Skip to content

grafeas/kritis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

3348562 · Oct 20, 2022
Jun 22, 2020
Jul 2, 2021
Dec 14, 2020
Dec 13, 2020
Oct 10, 2022
Jan 4, 2021
Jan 6, 2020
Jul 30, 2018
Oct 10, 2022
Jan 9, 2020
Sep 21, 2018
Sep 17, 2021
Oct 10, 2022
Jan 4, 2021
Jun 28, 2018
Aug 20, 2018
Dec 8, 2020
Jan 9, 2020
Jan 23, 2020
Jun 15, 2020
Jan 22, 2020
May 7, 2020
Jan 7, 2021
Sep 17, 2021
Jun 22, 2020
Jun 7, 2021
Jan 4, 2021
Jan 4, 2021

Repository files navigation

Kritis

GoDoc Widget [BuildStatus Widget][BuildStatus Result] GoReport Widget

Kritis logo

Kritis (“judge” in Greek), is an open-source solution for securing your software supply chain for Kubernetes applications. Kritis enforces deploy-time security policies using the Google Cloud Container Analysis API, and in a subsequent release, Grafeas.

Here is an example Kritis policy, to prevent the deployment of Pod with a critical vulnerability unless it has been allowlisted:

imageAllowlist:
- gcr.io/my-project/allowlist-image@sha256:<DIGEST>
packageVulnerabilityPolicy:
  maximumSeverity: HIGH
  allowlistCVEs:
    - providers/goog-vulnz/notes/CVE-2017-1000082
    - providers/goog-vulnz/notes/CVE-2017-1000081

In addition to the enforcement this project also contains signers that can be used to create Grafeas Attestation Occurrences to be used in other enforcement systems like Binary Authorization. (TODO#571: add doc and fix link) For details see upcoming doc Kritis Signer.

Getting Started

Support

If you have questions, reach out to us on kritis-users. For questions about contributing, please see the section below.

Contributing

See CONTRIBUTING for details on how you can contribute.

See DEVELOPMENT for details on the development and testing workflow.

License

Kritis is under the Apache 2.0 license. See the LICENSE file for details.