Infrastructure Governance & Security
Implement governance through Git workflows with automated policy enforcement. Use OPA policies, approval workflows, and audit trails for compliance.
Governance with automation
Secure collaboration without sacrificing velocity
Policy as Code
Enforce standards with OPA policies
- Native OPA integration
- Pre-plan & pre-apply checks
- Custom policy rules
Team-Based Access Control
Fine-grained permissions without complexity
- GitHub/GitLab team integration
- Workspace-level permissions
- Apply restrictions by team
Automated Security Checks
Security validation on every change
- Checkov security scanning
- OIDC authentication
- No stored credentials
Flexible Approval Workflows
Configure approvals based on your needs
- PR approval requirements
- Team-based approvals
- Conditional workflows
Cost Governance
Control infrastructure spending
- Infracost integration
- Cost-based policies
- Budget approval workflows
Complete Audit Trail
Track every change and decision
- Git-based audit history
- PR comment history
- Policy decision tracking
See governance in action
Watch how Terrateam enforces policies through PR workflows
Update production security group rules #89
TT
terrateam commented🔒 Policy Check Results
Security scan passed
No security vulnerabilities detected
Policy enforcement required
Changes to production require 2 approvals + security team review
OPA policies satisfied
All governance rules passed
security-lead approved these changes
infra-admin approved these changes
developer commented
terrateam apply
TT
terrateam commented✅ All governance checks passed!
Security policies: PASSED
Approval requirements: SATISFIED
Team permissions: VERIFIED
Resources: 1 added, 1 changed, 0 destroyed
🎉 Changes applied with full governance compliance!
Flexible governance policies
Team-based access control
# Role-based permissions
access_control:
policies:
- tag_query: "dir:production"
plan: ["*"]
apply: ["team:sre"]
- tag_query: "dir:staging"
plan: ["*"]
apply: ["team:developers", "team:infra-admins"]
Approval workflows
# Conditional approvals
apply_requirements:
checks:
- tag_query: "production"
approved:
enabled: true
any_of_count: 2
status_checks:
enabled: true
checks: ["security-scan"]
OPA policy enforcement
# Policy as code validation
workflows:
- tag_query: "production"
plan:
- type: init
- type: conftest
- type: plan
apply:
- type: init
- type: apply
Governance with results
100%
Audit coverage
Automated
Policy enforcement
Git-based
Compliance tracking
Zero
Manual checks
Ready to implement infrastructure governance?
Start enforcing policies and standards automatically