You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhance policy documentation by adding description of policy as code (#16645)
* Enhance policy documentation by adding description of policy as code
Fixes#16609
* Improve policy as code documentation formatting
- Restructure sentence for better flow and readability
- Reformat benefits section as bulleted list for improved scannability
- Maintain 'Pulumi Policies brings' as singular per product naming
Co-authored-by: Cam Soper <[email protected]>
* Clarify usage of "Pulumi Policies" in documentation style guide
* Update meta description for clarity on policy as code in documentation
* Update content/docs/insights/policy/_index.md
Co-authored-by: Sara <[email protected]>
---------
Co-authored-by: claude[bot] <41898282+claude[bot]@users.noreply.github.com>
Co-authored-by: Cam Soper <[email protected]>
Co-authored-by: Sara <[email protected]>
meta_desc: Enforce compliance and security policies across all cloud infrastructure with Pulumi Policies—for both IaC stacks and discovered resources.
4
+
meta_desc: Enforce compliance and security across all cloud infrastructure using policy as code with Pulumi Policies—for both IaC stacks and discovered resources.
Pulumi Policies empowers you to set guardrails to enforce compliance across your entire cloud infrastructure—whether resources are managed by Pulumi IaC, provisioned by other tools like Terraform or CloudFormation, or created manually. Using Pulumi Policies, you can write flexible business and security policies that protect your organization.
24
+
Pulumi Policies enables you to implement policy as code across your entire cloud infrastructure. You define guardrails in code and apply them consistently across resources managed by Pulumi IaC, provisioned with Terraform or CloudFormation, or created manually. These codified business and security rules provide automated compliance protections for your organization.
25
+
26
+
## What is policy as code?
27
+
28
+
Policy as code applies software engineering practices to infrastructure policies. You write policies in programming languages and manage them alongside your infrastructure code, instead of manually configuring compliance rules through cloud provider consoles or maintaining policy documentation in wikis.
29
+
30
+
This approach provides several key benefits:
31
+
32
+
-**Cost control**: Define policies based on resource pricing to prevent expensive deployments before they happen. Set spending limits, identify unused resources, and enforce tagging for cost tracking and allocation across teams.
33
+
34
+
-**Compliance and security**: Enforce guardrails that prevent common misconfigurations like public S3 buckets, exposed databases, or overly permissive security groups. Apply consistent security standards across development, staging, and production environments.
35
+
36
+
-**Early validation**: Catch policy violations during `pulumi preview` before resources are created, not after deployment. This prevents non-compliant infrastructure from reaching production and reduces the time and cost of remediation.
37
+
38
+
-**Best practices as code**: Encode organizational standards and cloud provider best practices as versioned, testable policies. Share policy packs across teams to ensure consistent infrastructure patterns throughout your organization.
39
+
40
+
-**Integration with cloud-native tools**: Work alongside cloud provider features like AWS IAM Access Analyzer or AWS Organizations tag policies, combining Pulumi's policy enforcement with native cloud governance capabilities.
41
+
42
+
Pulumi Policies brings these policy as code benefits to both Pulumi-managed infrastructure and resources discovered from other tools or created manually.
25
43
26
44
{{% notes type="info" %}}
27
45
Policy as Code is implemented via [analyzer plugins](/docs/iac/concepts/plugins/#analyzer-plugins), which are installed automatically with the Pulumi CLI.
0 commit comments