The usage of Kubernetes continues to grow for most organizations. HashiCorp Terraform is used to simplify the Kubernetes deployment and management process by defining the necessary components as code. This can also be taken a step further by configuring guardrails, which help to protect infrastructure changes that may go against the business’ policies or don’t follow regulatory policies. Similarly to the infrastructure, we can define these policies as code with Sentinel.
To aid in the creation of new policies, we recently released a preview of the Terraform Foundational Policies Library for HashiCorp Terraform Cloud and Enterprise. This fantastic new resource of first-class controls serves to enable our customers to establish a consistent level of security across their workloads using policy as code with Sentinel. The initial set of 50 policies are based on controls, as defined by the Center for Internet Security Benchmarks, for some of the major cloud providers.
The following video walks through the configuration of three policies, which were defined by CIS Benchmarks, and made available as part of the Terraform Foundational Policies Library and how to apply them to a GKE configuration.
If you would like to know more about the Terraform Foundational Policies Library or how to get started with additional policies, please review the documentation. To learn more about using Terraform with Sentinel, visit the HashiCorp Learn Platform.
For more information on Terraform Cloud and Enterprise visit the Terraform product page or to get started today, sign-up for a Terraform Cloud account.
A recap of HashiCorp infrastructure and security news and developments from Google Cloud Next, from scaling infrastructure as code to fighting secrets sprawl and more.
New in Terraform 1.8: Provider-defined functions let users extend Terraform with custom capabilities. Plus, refactoring can now be done across resource types.
See usage examples of Terraform 1.8's new launch-day provider-defined functions for AWS, Google Cloud, and Kubernetes.