
Styra Declarative Authorization Service
Policy as Code Control Plane by Styra
Styra DAS has native support for the validation of Terraform code and
plans via a prebuilt ‘system-type’, this is
documented here.
View Details
Conftest
Rego policy for configuration files
Conftest has generic support for Terraform source files defined in HCL.
There is an example provided here on
GitHub.
View Conftest Details
env0
env0 is a Terraform automation platform that allows you to manage your
infrastructure as code (IaC) at scale. It has a built-in integration with
OPA. See docs here.
View env0 Details
Scalr
Policy enforcement for Terraform by Scalr
These policies can be run using OPA at the command line against a
Terraform plan JSON. See
the example
in the README.
View Scalr Details
Spacelift
Spacelift supports Rego as a language to describe policies for Terraform
JSON plans.
This blog
outlines how the integration works.
View Spacelift Details
Torque
Torque supports Terraform policy enforcement and defines some
sample policies here.
View Torque Details
Atmos
Atmos can validate Terraform stack before applying them. This is done
using the
View Atmos Detailsvalidate component
command
documented here.
Terraform Cloud
Terraform cloud has native support for enforcing Rego policy on plans.
The feature is documented here.
View Terraform Cloud DetailsIntegrations are ordered by the amount of linked content.