scan Terraform code. This uses Checkov action against infrastructure-as-code, open source packages, container images, and CI/CD configurations to identify misconfigurations, vulnerabilities, and license compliance issues.
-
Cloud Security and Resilience: DevSecOps Tools and Practices
1. Checkov: https://github.com/bridgecrewio/checkov Checkov is a static code analysis tool that helps developers prevent cloud misconfigurations during the development phase by scanning Terraform, CloudFormation, Kubernetes, and more.
-
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
Checkov Owner/Maintainer: Prisma Cloud by Palo Alto Networks (acquired in 2021) Age: First released on GitHub on March 31st, 2021 License: Apache License 2.0
Kyverno
-
Mastering DevSecOps and GitOps for Secure Cloud-Native Applications
Tools: Open Policy Agent (OPA) Gatekeeper (https://open-policy-agent.github.io/gatekeeper/) and Kyverno (https://kyverno.io/) are widely used for enforcing policies on Kubernetes. They act as admission controllers, intercepting requests to the Kubernetes API server and validating them against predefined policies.
-
AWS Config vs Kubernetes Native Policy Engines: Who Governs What?
The most common Kubernetes native policy engines are Kyverno and OPA Gatekeeper.
-
Kubernetes Admission Controllers — Your Cluster’s Gatekeepers
🛠️ Tools like Kyverno and OPA Gatekeeper make writing policies easier.
-
Policy Management in Kubernetes with Kyverno
curl -LO https://github.com/kyverno/kyverno/releases/download/v1.12.0/kyverno-cli_v1.12.0_linux_x86_64.tar.gz tar -xvf kyverno-cli_v1.12.0_linux_x86_64.tar.gz sudo cp kyverno /usr/local/bin/
-
My journey from a CNCF contributor to LFX mentee
For next few months along with my internship I was focusing was on building projects, learning go and Kubernetes, and leaning about another CNCF project called CNCF Kyverno, it is a Kubernetes native policy engine. If we go back a little bit, when ORAS did not come for LFX, I started searching for other CNCF projects I that is when I saw KubeEdge, the project I am currently working under and Kyverno where I became an official contributor later. I started learning about Kyverno, one of my friends recommended me to contribute to Kyverno and I would also recommend any newbie who wants to start contributing to open source that you should choose an active project (where maintainers are active and regularly help contributors). I can recommend Kyverno to any beginner because it has a really good documentation and maintainers a very supportive. Luckily all three projects I have contributed to till now have been amazing. Also I would suggest that at KubeEdge, we are continuously trying to improve our documentation so if you think you would want to help us, please join the community and contribute.
-
My Experience Working on the KWOK Project as an LFX Mentee
How projects uniquely utilize etcd: I initially knew that configuration data was stored in etcd. However, I never knew that a project could utilize it to store other important information. For example, Kyverno uses it to store policy reports.
-
Policy as Code with Kyverno
kubectl create -f https://github.com/kyverno/kyverno/releases/download/v1.11.1/install.yaml
-
Clusters Are Cattle Until You Deploy Ingress
Bart: Our numerous podcast discussions with seasoned professionals show that GitOps has been a recurring theme in about 90% of our conversations. Almost every guest we've interviewed has emphasized its importance, often mentioning it as their primary tool alongside other essentials like cert manager, Kyverno, or OPA, depending on their preferences.
-
Stop 'k rollout restart deploy' from restarting everything?
Anyway, I haven’t checked for sure as I’m away from laptop but it should be possible to use something like Kyverno to block that operation. We had to do similar in the past to hotfix a bug in our CLI tool. I wrote a blog post about it that might give you an idea: https://www.giantswarm.io/blog/restricting-cluster-admin-permissions
-
An Overview of Kubernetes Security Projects at KubeCon Europe 2023
Cosign is used for signing containers through a variety of different methods. It has strong integration with other open source tools, such as Kyverno.
What are some alternatives?
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
falco - Cloud Native Runtime Security
OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Kubewarden - Kubewarden is a policy engine for Kubernetes. It helps with keeping your Kubernetes clusters secure and compliant. Kubewarden policies can be written using regular programming languages or Domain Specific Languages (DSL) sugh as Rego. Policies are compiled into WebAssembly modules that are then distributed using traditional container registries.
kics - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
gatekeeper - 🐊 Gatekeeper - Policy Controller for Kubernetes