IaC+ and cloud custom rules

Release status

IaC custom rules are available only for Enterprise plans.

See Pricing plans.

Prerequisites for IaC to cloud custom roles

Install the following in your PATH: Snyk CLI >= 1.1168.0 For details, see Install or update the Snyk CLI.

Configure the CLI appropriately and set your default Organization: snyk config set org=<org id>

If you work with multiple Snyk Organizations, you can add --org=<your org id> to your commands to specify your desired Organization.

Predefined security rules in Snyk IaC

Snyk IaC includes a set of security rules that work out of the box, covering AWS, Azure, GCP, and Kubernetes. These rules are based on security research, best practices, recognized standards, and benchmarks. New rules are released regularly. Snyk’s security engineering team actively maintains them.

These rules are intended to meet most of your needs on your first scan, but you may need to enforce additional security rules for your system, such as tagging standards.

Purpose of Cloud Custom Rules

Complementing Snyk’s predefined rules, IaC to Cloud Custom Rules enables you to enforce your internal security controls across your SDLC (software development lifecycle). Using Cloud Custom Rules, you can identify and highlight the following:

  • Issues on cloud configurations across the SDLC, including SCM, CLI, Terraform Cloud, and deployed cloud environments

  • Issues on any Terraform IaC configurations using Terraform providers beyond cloud (AWS, Azure, Google Cloud) configurations, such as GitHub or Snowflake configurations.

The following are the steps in using Cloud Custom Rules:

Last updated

More information

Snyk privacy policy

© 2023 Snyk Limited | All product and company names and logos are trademarks of their respective owners.