Key features
- Policy testing for Kubernetes, Terraform, Dockerfile, Helm, and JSON/YAML
- OPA Rego policy language with full logic expression capability
- CI/CD integration with non-zero exit on policy violation
- Policy distribution via OCI registries for centralized APAC governance
- Multiple output formats (table, JSON, TAP) for different CI/CD systems
- Namespace support for organizing APAC policy libraries
Best for
- APAC platform engineering teams who want to enforce infrastructure compliance standards in CI/CD pipelines before Kubernetes or Terraform configurations reach production.
Limitations to know
- ! Rego policy language has a learning curve for APAC teams unfamiliar with OPA
- ! Pre-deployment only — does not enforce at runtime (use Gatekeeper for that)
- ! Policy management at scale requires OCI registry or dedicated policy repo strategy
About Conftest
Conftest is an open-source command-line tool that enables APAC platform engineering teams to test configuration files — Kubernetes manifests, Terraform plans, Dockerfiles, Helm charts, and JSON/YAML configs — against policies written in Open Policy Agent (OPA) Rego. APAC teams integrate Conftest into CI/CD pipelines to enforce infrastructure compliance standards before any configuration reaches a cluster or production environment.
Conftest enables APAC platform teams to codify their organization's infrastructure standards as version-controlled Rego policies: Kubernetes resources must define CPU/memory limits, container images must come from approved APAC registries, Terraform resources must apply required tags, and Dockerfiles must not run as root. These policies run in CI/CD as part of pull request validation, providing immediate feedback to APAC developers before their infrastructure changes are merged.
The tool supports multiple configuration file formats (YAML, JSON, TOML, HCL, Dockerfile, CUE, Jsonnet) and can evaluate policies stored in OCI registries for centralized APAC policy distribution. Conftest pairs naturally with OPA/Gatekeeper for runtime enforcement — Conftest catches violations pre-deployment, Gatekeeper enforces the same policies at the Kubernetes API server in production.
Beyond this tool
Where this category meets practice depth.
A tool only matters in context. Browse the service pillars that operationalise it, the industries where it ships, and the Asian markets where AIMenta runs adoption programs.
Other service pillars
By industry