added why not synk
This commit is contained in:
@@ -138,6 +138,9 @@ To achieve this, the architecture utilizes "Defense in Depth," split across seve
|
||||
### ❌ OPA Gatekeeper / Kyverno (Admission Control)
|
||||
* **Why it was rejected:** OPA requires learning an entirely new, complex logic language (Rego). While Kyverno uses simpler Kubernetes YAML, both were ultimately rejected in favor of NeuVector, which handles admission control natively within its existing UI as part of the unified SUSE ecosystem.
|
||||
|
||||
### ❌ Snyk Open Source
|
||||
* **Why it was rejected:** Redundant when utilizing Socket for malware detection and Grype for CVE scanning.
|
||||
|
||||
### ❌ Falco / Tetragon (Runtime Security)
|
||||
* **Why it was rejected:** Both are exceptional eBPF runtime security monitors. However, implementing them would require setting up custom alerting pipelines and separate visualizers. Because Harvester is a SUSE product, SUSE Security (NeuVector) was selected to provide equivalent runtime protection natively, keeping the tech stack consolidated.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user