regula
Regula checks infrastructure as code templates (Terraform, CloudFormation, k8s manifests) for AWS, Azure, Google Cloud, and Kubernetes security and compliance using Open Policy Agent/Rego (by fugue)
sato
Sato converts ARM or CFN into Terraform (by JamesWoolfenden)
regula | sato | |
---|---|---|
3 | 1 | |
933 | 77 | |
1.0% | - | |
3.4 | 6.9 | |
5 days ago | 16 days ago | |
Open Policy Agent | Go | |
Apache License 2.0 | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
regula
Posts with mentions or reviews of regula.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-12-11.
-
Top 10 terraform tools you should know about.
Regula is a dynamic tool designed for pre-deployment security and compliance checks of infrastructure as code (IaC) for multiple cloud providers and Kubernetes. It supports an array of file types, including CloudFormation JSON/YAML templates, Terraform source code and JSON plans, Kubernetes YAML manifests, and Azure Resource Manager (ARM) JSON templates (currently in preview). Regula leverages a rule library written in Rego, the language used by the Open Policy Agent (OPA) project, offering robust policy evaluation. It integrates seamlessly with popular CI/CD tools like Jenkins, Circle CI, and AWS CodePipeline, and even includes a GitHub Actions example for easy setup. Regula’s policies are aligned with CIS Benchmarks for AWS, Azure, Google Cloud, and Kubernetes, aiding in comprehensive compliance assessments. This tool is actively developed and maintained by the team at Fugue.
-
Regula v1.0 is Now Available — Open Source Infrastructure as Code Security
Regula on Github: https://github.com/fugue/regula
-
Best static code analysis tool for Terraform?
Fugues Regula is built on OPA. It’s worth a look. https://github.com/fugue/regula
sato
Posts with mentions or reviews of sato.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-12-11.
-
Top 10 terraform tools you should know about.
Sato is a conversion tool designed to translate CloudFormation and ARM (Azure Resource Manager) templates into Terraform configurations. Developed in Go, Sato stands out for its speed and efficiency in this conversion process. By automating the translation of existing templates into Terraform’s syntax, Sato facilitates a smoother and quicker migration to Terraform’s ecosystem.
What are some alternatives?
When comparing regula and sato you can also consider the following projects:
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
terragrunt - Terragrunt is a thin wrapper for Terraform that provides extra tools for working with multiple Terraform modules.
gitlab
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
tflint - A Pluggable Terraform Linter