Trusted by DevOps, SecOps, and Platform Engineering teams around the world.
Up to
10
x
Review faster with context
“With tfRails, we are able to review, troubleshoot and act on each IaC PR between 4x to 10x faster.”
VP Cloud Engineering, Video Streaming Company
100
%
Shift left
“Getting a complete understanding of the impact of each change on our environments and adding automatic testing for resilience, security & cost before deployment– all while shifting left ownership, made the decision a no-brainer.”
DevOps Manager, Communications Company
3
min.
Connect AWS accounts
"With tfRails we know every change we do will meet best practices and will reduce unnecessary cycles of fixes post depolyment"
CTO Travel Company
Apply, Fix, Apply, Fix...
Reviewing terraform plans for change assessments is not an optimal approach to say the least...
When using traditional scanners and tf_plan you are missing critical aspect:
The context and potential impact on your environment.
Don't Scan.
Simulate.
Now you can fully understand the impact of any change.
Identify the availability, security, and cost impact of proposed configuration changes before you deploy.
See how changes to an IAM policy can impact a K8s pod that is already running.
tfRails mimics AWS behavior and simulates all resources that will be created post apply, such as EC2 instances, ENIs, and EBS volumes for an ASG created with a launch template.
Observe the effects of the modification with a topology graph.
Identify deviations from best practices before they become harder to remedy.
Shift-left Cost, Resilience, Security and Compliance! tfRails covers your terraform PRs with context-aware policies.
Security & Compliance
Shift left Compliance, CSPM and CIEM to the PR stages, tfRails is the only tool that merges your runtime state to the build stage with the full posture.
Cloud Costs
Validate each change is optimized for cost best practices and your organizational standards. See the predicted implications on your bill before deployment.
Resilience
Make sure your architecture is resilient before deployment while Terraform changes are still easy to fix.
Easily tune controls and enforce custom-made posture based architectural standards.
Example #1
Expect only the billing microservices to access billing DynamoDB table.
Example #2
Connectivity across regions should be via TGW and not VPC Peering.
Make config changes without breaking things.
Accelerate and simplify the complex Terraform plan analysis.
Identify high-risk changes that are otherwise hard to predict on a Terraform plan.
Predict potential availability issues that may break things and cause downtime.
How does it work?
tfRails Simulation engine merges the current running state of your cloud (actual state not tfstate) in a combination with the Terraform code proposed change, to determine how your cloud is going to be impacted if the code gets applied, Learn more.
Security is always our top priority. We're SOC 2 Type II certified, our teams continuously implement security best practices and the highest security standards.