Skip to main content

From “Deployed” to “Compliant”: Automating Azure IaC Checks

 Infrastructure as Code should make cloud delivery faster, but compliance checks usually appear too late — after deployment or at the end of the pipeline. Then teams discover the same issues again: naming is not following conventions, mandatory tags are missing, TLS is not enforced, public access is enabled, diagnostics are not configured. None of this is new. Microsoft already provides strong guidance in the Well-Architected Framework (WAF) and Cloud Adoption Framework (CAF). The hard part is applying these rules consistently across many repos and many teams.

This is why I built Azure IaC Compliance Checker: a small open-source CLI that checks Azure IaC before deployment, directly from code.

Where the tool is available

The tool is available on GitHub: vunvulear/azure-iac-checker. You can find it here: https://github.com/vunvulear/azure-iac-checker.
Right now it’s early stage: there are no releases and no published packages, so the normal way to use it is to clone the repository and install it from source.

Why I built it (and what you get)

Existing tools help, but they don’t cover the full need:

  • Some tools are Terraform-only.

  • Azure Policy is great, but it mostly works after resources exist.

  • Many teams use a mix of Terraform, ARM templates, and Bicep, and want one consistent check.

This checker scans a folder of IaC and generates a Markdown compliance report with violations and severity. It supports:

  • Terraform (.tf, .tfvars) using python-hcl2

  • ARM templates (.json) detected by the $schema

  • Bicep (.bicep) compiled to ARM JSON first (needs Bicep CLI if you scan Bicep)

It evaluates rules aligned to WAF and CAF (around 80 rules) and it can fail your pipeline based on a severity threshold. That means you can make compliance “shift-left”: catch problems early, when fixes are small.

How to install and use it

You need Python 3.10+ and pip. Bicep CLI is optional (only for .bicep scans).

Install from source:

git clone https://github.com/vunvulear/azure-iac-checker.git
cd azure-iac-checker

pip install python-hcl2 PyYAML
pip install -e .

iac-checker --version

Now run a scan:

# Scan all formats (Terraform + ARM + Bicep)
iac-checker --path ./infra

You can filter formats if you want:

iac-checker --path ./infra --format terraform
iac-checker --path ./infra --format arm bicep

And you can control output and threshold:

iac-checker --path ./infra --config .iac-checker.yaml --output report.md
iac-checker --path ./infra --severity-threshold High

Exit codes are CI-friendly: 0 = pass, 1 = fail (violations at/above the chosen threshold).

Try it fast

The repo includes sample compliant and non-compliant files under examples/, so you can test quickly and see the report format.

Comments

Popular posts from this blog

Why Database Modernization Matters for AI

  When companies transition to the cloud, they typically begin with applications and virtual machines, which is often the easier part of the process. The actual complexity arises later when databases are moved. To save time and effort, cloud adoption is more of a cloud migration in an IaaS manner, fulfilling current, but not future needs. Even organisations that are already in the cloud find that their databases, although “migrated,” are not genuinely modernised. This disparity becomes particularly evident when they begin to explore AI technologies. Understanding Modernisation Beyond Migration Database modernisation is distinct from merely relocating an outdated database to Azure. It's about making your data layer ready for future needs, like automation, real-time analytics, and AI capabilities. AI needs high throughput, which can be achieved using native DB cloud capabilities. When your database runs in a traditional setup (even hosted in the cloud), in that case, you will enc...

How to audit an Azure Cosmos DB

In this post, we will talk about how we can audit an Azure Cosmos DB database. Before jumping into the problem let us define the business requirement: As an Administrator I want to be able to audit all changes that were done to specific collection inside my Azure Cosmos DB. The requirement is simple, but can be a little tricky to implement fully. First of all when you are using Azure Cosmos DB or any other storage solution there are 99% odds that you’ll have more than one system that writes data to it. This means that you have or not have control on the systems that are doing any create/update/delete operations. Solution 1: Diagnostic Logs Cosmos DB allows us activate diagnostics logs and stream the output a storage account for achieving to other systems like Event Hub or Log Analytics. This would allow us to have information related to who, when, what, response code and how the access operation to our Cosmos DB was done. Beside this there is a field that specifies what was th...

[Post Event] Azure AI Connect, March 2025

On March 13th, I had the opportunity to speak at Azure AI Connect about modern AI architectures.  My session focused on the importance of modernizing cloud systems to efficiently handle the increasing payload generated by AI.