checkov
OPA (Open Policy Agent)
checkov | OPA (Open Policy Agent) | |
---|---|---|
63 | 105 | |
7,670 | 10,400 | |
1.2% | 1.3% | |
9.9 | 9.8 | |
2 days ago | 3 days ago | |
Python | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
checkov
-
Ditched Terraform for OpenTofu. Why Devs Everywhere Are Making the Same Move (cheatsheet included)
Checkov https://www.checkov.io A static analysis tool to scan infrastructure code for misconfigs, secrets, and best practice violations.
-
Custom Security Checks for AWS Cloud Control Provider with Checkov
PR #6647
-
DevOps in 2025: the future is automated, git-ified, and kinda scary but fun.
Checkov infrastructure-as-code misconfig detection
-
Boas Práticas de Segurança e Qualidade no Terraform.
Link do repo
-
Top Terraform/OpenTofu tools to Use in 2025
Link: https://github.com/bridgecrewio/checkov
-
Terraform Cookbook: Development Environment Recipe
Checkov: static analysis for IaC
-
Building Web Applications Using Amazon EKS : AWS Project
Prior to deploying kubernetes manifest files to EKS Cluster, supplementary steps need to be added to prevent security and misconfiguration issue by using both *Checkov *and Trivy . Also, we will use seperate ArgoCD account from admin user that we’ve used in the previous lab. This will follow ArgoCD RBAC rule to secure ArgoCD and EKS cluster ultimately.
-
Automating Snowflake Resource Deployment using Terraform and GitHub Actions
The workflow also includes a step for infrastructure code scan to scan Terraform code. This uses Checkov action against infrastructure-as-code, open source packages, container images, and CI/CD configurations to identify misconfigurations, vulnerabilities, and license compliance issues.
-
Cloud Security and Resilience: DevSecOps Tools and Practices
1. Checkov: https://github.com/bridgecrewio/checkov Checkov is a static code analysis tool that helps developers prevent cloud misconfigurations during the development phase by scanning Terraform, CloudFormation, Kubernetes, and more.
-
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
Checkov Owner/Maintainer: Prisma Cloud by Palo Alto Networks (acquired in 2021) Age: First released on GitHub on March 31st, 2021 License: Apache License 2.0
OPA (Open Policy Agent)
-
Ditched Terraform for OpenTofu. Why Devs Everywhere Are Making the Same Move (cheatsheet included)
OPA (Open Policy Agent) https://www.openpolicyagent.org Add policy checks and guardrails to your Terraform/OpenTofu plans without hardcoding rules.
-
Implementing Logic Programming
The only production experience I have with logic programming is OPA Rego for writing security policies (not sure it's a "pure" logic language but feels like the primary paradigm).
I found it pretty interesting for that use case, although the learning curve isn't trivial for traditional devs.
https://www.openpolicyagent.org/
-
Show HN: Infrabase: Natural language rules engine to manage your cloud account
Policy-as-code is one of those things that everyone knows should be done, but in practice is rarely implemented.
We believe this is caused by the combination of the following 2 factors:
- OPA [1] and tools like cloud custodian [2] are cumbersome to set up, so writing even a single policy/ setting it up in your organisation takes a lot of effort.
- Each policy project needs to start from scratch because policies aren't re-usable
Infrabase checks your infra with an LLM instead of policies directly (currently a combination of gemini-2.5-pro-preview-05-06 and o4-mini). You can write your own policies as natural language [3] prompts to customize behaviour.
This is still early: non-determinism and latency are open problems. But for most teams, “some guard-rails today” beats “perfect rego never”, and llm's are only getting better.
We'd love your feedback on it!
[1] OPA: https://github.com/open-policy-agent/opa
-
The synergy between DevOps and Cloud Computing
Security at scale: Automate secrets management with Vault, enforce policies using OPA.
-
Terraform drift is breaking your cloud: here’s how to stop the chaos
OPA (Open Policy Agent) Policy-as-code framework to enforce infra rules
-
DevOps in 2025: the future is automated, git-ified, and kinda scary but fun.
Policy-as-code with tools like OPA
-
AWS Lambda RIC - Runtime interface Client
Perfect for bundling extensive resources like opa policies
-
Authorization (authz) and GraphQL
External Authorization System Using Policy engines like SpiceDB, OpenFGA, ORY Keto, OpenPolicy Agent (OPA), let you put your ReBAC rules in an external system and reference them from your queries. The main benefit you get from the centralized relationships model is it makes it possible to manage authorization centrally. This means that development teams can create new applications and add new relationships without needing to update any application code.
-
Kubernetes Multi-Cloud Multi-Cluster Strategy Overview
Going multicloud and multi-cluster can make it harder to maintain continual oversight of your security posture. Different clouds and cluster distributions may have their own security defaults and policy engines, so you need a mechanism that permits you to centrally roll out new configurations and compliance controls. Standardizing on a well-supported policy model such as Open Policy Agent (OPA) will make it easier to apply consistent settings to all your environments.
-
5 Use Cases for Using Open Policy Agent
Open Policy Agent is an open-source policy engine recently graduated by the Cloud Native Computing Foundation (CNCF). Developed by the community and maintained by Styra, the OPA project aims to offer a unified framework to define, manage, and enforce policies through policies-as-code (PaC) across the technology stack layers of cloud-native applications.
What are some alternatives?
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
kics - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
cerbos - Cerbos is the open core, language-agnostic, scalable authorization solution that makes user permissions and authorization simple to implement and manage by writing context-aware access control policies for your application resources.
tflint - A Pluggable Terraform Linter
casbin - An authorization library that supports access control models like ACL, RBAC, ABAC in Golang: https://discord.gg/S5UjpzGZjN