terrascan
by tenable
Terrascan is a static code analyzer that detects compliance and security violations in Infrastructure as Code to prevent risks before cloud infrastructure provisioning.
Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Primary Use Case
Terrascan is primarily used by DevOps, security engineers, and cloud architects to scan Infrastructure as Code templates such as Terraform, CloudFormation, and Kubernetes manifests for misconfigurations and security vulnerabilities. It helps enforce security best practices and compliance policies early in the development lifecycle, integrating seamlessly into CI/CD pipelines or running locally to ensure secure cloud infrastructure deployment.
- 500+ built-in policies for security best practices
- Supports scanning Terraform (HCL2), AWS CloudFormation, Azure ARM templates
- Scans Kubernetes (JSON/YAML), Helm v3 charts, and Kustomize configurations
- Dockerfile scanning for container security
- Policy support for AWS, Azure, GCP, Kubernetes, Dockerfile, and GitHub
- Monitors provisioned cloud infrastructure for configuration drift and enables reverting to secure posture
- Integration with Docker image vulnerability scanning for AWS, Azure, GCP, and Harbor registries
- Flexible usage: runs locally or integrates with CI/CD pipelines
Installation
- Visit the Terrascan releases page at https://github.com/tenable/terrascan/releases to download the latest binary for your platform
- Install as a native executable by running the curl command provided on the releases page
- Alternatively, use the Terrascan Docker image for containerized usage
Usage
>_ terrascan scanScans the current directory containing Infrastructure as Code files for security and compliance violations
>_ terrascan scan -p terraformScans Terraform (HCL2) files specifically for AWS resources
>_ terrascan scan -p cloudformationScans AWS CloudFormation templates for misconfigurations
>_ terrascan scan -p azureScans Azure Resource Manager (ARM) templates
>_ terrascan scan -p kubernetesScans Kubernetes manifests in JSON or YAML format
>_ terrascan scan -p helmScans Helm v3 charts for security issues
>_ terrascan scan -p kustomizeScans Kustomize charts
>_ terrascan scan -p dockerfileScans Dockerfiles for security best practices
- Integrate Terrascan into CI/CD pipelines for early detection of IaC misconfigurations to prevent cloud infrastructure vulnerabilities.
- Use Terrascan's drift detection feature to continuously monitor and revert unauthorized changes in cloud configurations, enhancing post-deployment security.
- Combine Terrascan with container scanning tools to provide comprehensive security coverage from infrastructure provisioning to container deployment.
- Leverage Terrascan's policy-as-code approach to customize compliance checks aligned with organizational security policies and regulatory requirements.
- Employ Terrascan in purple team exercises to simulate misconfigurations and test detection and remediation workflows collaboratively.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about terrascan. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
3 free chats per tool • Instant responses • No credit card
Related Tools
ProxmoxVE
community-scripts/ProxmoxVE
Proxmox VE Helper-Scripts (Community Edition)
prowler
prowler-cloud/prowler
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment.

aws-cdk
aws/aws-cdk
The AWS Cloud Development Kit is a framework for defining cloud infrastructure in code
my-arsenal-of-aws-security-tools
toniblyx/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.

keda
kedacore/keda
KEDA is a Kubernetes-based Event Driven Autoscaling component. It provides event driven scale for any container running in Kubernetes

DevOps-Guide
Tikam02/DevOps-Guide
DevOps Guide - Development to Production all configurations with basic notes to debug efficiently.
