OPA Ecosystem / Terraform


Styra Declarative Authorization Service

Policy as Code Control Plane by Styra

Styra DAS has native support for the validation of Terraform code and plans via a prebuilt ‘system-type’, this is documented here.
View Details


Rego policy for configuration files

Conftest has generic support for Terraform source files defined in HCL. There is an example provided here on GitHub.
View Conftest Details



env0 is a Terraform automation platform that allows you to manage your infrastructure as code (IaC) at scale. It has a built-in integration with OPA. See docs here.
View env0 Details


Policy enforcement for Terraform by Scalr

These policies can be run using OPA at the command line against a Terraform plan JSON. See the example in the README.
View Scalr Details



Spacelift supports Rego as a language to describe policies for Terraform JSON plans. This blog outlines how the integration works.
View Spacelift Details



Torque supports Terraform policy enforcement and defines some sample policies here.
View Torque Details
Atmos can validate Terraform stack before applying them. This is done using the validate component command documented here.
View Atmos Details

Terraform Cloud


Terraform cloud has native support for enforcing Rego policy on plans. The feature is documented here.
View Terraform Cloud Details

Integrations are ordered by the amount of linked content.

Do you have an OPA-based project or integration to share? Follow these instructions to get it listed or go to the #ecosystem channel in the OPA Slack if you have any questions.