# Kyverno Adopters This is the list of organizations and users that have publicly shared how they are using Kyverno. 💡 **Add your organization by creating a PR or [submitting this form](https://docs.google.com/forms/d/e/1FAIpQLSe1IBSxDFn_iAAq9vd0nQdjKbapvgGyM8j2IX_z4xSCu-OSNg/viewform)** Note: There are several other organizations and users that are unable to publicly share their stories but are active in the Kyverno community. We appreciate all our users and their contributions to making Kyverno a successful CNCF project. The list of organizations that have publicly shared the usage of Kyverno: | Organization | Success Story | |:--------------------------------------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [Amazon EKS Best Practice Guides](https://github.com/aws/aws-eks-best-practices/tree/master/policies/kyverno) | Policies for security and best practices | | [Arrikto Inc.](https://www.arrikto.com) | Kubeflow policies | | [Flux2](https://github.com/fluxcd/flux2-multi-tenancy#enforce-tenant-isolation) | Manage multi-tenancy and tenant isolation with GitOps | | [Nirmata](https://nirmata.com) | Kubernetes Policy and Governance | | [Ohio Supercomputer Center](https://www.osc.edu/) | Support Kubernetes multi-user workflows through [Open OnDemand](http://openondemand.org/) | | [Coinbase](https://www.coinbase.com/) | Use Kyverno for mutation, to replace hand-written Webhooks, and generation to project common Kubernetes objects into many similar namespaces. | | [Mandiant](https://www.mandiant.com/) | Use Kyverno for policy enforcement in all clusters, as well as part of our onboarding systems, populating new namespaces with requisite resources and secrets. | | [Giant Swarm](https://www.giantswarm.io/) | Use Kyverno extensively to handle defaulting logic on resources (primarily cluster-api resources) and some scenarios to replace PSPs to enforce certain restrictions. | | [Vodafone Group Plc](https://www.vodafone.com/) | Policy enforcement and automation on an internal k8s service offering. | | [Deutsche Telekom](https://www.telekom.com/en) | Use Kyverno to enforce Policies on managed clusters to prevent right escalation of internal customers and to enforce security rules. | | [VSHN AG - APPUiO Cloud](https://www.vshn.ch/) | OpenShift Multi-Tenancy Self-Service for [APPUiO Cloud](https://www.appuio.ch), managed with [Project Syn](https://syn.tools). Kyverno policies are available on [GitHub](https://github.com/appuio/component-appuio-cloud). | | [Bloomberg](https://www.techatbloomberg.com/) | Use Kyverno for replacing custom validation and mutation webhooks in their internal Kubernetes based platforms | | [Techcombank](https://www.techcombank.com.vn/trang-chu) | Use Kyverno to enforce security policies rules, Kubernetes best practices for their internal container based workload on Kubernetes | | [Trendyol](https://www.trendyol.com) | In adoption planning to roll out to hundreds of production clusters using GitOps | | [Rafay Systems](https://rafay.co/) | Platform supports centralized deployment of Kyverno across clusters | | [Wayfair](https://wayfair.com) | Policy enforcement on managed clusters. Replacement of some in-house mutating webhooks. | | [Yahoo](https://www.yahoo.com/) | Use Kyverno for mutation, to replace image tags to digest and also for validation for checking freshness of images. | | [T-Systems](https://www.t-systems.com) | | | [Red Hat](https://www.redhat.com) | Learn more about Red Hat Advanced Cluster Management for Kubernetes for [Generating Governance Policies Using Kustomize and GitOps](https://cloud.redhat.com/blog/generating-governance-policies-using-kustomize-and-gitops).| | [DE-CIX](https://www.de-cix.net) | Kyvernos policy enforcement is used to enforce the company's security guidelines. This is done using validation, mutation and generation techniques. | | [Saxo Bank](https://www.home.saxo/) | We use Kyverno to enforce security and best practises. | | [Velux](https://www.velux.com/) | We successfully use Kyverno in our clusters for security, best practice enforcement, resource mutation, secret copying and more! | | [HCS Company](https://www.hcs-company.com/) | Policy enforcement and enabling selfservice for DevOps teams. |