Automation to assess the state of your M365 tenant against CISA's baselines
-
Updated
May 31, 2024 - Open Policy Agent
The Open Policy Agent (OPA, pronounced “oh-pa”) is an open source, general-purpose policy engine that unifies policy enforcement across the stack. OPA provides a high-level declarative language that lets you specify policy as code and simple APIs to offload policy decision-making from your software. You can use OPA to enforce policies in microservices, Kubernetes, CI/CD pipelines, API gateways, and more.
What is OPA
Automation to assess the state of your M365 tenant against CISA's baselines
Write tests against structured configuration data using the Open Policy Agent Rego query language
Regal is a linter for Rego, with the goal of making your Rego magnificent!
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Enterprise OPA is a distribution of Open Policy Agent with enterprise-grade features to get OPA into production quickly, easily, and inexpensively.
Conftest Policy for Pod Security Standards
SCuBA Security Configuration Baselines and assessment tool for Google Workspace
Policy and data administration, distribution, and real-time updates on top of Policy Agents (OPA, Cedar, ...)
The Styra-supported driver to connect to Open Policy Agent (OPA) and Enterprise OPA deployments
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
The Styra-supported driver to connect to Open Policy Agent (OPA) and Enterprise OPA deployments.
An implementation of Envoy External Authorization
Style guide for Rego
Audit Dependency-Track findings and policy violations via policy as code
A policy management tool for interacting with Gatekeeper
Open Policy Agent WebAssembly NPM module (opa-wasm)
The Styra-supported driver to connect to Open Policy Agent (OPA) and Enterprise OPA deployments
📦 Ready-to-use Docker container image with cloud tools (AWS CLI, Google Cloud CLI, Terraform, Packer, Ansible)
Traefik plugin which checks JWT tokens for required fields. Supports Open Policy Agent (OPA) and signature validation with JWKS