OZG 2.0 & EfA: The Technical Architecture for the Digital State
The goal of the Online Access Act is ambitious: all administrative services should be digitally …

TL;DR
Kubernetes is permissive by default: it allows developers almost anything, including insecure configurations (e.g., running containers as “Root”). To prevent this, policy engines like OPA Gatekeeper were needed, which require a steep learning curve (Rego programming language). Kyverno democratizes security. It is a policy engine built for Kubernetes. Policies are simple YAML. Kyverno can not only block (validation) but also actively fix resources (mutation) and generate default configurations (generation) without developers having to change their workflow.
The biggest hurdle for governance in Kubernetes was the language. The industry standard Open Policy Agent (OPA) uses Rego, a complex query language. Anyone wanting to write a rule (“No LoadBalancers without a cost center”) had to learn programming.
Kyverno changes the paradigm: Kubernetes-native Policies.
kubectl apply) is checked by Kyverno before being written to the database (etcd).Most policy tools can only say “No” (validation). This frustrates developers (“Deployment failed”). Kyverno is more constructive.
team: marketing? Instead of rejecting the deployment, Kyverno automatically adds the label. An image has no tag (:latest)? Kyverno changes it at runtime to the specific digest SHA.NetworkPolicies, ResourceQuotas, and Secrets for the image registry. This enables true self-service without security gaps.Kyverno is the guardian of your software supply chain. In combination with tools like Cosign (Sigstore), Kyverno checks cryptographic signatures.
You can define a policy: “Only run images signed by our CI pipeline.”
Even if an attacker gains access to the cluster and tries to start a malicious container, Kyverno blocks the request because the signature is missing.
Here it is decided whether governance remains a theoretical concept or becomes a lived practice.
Scenario A: OPA Gatekeeper (The Expert Hurdle)
Gatekeeper is powerful but cumbersome.
Scenario B: Kyverno with Managed Kubernetes by ayedo
In the ayedo app catalog, Kyverno is the standard for security.
kubectl get clusterpolicy and immediately understand what is allowed and what is not. Security becomes transparent.| Aspect | OPA Gatekeeper (Legacy Standard) | ayedo (Managed Kyverno) |
|---|---|---|
| Language | Rego (Complex logic language) | YAML (Kubernetes Native) |
| Capabilities | Validation (+ limited mutation) | Validation, Mutation, Generation |
| Learning Curve | Steep (Expert knowledge needed) | Flat (K8s knowledge sufficient) |
| Supply Chain | Via plugins (Ratify etc.) | Native (Image Verification) |
| Reporting | External tools needed | CRDs (PolicyReport) integrated |
| Strategic Risk | High maintenance effort | High acceptance (Dev-Friendly) |
Does Kyverno slow down my cluster?
Kyverno operates as a webhook. Yes, it adds a tiny latency (milliseconds) when creating resources. It has zero impact on the running performance of the application. Kyverno is highly optimized and uses caching to avoid slowing down API calls.
Can I introduce Kyverno without blocking everything?
Yes, that is the recommended way. You first set policies to Audit mode. Kyverno then lets everything through but creates reports on violations. This way, you see which deployments would fail. Only when you are sure, you switch to Enforce.
Does Kyverno replace Pod Security Policies (PSP)?
Yes. Pod Security Policies were removed in Kubernetes v1.25. Kyverno (or the integrated Pod Security Admission Controller) is the official successor. Kyverno is significantly more flexible and granular than the old PSPs.
What happens in an emergency (Break Glass)?
Kyverno can be configured so that certain users (e.g., cluster-admin in an emergency group) are exempt from the policies. Additionally, the webhook can be set (failurePolicy: Ignore) so that in a total Kyverno failure, the cluster still accepts deployments (Fail Open) to ensure operations.
Security must be simple, or it will be bypassed. OPA Gatekeeper has served well for years, but it is too complex for many teams (“Over-Engineering”). Kyverno brings governance back to reality – with understandable YAML and powerful features like mutation and generation. With the ayedo Managed Stack, you get a policy engine that not only says “No” but actively keeps your cluster clean, secure, and compliant – automatically and transparently.
The goal of the Online Access Act is ambitious: all administrative services should be digitally …
TL;DR Secrets (API keys, database passwords) do not belong in Git code, but their runtime …
Until now, monitoring was often a compromise: Those who wanted to know exactly what was happening …