Infrastructure Governance & Security

Implement governance through Git workflows with automated policy enforcement. Use OPA policies, approval workflows, and audit trails for compliance.

Governance with automation

Secure collaboration without sacrificing velocity

Policy as Code

Enforce standards with OPA policies

  • Native OPA integration
  • Pre-plan & pre-apply checks
  • Custom policy rules

Team-Based Access Control

Fine-grained permissions without complexity

  • GitHub/GitLab team integration
  • Workspace-level permissions
  • Apply restrictions by team

Automated Security Checks

Security validation on every change

  • Checkov security scanning
  • OIDC authentication
  • No stored credentials

Flexible Approval Workflows

Configure approvals based on your needs

  • PR approval requirements
  • Team-based approvals
  • Conditional workflows

Cost Governance

Control infrastructure spending

  • Infracost integration
  • Cost-based policies
  • Budget approval workflows

Complete Audit Trail

Track every change and decision

  • Git-based audit history
  • PR comment history
  • Policy decision tracking

See governance in action

Watch how Terrateam enforces policies through PR workflows

Update production security group rules #89
TT
terrateam commented
🔒 Policy Check Results
Security scan passed
No security vulnerabilities detected
Policy enforcement required
Changes to production require 2 approvals + security team review
OPA policies satisfied
All governance rules passed
security-lead approved these changes
infra-admin approved these changes
developer commented
terrateam apply
TT
terrateam commented
All governance checks passed!
Security policies: PASSED
Approval requirements: SATISFIED
Team permissions: VERIFIED
Resources: 1 added, 1 changed, 0 destroyed
🎉 Changes applied with full governance compliance!

Flexible governance policies

Team-based access control

# Role-based permissions
access_control:
policies:
- tag_query: "dir:production"
plan: ["*"]
apply: ["team:sre"]
- tag_query: "dir:staging"
plan: ["*"]
apply: ["team:developers", "team:infra-admins"]

Approval workflows

# Conditional approvals
apply_requirements:
checks:
- tag_query: "production"
approved:
enabled: true
any_of_count: 2
status_checks:
enabled: true
checks: ["security-scan"]

OPA policy enforcement

# Policy as code validation
workflows:
- tag_query: "production"
plan:
- type: init
- type: conftest
- type: plan
apply:
- type: init
- type: apply

Governance with results

100%

Audit coverage

Automated

Policy enforcement

Git-based

Compliance tracking

Zero

Manual checks

Ready to implement infrastructure governance?

Start enforcing policies and standards automatically