Skip to content

Commit 1aeee3e

Browse files
CamSopergithub-actions[bot]SaraDPH
authored
Enhance policy documentation by adding description of policy as code (#16645)
* Enhance policy documentation by adding description of policy as code Fixes #16609 * Improve policy as code documentation formatting - Restructure sentence for better flow and readability - Reformat benefits section as bulleted list for improved scannability - Maintain 'Pulumi Policies brings' as singular per product naming Co-authored-by: Cam Soper <[email protected]> * Clarify usage of "Pulumi Policies" in documentation style guide * Update meta description for clarity on policy as code in documentation * Update content/docs/insights/policy/_index.md Co-authored-by: Sara <[email protected]> --------- Co-authored-by: claude[bot] <41898282+claude[bot]@users.noreply.github.com> Co-authored-by: Cam Soper <[email protected]> Co-authored-by: Sara <[email protected]>
1 parent 0178ee2 commit 1aeee3e

File tree

2 files changed

+25
-3
lines changed

2 files changed

+25
-3
lines changed

STYLE-GUIDE.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,11 +205,15 @@ See [Hugo diagrams docs](https://gohugo.io/content-management/diagrams/) and [Me
205205
- Pulumi ESC (Environments, Secrets, and Configuration)
206206
- Pulumi IDP (Internal Developer Platform)
207207
- Pulumi Insights
208-
- Pulumi Cloud
208+
- Pulumi Cloud
209+
- Pulumi Policies
209210
- Expand product acronyms at first mention. Use just the product name after.
210211
- For non-Pulumi acronyms: spell out on first use, then use the acronym.
211212
- Example: Virtual Private Cloud (VPC), then VPC.
212213
- Widely known acronyms (API, HTTP, REST) don’t need expansion.
214+
- *Pulumi Policies* is the product name, so it's a singular proper noun (like "United States" or "Brooks Brothers").
215+
- Always refer to it in the singular form (e.g., "Pulumi Policies enforces compliance").
216+
- Never refer to it in the plural (e.g., avoid "Pulumi Policies enforce compliance").
213217

214218
---
215219

content/docs/insights/policy/_index.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Policies
33
title_tag: "Pulumi Policies | Insights & Governance"
4-
meta_desc: Enforce compliance and security policies across all cloud infrastructure with Pulumi Policies—for both IaC stacks and discovered resources.
4+
meta_desc: Enforce compliance and security across all cloud infrastructure using policy as code with Pulumi Policies—for both IaC stacks and discovered resources.
55
h1: Policies
66
meta_image: /images/docs/meta-images/docs-meta.png
77
menu:
@@ -21,7 +21,25 @@ aliases:
2121
- /docs/insights/policy/core-concepts/
2222
---
2323

24-
Pulumi Policies empowers you to set guardrails to enforce compliance across your entire cloud infrastructure—whether resources are managed by Pulumi IaC, provisioned by other tools like Terraform or CloudFormation, or created manually. Using Pulumi Policies, you can write flexible business and security policies that protect your organization.
24+
Pulumi Policies enables you to implement policy as code across your entire cloud infrastructure. You define guardrails in code and apply them consistently across resources managed by Pulumi IaC, provisioned with Terraform or CloudFormation, or created manually. These codified business and security rules provide automated compliance protections for your organization.
25+
26+
## What is policy as code?
27+
28+
Policy as code applies software engineering practices to infrastructure policies. You write policies in programming languages and manage them alongside your infrastructure code, instead of manually configuring compliance rules through cloud provider consoles or maintaining policy documentation in wikis.
29+
30+
This approach provides several key benefits:
31+
32+
- **Cost control**: Define policies based on resource pricing to prevent expensive deployments before they happen. Set spending limits, identify unused resources, and enforce tagging for cost tracking and allocation across teams.
33+
34+
- **Compliance and security**: Enforce guardrails that prevent common misconfigurations like public S3 buckets, exposed databases, or overly permissive security groups. Apply consistent security standards across development, staging, and production environments.
35+
36+
- **Early validation**: Catch policy violations during `pulumi preview` before resources are created, not after deployment. This prevents non-compliant infrastructure from reaching production and reduces the time and cost of remediation.
37+
38+
- **Best practices as code**: Encode organizational standards and cloud provider best practices as versioned, testable policies. Share policy packs across teams to ensure consistent infrastructure patterns throughout your organization.
39+
40+
- **Integration with cloud-native tools**: Work alongside cloud provider features like AWS IAM Access Analyzer or AWS Organizations tag policies, combining Pulumi's policy enforcement with native cloud governance capabilities.
41+
42+
Pulumi Policies brings these policy as code benefits to both Pulumi-managed infrastructure and resources discovered from other tools or created manually.
2543

2644
{{% notes type="info" %}}
2745
Policy as Code is implemented via [analyzer plugins](/docs/iac/concepts/plugins/#analyzer-plugins), which are installed automatically with the Pulumi CLI.

0 commit comments

Comments
 (0)