diff --git a/chart/templates/kyverno/policies/values.yaml b/chart/templates/kyverno/policies/values.yaml
index a3c1c75dd1026373c08e2b3ceb0630859a46fa6a..39e1afdaf82a2f52b888ff7847b7f5b345c5fb2d 100644
--- a/chart/templates/kyverno/policies/values.yaml
+++ b/chart/templates/kyverno/policies/values.yaml
@@ -121,84 +121,6 @@ policies:
       {{- end }}
   {{- end }}
 
-{{- if or (.Values.addons.gitlab.enabled) (and (dig "console" "localVolumeUpgrade" false .Values.twistlock.values) (.Release.IsUpgrade)) .Values.addons.keycloak.enabled }}
-  disallow-shared-subpath-volume-writes:
-    # Subpath volumes can be used in combination with symlinks to break out into the host filesystem
-    exclude:
-      any:
-      - resources:
-          namespaces:
-          {{- if .Values.addons.gitlab.enabled }}
-          - gitlab
-          {{- end }}
-          {{- if (dig "console" "localVolumeUpgrade" false .Values.twistlock.values) }}
-          - twistlock
-          {{- end }}
-          {{- if .Values.addons.keycloak.enabled }}
-          - keycloak
-          {{- end }}
-          names:
-          {{- if (dig "console" "localVolumeUpgrade" false .Values.twistlock.values) }}
-          - volume-upgrade-job*
-          {{- end }}
-          {{- if .Values.addons.gitlab.enabled }}
-          # Volume `toolbox-secrets` is an emptyDir mounted read/write in initContainer `configure`
-          # It is also mounted in the container `toolbox` using a subPath, making it open to the
-          # vulnerability.  The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume.  The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-toolbox*
-          # Volume `sidekiq-secrets` is an emptyDir mounted read/write in initContainer `configure`
-          # It is also mounted in the containers `sidekiq` and `dependencies` using a subPath,
-          # making it open to the vulnerability.  The initContainer uses a shell script, stored in
-          # a configmap, to copies values from a readOnly projected volume holding secrets/configmap
-          # items, into the shared volume.  The shared volume is mounted with subpaths pointing to
-          # specific files in the container.
-          - gitlab-sidekiq*
-          # Volume `webservice-secrets` is an emptyDir mounted read/write in initContainer `configure`
-          # It is also mounted in the containers `webservice` and `dependencies` using a subPath,
-          # making it open to the vulnerability.  The initContainer uses a shell script, stored in
-          # a configmap, to copies values from a readOnly projected volume holding secrets/configmap
-          # items, into the shared volume.  The shared volume is mounted with subpaths pointing to
-          # specific files in the container.
-          - gitlab-webservice-default*
-          # Volume `migrations-secrets` is an emptyDir mounted read/write in initContainer `configure`
-          # It is also mounted in the container `migrations` using a subPath, making it open to the
-          # vulnerability.  The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume.  The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-migrations*
-          # Volume `etc-ssl-certs` is an emptyDir mounted read/write in initContainer `certificates`
-          # It is also mounted in the container `registry` using a subPath, making it open to the
-          # vulnerability. The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume. The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-registry*
-          # Volume `etc-ssl-certs` is an emptyDir mounted read/write in initContainer `certificates`
-          # It is also mounted in the container `gitlab-exporter` using a subPath, making it open to the
-          # vulnerability. The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume. The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-gitlab-exporter*
-          # Volume `etc-ssl-certs` is an emptyDir mounted read/write in initContainer `certificates`
-          # It is also mounted in the container `gitlab-shell` using a subPath, making it open to the
-          # vulnerability. The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume. The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-gitlab-shell*
-          # Volume `etc-ssl-certs` is an emptyDir mounted read/write in initContainer `certificates`
-          # It is also mounted in the container `gitaly` using a subPath, making it open to the
-          # vulnerability. The initContainer uses a shell script, stored in a configmap, to copies
-          # values from a readOnly projected volume holding secrets/configmap items, into the shared
-          # volume. The shared volume is mounted with subpaths pointing to specific files in the container.
-          - gitlab-gitaly*
-          {{- end }}
-          {{- if .Values.addons.keycloak.enabled }}
-          # Volumes using emptyDir shared with initContainers to inject custom provider plugins or custom themes
-          - keycloak-*
-          {{- end }}
-  {{- end }}
-
   {{- if or .Values.fluentbit.enabled .Values.monitoring.enabled .Values.twistlock.enabled }}
   disallow-tolerations:
     exclude:
diff --git a/chart/values.yaml b/chart/values.yaml
index 77dfb10e2a532c7666a4009eaeec154a29259dd1..a48100367bff659095d53757f4416bd63f069fcd 100644
--- a/chart/values.yaml
+++ b/chart/values.yaml
@@ -399,7 +399,7 @@ kyvernopolicies:
   git:
     repo: https://repo1.dso.mil/platform-one/big-bang/apps/sandbox/kyverno-policies.git
     path: ./chart
-    tag: "1.0.1-bb.12"
+    tag: "1.1.0-bb.0"
 
   # -- Flux reconciliation overrides specifically for the Kyverno Package
   flux: {}
diff --git a/tests/test-values.yaml b/tests/test-values.yaml
index efd997b723ecc49f03cb2aa4c8c4f62d8f5bcc70..9fca696b74e16e53c45a1258005ed2af4f8af474 100644
--- a/tests/test-values.yaml
+++ b/tests/test-values.yaml
@@ -395,25 +395,8 @@ kyvernopolicies:
           - 'kyverno-policies-bbtest/test: required'
           - kyverno-policies-bbtest/required
       require-image-signature:
-        # Policy needs to be disabled in CI when two matches/attestors are present due to a bug where all matching images are checked against all attestors
-        # https://github.com/kyverno/kyverno/pull/5956
-        enabled: false
         parameters:
           require:
-          - imageReferences:
-            - "registry1.dso.mil/ironbank/*"
-            attestors:
-            - count: 1
-              entries:
-              - keys:
-                  publicKeys: |-
-                    -----BEGIN PUBLIC KEY-----
-                    MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7CjMGH005DFFz6mffqTIGurBt6fL
-                    UfTZxuEDFRBS8mFJx1xw8DEVvjMibLTtqmAoJxUmzmGFgzz+LV875syVEg==
-                    -----END PUBLIC KEY-----
-            # Ironbank images are rebuilt nightly and tags are not immutable
-            mutateDigest: false
-            verifyDigest: false
           - imageReferences:
             - "ghcr.io/kyverno/test-verify-image:*"
             attestors:
@@ -425,6 +408,20 @@ kyvernopolicies:
                     MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE8nXRh950IZbRj8Ra/N9sbqOPZrfM
                     5/KAQN0/KjHcorm/J5yctVd7iEcnessRQjU917hmKO6JWVGHpDguIyakZA==
                     -----END PUBLIC KEY-----
+          # - imageReferences:
+          #   - "registry1.dso.mil/ironbank/*"
+          #   attestors:
+          #   - count: 1
+          #     entries:
+          #     - keys:
+          #         publicKeys: |-
+          #           -----BEGIN PUBLIC KEY-----
+          #           MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE7CjMGH005DFFz6mffqTIGurBt6fL
+          #           UfTZxuEDFRBS8mFJx1xw8DEVvjMibLTtqmAoJxUmzmGFgzz+LV875syVEg==
+          #           -----END PUBLIC KEY-----
+          #   # Ironbank images are rebuilt nightly and tags are not immutable
+          #   mutateDigest: false
+          #   verifyDigest: false
       require-labels:
         parameters:
           require: