OSS Kubernetes-native policy engine. Apache-2.0 under CNCF. Validates, mutates, generates K8s resources via declarative YAML policies (no Rego required). Strong fit for K8s admission control, image trust, and supply-chain security.
Kyverno is the OSS Kubernetes-native policy engine — Apache-2.0 license under CNCF. Validates, mutates, generates K8s resources via declarative YAML policies (no Rego required). Pick Kyverno for K8s-native policy where YAML ergonomics beat OPA Gatekeeper's Rego DSL.
Kyverno's K8s-native + YAML-first design creates the lowest-friction policy primitive for K8s workloads. From a Trust Before Intelligence lens, this is the right tool for K8s admission control: image trust, supply-chain security, namespace isolation, network policies — all expressible in YAML. Distinct from Cerbos (app-authz) and OPA (general policy).
Admission webhook overhead sub-50ms.
Native YAML policies — no Rego.
K8s RBAC + Kyverno policies.
K8s-only. Cap rule N/A.
Policy reports + admission logs.
Audit + reports + OpenTelemetry.
Governance specialty. 4/6 -> 5.
Reports. 2/6 -> 4 lenient.
5/6 -> 4.
1/6 -> 3.
5/6 -> 4.
Best suited for
Compliance certifications
OSS Apache-2.0; substrate compliance via K8s.
Use with caution for
OPA for general-purpose policy. Kyverno for K8s-native YAML.
View analysis →Cerbos for app-authz. Kyverno for K8s policy.
View analysis →Role: L5 K8s policy engine.
Upstream: K8s admission requests.
Downstream: Allow/deny + audit + reports.
Mitigation: Right-tool: Kyverno for K8s admission; Cerbos for app-authz; OPA for general policy.
Kyverno's specialty.
Cerbos fits.
This analysis is AI-generated using the INPACT and GOALS frameworks from "Trust Before Intelligence." Scores and assessments are algorithmic and may not reflect the vendor's complete capabilities. Always validate with your own evaluation.