Reference

Network Requirements
Using Chainguard Images and Enforce with firewalls, access control lists, and proxies
Overview of the Chainguard IAM Model
Overview of Chainguard Identity and Access Management
Rego Policies
Writing Rego-based policies for Chainguard Enforce
CISA Secure Software Development Attestation Form (Draft)
Secure Software Development Framework (SSDF) Table, NIST SP 800-218
Minimum Attestation References
Example Policies
Chainguard Enforce for Kubernetes policy recipes