Welcome to the Regula Docs!⚓︎
Current version: v0.9.1
Regula is a tool that evaluates CloudFormation and Terraform infrastructure-as-code for potential AWS, Azure, and Google Cloud security and compliance violations prior to deployment.
Regula supports the following file types:
- CloudFormation JSON/YAML templates
- Terraform HCL code
- JSON-formatted Terraform plans
Regula includes a library of rules written in Rego, the policy language used by the Open Policy Agent (OPA) project. Regula works with your favorite CI/CD tools such as Jenkins, Circle CI, and AWS CodePipeline; we’ve included a GitHub Actions example so you can get started quickly. Where relevant, we’ve mapped Regula policies to the CIS AWS, Azure, and Google Cloud Foundations Benchmarks so you can assess compliance posture. Regula is maintained by engineers at Fugue.
Regula is also available as a Docker image on DockerHub here.
How does Regula work?⚓︎
The Regula CLI is built using Go, which means it is installed as a single self-contained binary. It reads in CloudFormation templates, Terraform HCL code, and JSON-formatted Terraform plans and uses OPA to evaluate them against Regula's library of rules, generating a report. Regula also supports custom rules written in Rego. For usage details, see Usage.