IaC Scanning
DryRun Security scans Terraform configurations for security misconfigurations and insecure defaults in pull requests.
Overview
DryRun Security provides Infrastructure as Code scanning focused on Terraform configurations. When a pull request modifies .tf files, DryRun Security analyzes the changes for security misconfigurations and flags findings as part of its PR scanning workflow.
What It Detects
IaC scanning identifies common Terraform security issues including:
- Overly permissive IAM policies - Roles granting broader access than required, violating least privilege
- Exposed resources - Security groups, firewall rules, or storage buckets with unintended public access
- Insecure defaults - Unencrypted data stores, disabled logging, or missing audit trails
- Subdomain takeover risks - Dangling DNS records or CDN configurations that could be claimed by an attacker
Beyond the built-in IaC checks, teams can use Custom Code Policies to monitor additional infrastructure concerns. Custom policies let you enforce specific configuration requirements, flag unapproved resource types, or define any other infrastructure rules that matter to your organization. This extends IaC coverage to match your team's specific infrastructure security requirements.
How Findings Appear
IaC findings are reported the same way as other DryRun Security results: as comments on pull requests and as entries in the Risk Register dashboard. Each finding includes the affected resource, a description of the risk, and guidance on remediation.