New customization options for Terraform Cloud projects
Customizable project permissions and policy assignment for HashiCorp Terraform help organizations scale securely and quickly.
Organizations trying to scale quickly and securely are sometimes forced to choose between productivity and security. This conundrum is especially common when applying policy sets and assigning user permissions. So how can organizations empower users with a self-service model, while also enforcing policies across the organization? Customization is the answer.
Today, we are excited to introduce two new improvements to HashiCorp Terraform Cloud: customizable project permissions and policy assignment, to help organizations scale securely by providing more granular customization options for adherence to internal policies and external regulations. These updates empower teams to manage their infrastructure effectively.
» Customizable project permissions
Back in January, we introduced a new organizational structure in Terraform Cloud called projects, allowing teams to safely self-manage groups of related workspaces with four predefined roles: Admin, Maintain, Write, and Read at the project level. But as organizations look to delegate more responsibility to help their platform teams achieve scale, they need more flexibility to customize permissions, to avoid giving users unnecessary privileges because no predefined role meets their exact needs.
Customizable project permissions for Terraform Cloud Standard and Plus (coming soon to Terraform Enterprise) let organizations tailor project-level permissions, in addition to the predefined roles, to maintain the least-privilege approach and reduce risks.
Administrators can assign teams one of the four predefined roles at a project level, or use the new custom option to pick and choose the appropriate level of permissions to assign out to a team. Examples include workspace permissions, such as the ability to execute runs or view state files that apply to all workspaces in the project.
» Customizable policy assignment
According HashiCorp 2023 State of Cloud Strategy Survey, security is ranked as the #1 multi-cloud success factor. That’s why many customers see policy enforcement as the first line of defense to ensure their infrastructure is secure and compliant.
However, globally enforced policy sets can’t make exceptions for individual workspaces, leaving administrators no choice but to manually apply policy sets to workspaces one at a time. So newly created workspaces, such as those created through no-code provisioning workflows, can become security gaps since policies won’t be enforced automatically.
Customizable policy assignment for Terraform Cloud (coming soon to Terraform Enterprise), allows organizations to assign policy sets at the project level in addition to the previously available organization or workspace levels, maintaining security and compliance with more flexibility. Policies are applied to all current and future workspaces in a project, making self-service provisioning achievable without sacrificing the protection offered by policy guardrails.
Coming in early September, another new capability will allow a list of workspaces to be excluded from a policy set. This is helpful when a single workspace may have a policy failure and the organization needs to make a temporary exception for that workspace to unblock its owners from provisioning infrastructure while investigating the policy issue.
» Try Terraform Cloud today
Terraform is the industry standard for provisioning and managing any infrastructure. With more customization options in project permissions and policy assignment, organizations can now tailor solutions based on their specific needs to scale confidently. They no longer need to choose between security and productivity.
Try these new features today — and if you are new to Terraform, sign up for Terraform Cloud and get started using the Free offering. For more information, check out the documentation for project permissions and the documentation for policy set assignment.
Sign up for the latest HashiCorp news
More blog posts like this one
Fix the developers vs. security conflict by shifting further left
Resolve the friction between dev and security teams with platform-led workflows that make cloud security seamless and scalable.
HashiCorp at AWS re:Invent: Your blueprint to cloud success
If you’re attending AWS re:Invent in Las Vegas, Dec. 2 - Dec. 6th, visit us for breakout sessions, expert talks, and product demos to learn how to take a unified approach to Infrastructure and Security Lifecycle Management.
Speed up app delivery with automated cancellation of plan-only Terraform runs
Automatic cancellation of plan-only runs allows customers to easily cancel any unfinished runs for outdated commits to speed up application delivery.