Using Gatekeeper to Secure your Environment

that did not follow best practices?  That is essentially what Gatekeeper does. You can define your requirements using constraints, which are a combination of configuration details (constraints) as well as corresponding code in a language called rego (constraint...