Reference
Network Requirements
Using Chainguard Images and Enforce with firewalls, access control lists, and proxies
Overview of the Chainguard IAM ModelOverview of Chainguard Identity and Access Management
Rego PoliciesWriting Rego-based policies for Chainguard Enforce
CISA Secure Software Development Attestation Form (Draft)Secure Software Development Framework (SSDF) Table, NIST SP 800-218Minimum Attestation ReferencesExample PoliciesChainguard Enforce for Kubernetes policy recipes