Skip to content

hashicorp/terraform-AWS-Prewritten-Policy-Set

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🚨 Deprecation Notice 🚨

This module will be deprecated on July 11, 2025, and will no longer be maintained after that date.
You may continue to use the pre-written policies via the Terraform Public Registry.

Thank you for your continued support and understanding.

Terraform Module to onboard Pre-written Sentinel Policies for AWS Foundations Benchmark

This repository contains the Terraform module for pre-written policies, designed to streamline the onboarding of pre-written Sentinel policies into your Terraform environment. This module enables the creation of Policy Sets for pre-written Sentinel policies for AWS Foundations Benchmark, ensuring consistent compliance and governance across your Terraform workflows.

Steps to run the configuration

  • Set the TFE_TOKEN environment to TFC/TFE's API token. This can either be an user token or organization scoped token.
  • Identify the name of the TFE/TFC organization where the policy set will get created.
  • By default, the module supports following policy repositories, which are hosted in the following locations.
  • Users have the flexibility to modify or extend the default policy repositories. You can specify custom policy repositories using the optional policy_github_repository parameter. This parameter accepts a list of GitHub repository names, but note that the repositories must be hosted under the HashiCorp organization.
  • Use the below mentioned inputs to invoke the module for deploying the policy set to TFE/TFC.
module "policy_set" {
  source = "./pre-written-policy"

  name                                 = "<your-policy-set>"
  tfe_organization                     = "<your-tfe-org>"
  policy_set_workspace_names           = ["target_workspace_1"]
}
  • Run terraform plan to view the plan.
  • Run terraform apply to apply the changes.
  • After successful creation, you should see Sentinel policies getting evaluated in every run of every workspace where the policy set is scoped to.

Authors

HashiCorp Engineering Team.

License

Business Source License 1.1. See LICENSE for full details.

About

No description or website provided.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages