Regula is a policy engine that helps cloud developers secure AWS CloudFormation and Terraform templates for AWS, Microsoft Azure, and Google Cloud deployments
Frederick, MD – June 29, 2021 – Fugue, the company helping organizations innovate faster and more securely in the cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools such as Terraform and AWS CloudFormation, prebuilt libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development and testing with Open Policy Agent. This latest release further advances Fugue’s leadership in innovating on policy as code for IaC and the cloud infrastructure runtime.
Regula supports a broad set of IaC inputs including Terraform HCL, Terraform plan JSON, AWS CloudFormation, and Serverless Application Model templates. Extensive rule libraries check for common security and compliance violations and advanced, multi-resource misconfigurations, and can detect when required resources are missing. Regula supports standardized output formats such as JUnit, Test Anything Protocol (TAP), and JSON, allowing it to integrate seamlessly with CI/CD tools and testing frameworks including Jenkins, CircleCI, Travis CI, and Conftest.
Cloud and security engineers can use their Regula policies in the Fugue SaaS platform to check their AWS, Microsoft Azure, and Google Cloud environments, giving them a unified policy engine for securing the entire cloud development lifecycle (CDLC) from IaC through deployment and runtime.
“Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment, and they need better tooling to develop and test policies, integrate them into their CI/CD workflows, and apply those same rules to their cloud runtime environments,” said Josh Stella, co-founder and CEO of Fugue. “These new Regula capabilities and policies make it easier than ever for cloud teams to secure their IaC and apply policy consistently across the CDLC and across cloud platforms—and avoid the overhead of maintaining and reconciling different policy frameworks.”
Regula utilizes the Cloud Native Computing Foundation’s Open Policy Agent framework, with expressive and powerful rules written in the Rego language. Developers can create their own custom rules to meet organizational requirements, and Regula includes additional tooling for running tests on these rules. Rules can be waived to designate exceptions for specific resources or disabled entirely to fit an organization's needs.
Regula provides out-of-the-box support for the CIS Foundations Benchmarks; additional Regula policies check for cloud vulnerabilities that compliance frameworks can miss, such as dangerously permissive AWS IAM policies, Lambda function policies allowing global access, EBS volumes with encryption disabled, and untagged cloud resources. View the full set of Regula rules here.
Regula comes as a pre-packaged binary including a CLI, and can be easily installed with Homebrew or deployed with a Docker image that can be found at DockerHub.
Fugue helps organizations move faster in the cloud—without breaking the rules needed to keep cloud environments secure. The Fugue platform secures the entire cloud development lifecycle—from infrastructure as code through the cloud runtime. Fugue empowers cloud engineering and security teams to prove continuous compliance, build security into cloud development, and eliminate cloud misconfiguration vulnerabilities. Fugue supports Amazon Web Services, Microsoft Azure, and Google Cloud, and provides one-click reporting for CIS Foundations Benchmarks, CIS Controls, CIS Docker, CSA CCM, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, and SOC 2. Customers such as AT&T, SAP NS2, and Red Ventures trust Fugue to protect their cloud environments. To learn more, visit www.fugue.co.