<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ensuring Containers are Used Securely on</title><link>https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/</link><description>Recent content in Ensuring Containers are Used Securely on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Tue, 02 Sep 2025 10:00:00 +0000</lastBuildDate><atom:link href="https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/index.xml" rel="self" type="application/rss+xml"/><item><title>Kubernetes Policy Enforcement with OPA Gatekeeper</title><link>https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/opa-gatekeeper/</link><pubDate>Tue, 02 Sep 2025 10:00:00 +0000</pubDate><guid>https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/opa-gatekeeper/</guid><description>Gatekeeper is an admission controller that enforces policies in Kubernetes clusters. This article describes how it can be leveraged to ensure resources follow best practices related to the use of Chainguard Containers.
Prerequisites To follow the examples in this guide, you will need the following:
kubectl — the command line interface tool for Kubernetes — installed on your local machine. Administrative access to a Kubernetes cluster where OPA Gatekeeper is already installed.</description></item><item><title>Kubernetes Policy Enforcement with Kyverno</title><link>https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/kyverno/</link><pubDate>Fri, 26 Sep 2025 10:00:00 +0000</pubDate><guid>https://deploy-preview-3176--ornate-narwhal-088216.netlify.app/chainguard/chainguard-images/staying-secure/enforcement/kyverno/</guid><description>Kyverno is an admission controller that enforces policies in Kubernetes clusters. This article describes how it can be leveraged to ensure resources follow best practices related to the use of Chainguard Containers.
Prerequisites To follow the examples in this guide, you will need the following:
kubectl — the command line interface tool for Kubernetes — installed on your local machine. Administrative access to a Kubernetes cluster where Kyverno is already installed.</description></item></channel></rss>