Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security.
The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development and testing with Open Policy Agent. This latest release further advances Fugue’s leadership in innovating on policy as code for IaC and the cloud infrastructure runtime.
Regula, open source engine for IaC security
Regula supports a broad set of IaC inputs, including Terraform HCL, Terraform plan JSON, AWS CloudFormation, and Serverless Application Model templates. Extensive rule libraries check for common security and compliance violations and advanced, multi-resource misconfigurations, and can detect when required resources are missing.
Regula supports standardised output formats, such as JUnit, Test Anything Protocol (TAP), and JSON, allowing it to integrate seamlessly with CI/CD tools and testing frameworks, including Jenkins, CircleCI, Travis CI, and Conftest.
Infrastructure as code (IaC)
Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment"
Cloud and security engineers can use their Regula policies in the Fugue SaaS platform to check their AWS, Microsoft Azure, and Google Cloud environments, giving them a unified policy engine for securing the entire cloud development lifecycle (CDLC) from IaC through deployment and runtime.
“Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment, and they need better tooling to develop and test policies, integrate them into their CI/CD workflows, and apply those same rules to their cloud runtime environments,” said Josh Stella, Co-Founder and CEO of Fugue.
Open policy agent framework
Josh adds, “These new Regula capabilities and policies make it easier than ever for cloud teams to secure their IaC and apply policy consistently across the CDLC and across cloud platforms, and avoid the overhead of maintaining and reconciling different policy frameworks.”
Regula utilises the Cloud Native Computing Foundation’s Open Policy Agent framework, with expressive and powerful rules written in the Rego language. Developers can create their own custom rules to meet organisational requirements, and Regula includes additional tooling for running tests on these rules. Rules can be waived to designate exceptions for specific resources or disabled entirely to fit an organisation's needs.
Regula provides out-of-the-box support for the CIS Foundations Benchmarks and additional Regula policies check for cloud vulnerabilities that compliance frameworks can miss, such as dangerously permissive AWS IAM policies, Lambda function policies allowing global access, EBS volumes with encryption disabled, and untagged cloud resources.