“Policy is not enforcement. Policy is proof.
Every DENY is a witness. Every ADMIT is a contract.”
| DIMENSION | CEDAR | OPA / REGO |
|---|---|---|
| Design intent | Authorization decisions only | General policy evaluation |
| Input model | Principal + Action + Resource + Context | Any JSON |
| Language | Cedar (new DSL) | Rego (Datalog-inspired) |
| Formal verification | ✓ DRT tested, Lean4-provable | ✗ No formal spec |
| k8s admission | ✓ cedar-access-control-for-k8s | ✓ Gatekeeper (OPA) |
| Performance | ✓ Rust core — sub-millisecond | ✓ Fast but GC (Go) |
| Learning curve | Medium (new DSL) | High (Rego is unusual) |
| EOSE relevance | Auth layer (who can do what) | Policy layer (is manifest correct) |
| Fleet role | L5 Policy gate (identity/authz) | L5 Policy gate (config/compliance) |
| Sovereign | Apache 2.0, can self-host | Apache 2.0, can self-host |
| ENGINE | K (Knowledge) | C (Coherence) | F (Flow) | KCF SCORE | TIER |
|---|---|---|---|---|---|
| OPA/Rego | 9/10 — 10yr corpus, CNCF, full docs | 8/10 — Rego is consistent | 8/10 — active ecosystem | 8.3 | DIAMOND |
| Cedar | 8/10 — formal spec, AWS production | 9/10 — purpose-built, clear model | 7/10 — newer, less tooling | 8.0 | DIAMOND |
| Kyverno | 7/10 — k8s-only scope | 8/10 — YAML = familiar | 8/10 — easy CI integration | 7.7 | DIAMOND |
| Conftest | 8/10 — wraps OPA, file-native | 8/10 — clear file→policy model | 9/10 — git CI natural fit | 8.3 | DIAMOND |
| Falco | 8/10 — eBPF, kernel-level | 7/10 — rule syntax complex | 7/10 — good but needs tuning | 7.3 | DIAMOND |
| Tetrate tools | 6/10 — Envoy/Istio focused | 7/10 — coherent Envoy story | 6/10 — requires full Istio | 6.3 | WATCH |
| VIOLATION CLASS | COUNT | COST/ITEM | PROB | RESERVE |
|---|---|---|---|---|
| No memory limits | 68 | 2hr fix | 0.9 | CA$244 |
| No liveness probe | ~40 | 1hr fix | 0.8 | CA$96 |
| Latest tag usage | ~12 | 0.5hr fix | 0.7 | CA$25 |
| Privileged containers | ~3 | 4hr fix | 0.6 | CA$43 |
| No HEALTHCHECK (Docker) | ~25 | 1hr fix | 0.8 | CA$60 |
| No DMARC/SPF (mail) | 2 | 3hr fix | 1.0 | CA$18 |
| TOTAL POLICY RESERVE | ~150 violations | CA$75/hr EOSE Labs rate | CA$486 | |
email in allowlist → service accessThis replaces email allowlists with structured Cedar policies. Every API call to the fleet = Cedar evaluation. Verdict = ADMIT/DENY. Logged. Indexed by PEMCLAU.
perl run-all.pl /home/ubu-cap/openclaw-fleet/fleet-sync/mefine
helm install cedar-authz cedar-policy/cedar-access-control
conftest-eose report --json → generates COI JSON
conftest (pre) → Gatekeeper (admit) → Kyverno (admit) → Falco (runtime)