-
Tracing policies now support optional 'tags' https://tetragon.io/docs/concepts/tracing-policy/tags/, https://tetragon.io/docs/reference/grpc-api/#processkprobe including tracepoint and uprobes.
T…
-
We should add a robust reporting process and enforcement pledge to our anti-harassment policy.
-
## Description
In Deny mode the WAF seems to correctly handle the `allow` action, and after triggering an `allow` rule other rules in the same and subsequent phases are ignored and not triggered. I…
-
BPFLSM could provide all policy related enforcement and alerts after we close #1477. This means it should be okay to disable system monitor to save on resource usage specially in production clusters w…
-
Most of time, cluster nodes are in a same datacenter, using bridge would have less network overhead compare to an overlay network. Please consider a bridge mode with eBPF, which combines the best from…
-
_This issue was automatically created by [Allstar](https://github.com/ossf/allstar/)._
**Security Policy Violation**
Branch Protection enforcement is configured in Allstar, however Branch Protection …
-
Title. I use ZetX constantly. It's one of the more reliable tools, and it's free.
-
leverage a policy enforcement point for abstraction of the generation of the identifier
-
In an [usage control enforcement project](https://github.com/woutslabbinck/ucp-enforcement), I am trying to use ODRL as a language as policy language for CRUD decisions.
To the best of my knowledge…
-
**What steps did you take and what happened:**
Not able to prevent namespace deletion. Below are my OPA Gatekeeper version and constrainttemplate.
**What did you expect to happen:**
I expect…