Discover, share, and deploy CEL-based security rules for Kubernetes. Powered by Spotter engine for comprehensive security analysis across the entire Kubernetes lifecycle.
The most comprehensive registry for Kubernetes security policies with enterprise-grade features
Leverage Common Expression Language for powerful, flexible security policies that work across the entire Kubernetes lifecycle with unmatched precision.
Pre-built compliance packs for CIS, NIST, SOC2, and other security frameworks. Deploy comprehensive security policies instantly with confidence.
Convert Spotter rules to ValidationAdmissionPolicy format for seamless native Kubernetes integration and real-time enforcement.
Optimized for performance with instant rule deployment
Built by security experts from around the world
Production-tested rules used by Fortune 500 companies
100% open source with no hidden costs or limitations
Explore our most downloaded and trusted security policies
Implements CIS Kubernetes Benchmark controls for v1.30.
Implements NIST 800-53 controls.
Implements NSA Kubernetes Hardening Guide controls.
Join thousands of security professionals using battle-tested policies. Start securing your infrastructure in minutes, not months.