A static analysis security scanner for Terraform code that identifies misconfigurations across major cloud providers.
tfsec is a static analysis security scanner for Terraform code that identifies potential misconfigurations and security vulnerabilities across cloud infrastructure. It analyzes Terraform templates to detect issues before deployment, helping prevent security breaches in cloud environments. The tool supports multiple cloud providers and integrates with various development workflows.
DevOps engineers, cloud infrastructure teams, and security professionals working with Terraform to manage infrastructure as code. It's particularly valuable for organizations implementing DevSecOps practices in cloud environments.
Developers choose tfsec for its Terraform-specific security scanning, comprehensive multi-cloud coverage, and seamless integration into CI/CD pipelines. Its speed, extensive rule set, and ability to understand Terraform's HCL language make it more effective than generic security scanners for infrastructure code.
Tfsec is now part of Trivy
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Evaluates HCL expressions, Terraform functions like concat(), and relationships between resources, providing accurate static analysis specific to Terraform's syntax and semantics.
Supports AWS, Azure, GCP, Kubernetes, and other providers with hundreds of built-in rules, ensuring wide applicability across major cloud platforms.
Offers multiple output formats (JSON, SARIF, JUnit, etc.), IDE plugins for VSCode and JetBrains, and seamless CI/CD integration via GitHub Actions and Azure DevOps pipelines.
Allows user-defined Rego policies for custom security checks and is supported by an active community with Slack channels and contributions.
The project is actively encouraging migration to Trivy, with engineering attention redirected, leading to potential stagnation in updates, new features, and long-term support.
Support for Terraform versions below 0.12 (HCL v1) is very limited with fewer checks, making it ineffective for older or unmaintained codebases.
Exclusively scans Terraform code, so teams needing security analysis for multiple infrastructure languages (e.g., CloudFormation, Ansible) must use additional tools, increasing complexity.
While Rego policies enable customization, writing and maintaining these policies requires expertise in Rego and security domains, adding overhead for teams without that knowledge.