Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for Terraform IAC [Enhancement] #303

Closed
cool-raj opened this issue Nov 9, 2022 · 3 comments
Closed

Support for Terraform IAC [Enhancement] #303

cool-raj opened this issue Nov 9, 2022 · 3 comments
Labels
enhancement New feature or request

Comments

@cool-raj
Copy link

cool-raj commented Nov 9, 2022

Is your feature request related to a problem? Please describe.
I would like to use a CFN-guard as a single tool to validate/test my IAC ( writen in Cloudformation,CDK,teraform) against the one time defined cfn guard rules. I see so many tools in available but no one is addressing the issue apart from Regula .
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]

Describe the solution you'd like
My ideal solution would be . Security team/Compliance team defines the rule in the rule format by the tool
A clear and concise description of what you want to happen.

Describe alternatives you've considered

A clear and concise description of any alternative solutions or features you've considered.

Additional context

Add any other context or screenshots about the feature request here.

@cool-raj cool-raj added the enhancement New feature or request label Nov 9, 2022
@benbridts
Copy link
Contributor

Would converting from HCL to JSON (like https://www.hcl2json.com/), so you can write Terraform-specific checks help?

@SWolfeCAI
Copy link

I would also see a lot of value in being able to guard against raw HCL. Specifically I'd like to add guards to ensure best practices and our enterprise standards related to the terraform block.

Converting to JSON might be viable--but anecdotally I haven't had much success with 3rd party tools working as-needed and/or not breaking with terraform updates.

Our enterprise has well over 50,000 terraform modules--so one way or another I'd like to have the guard functionality to help avoid some simple pitfalls.

@razcloud
Copy link
Contributor

We have no plans to address this issue or add this to the roadmap at this point in time.

@razcloud razcloud closed this as not planned Won't fix, can't repro, duplicate, stale May 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants