| File | # lines | # units |
|---|
|
|
509 |
- |
|
151 |
- |
|
91 |
- |
src.regoin policyDefinitions/Kubernetes/allowed-users/rego |
86 |
- |
|
82 |
- |
|
81 |
- |
src.regoin policyDefinitions/Kubernetes/allowed-host-paths/rego |
71 |
- |
|
64 |
- |
template.yamlin policyDefinitions/Kubernetes/allowed-proc-mount-types |
60 |
- |
template.yamlin policyDefinitions/Kubernetes/container-allowed-capabilities |
59 |
- |
|
56 |
- |
template.yamlin policyDefinitions/Kubernetes/allowed-seccomp-profiles |
51 |
- |
|
50 |
- |
template.yamlin policyDefinitions/Kubernetes/container-disallowed-capabilities |
49 |
- |
|
46 |
- |
|
45 |
- |
src.regoin policyDefinitions/Kubernetes/allowed-proc-mount-types/rego |
43 |
- |
|
42 |
- |
src.regoin policyDefinitions/Kubernetes/selinux/rego |
39 |
- |
src.regoin policyDefinitions/Kubernetes/container-allowed-capabilities/rego |
36 |
- |
template.yamlin policyDefinitions/Kubernetes/enforce-apparmor-profile |
36 |
- |
|
35 |
- |
template.yamlin policyDefinitions/Kubernetes/forbidden-sysctl-interfaces |
34 |
- |
template.yamlin policyDefinitions/Kubernetes/ensure-read-only-access-to-root-filesystem-in-a-kubernetes-cluster |
33 |
- |
template.yamlin policyDefinitions/Kubernetes/do-not-allow-container-privilege-escalation-in-kubernetes-cluster |
33 |
- |
src.regoin policyDefinitions/Kubernetes/allowed-seccomp-profiles/rego |
32 |
- |
template.yamlin policyDefinitions/Kubernetes/allowed-volume-types |
32 |
- |
template.yamlin policyDefinitions/Kubernetes/allowed-external-ips |
29 |
- |
src.regoin policyDefinitions/Kubernetes/container-disallowed-capabilities/rego |
26 |
- |
src.regoin policyDefinitions/Kubernetes/host-network-ports/rego |
24 |
- |
violation.yamlin policyDefinitions/Kubernetes/allowed-volume-types/examples-violations |
24 |
- |
template.yamlin policyDefinitions/Kubernetes/block-usage-of-the-default-namespace-in-a-kubernetes-cluster |
24 |
- |
|
23 |
- |
template.yamlin policyDefinitions/Kubernetes/do-not-allow-sharing-of-host-process-id-and-ipc-namespaces-in-a-kubernetes-cluster |
23 |
- |
|
22 |
- |
violation.yamlin policyDefinitions/Kubernetes/flexvolume-drivers/examples-violations |
22 |
- |
example_good.yamlin policyDefinitions/Kubernetes/container-allowed-capabilities/examples-good |
22 |
- |
|
22 |
- |
violation.yamlin policyDefinitions/Kubernetes/allowed-host-paths/examples-violations |
22 |
- |
template.yamlin policyDefinitions/Kubernetes/kubernetes-clusters-should-disable-automounting-api-credentials |
21 |
- |
example_good.yamlin policyDefinitions/Kubernetes/container-disallowed-capabilities/examples-good |
21 |
- |
violation.yamlin policyDefinitions/Kubernetes/container-disallowed-capabilities/examples-violations |
21 |
- |
|
21 |
- |
violation.yamlin policyDefinitions/Kubernetes/allowed-users/examples-violations |
21 |
- |
violation.yamlin policyDefinitions/Kubernetes/container-allowed-capabilities/examples-violations |
21 |
- |
|
20 |
- |
violation.yamlin policyDefinitions/Kubernetes/selinux/examples-violations |
20 |
- |
|
18 |
- |
violation.yamlin policyDefinitions/Kubernetes/host-network-ports/examples-violations |
18 |
- |
example_good.yamlin policyDefinitions/Kubernetes/forbidden-sysctl-interfaces/examples-good |
18 |
- |