When over 20% of Terraform templates and over 40% of CloudFormation templates are misconfigured, that’s a big task. Misconfigurations in templates can lead to real risks in production, such as SSH ports open to the world and unencrypted databases.

To simplify things for developers, declarative IaC tools can interpret and deploy infrastructure no matter what order it is in in the template.

This customized policy or any others you build can be added to Checkov for every scan by adding it to the appropriate folder in /checkov/{provider}/checks/.

We’ve extended the types of templates, moved to a new backend architecture and dramatically expanded the number of policies.

Related Articles