Infrastructure as code (IaC)

Stop IaC Issues Early

Scan every change to Terraform, CloudFormation, and Helm for critical misconfigs.

  • Find misconfigs that expose Your cloud
  • Catch issues before they merge to main
  • Filter out false positives automatically
Trusted by 25k+ orgs | See results in 30sec.
Dashboard with autofixes tab

“We had experience with other tools, but we wanted to revisit the market and see what the state of play was. Aikido quickly stood out as a top choice.”

"We actually consider Aikido a bit of a learning platform for our developers, because the issues come with very clear explanations.”

Security is no longer an afterthought. With Aikido, we’re integrating it directly into our DevOps pipeline to ensure it’s a seamless part of our workflow.

Importance of Infrastructure as Code Scanning

Why should you do IaC scanning?

down arrow

Infrastructure as code (IaC) scanning is critical to secure your app, as it implements security early in the development process.
IaC checks for misconfigurations, analyzing the scripts that automatically provision and configure infrastructure.

Vanta

Covers all languages

By integrating Aikido in your CI/CD pipeline, vulnerabilities are identified before they're committed to the default branch.

Vanta

Only Shows Security Issues

Only shows misconfigurations that pose a security risk, so you don’t get overwhelmed with too many issues.

Features

Aikido's IaC features

Secure Your Pipeline

By integrating Aikido in your CI/CD pipeline, vulnerabilities are identified before they're committed to the default branch.
CI CD Integration

Removes False Positives

Aikido catches software that was manually installed (e.g. nginx), unlike other tooling such as docker hub.
aikido-dependency-scanner

Also Scans Dockerfiles

By scanning dockerfiles Aikido is able to, for example, already detect imdsv1 instances that are SSRF sensitive in AWS.

AI Autofix for IaC (& SAST)

Save time using Aikido’s LLM-based autofix. Preview the proposed solution, and generate a PR with a single click.

Scans production environment

IaC scans your code pre-deployment. Do you want to secure your production environment? Check our CSPM Scanner.

Read more

No Unnecessary alerts

Only Shows Security Issues

Only shows misconfigurations that pose a security risk, so you don’t get overwhelmed with too many issues.

Aikido's other scanners

Built on reliable open source security scanners, all combined in one platform. Enhanced with our own code to cover any scanning gaps.

Code & Containers

Open source dependency scanning (SCA)

Continuously monitors your code for known vulnerabilities, CVEs and other risks.

Code

Static code analysis (SAST)

Scans your source code for security risks before an issue can be merged.

Leverages

Semgrep

Gosec

Custom Rules

Domain

Surface monitoring (DAST)

Dynamically tests your web app’s front-end to find vulnerabilities through simulated attacks. Built on ZAP & Nuclei.

Cloud

Cloud posture management (CSPM)

Detects cloud infrastructure risks across major cloud providers.

Code

Secret Detection

Checks your code for leaked and exposed API keys, passwords, certificates, encryption keys, etc...

Code & Containers

Open source license scanning

Monitors your licenses for risks such as dual licensing, restrictive terms, bad reputation, etc..

Code

Malware detection in dependencies

Prevents malicious packages from infiltrating your software supply chain. Powered by Phylum.

Code

Infrastructure as code

Scans Terraform, CloudFormation & Kubernetes infrastructure-as-code for misconfigurations.

Code & Containers

Outdated Software

Checks if any frameworks & runtimes you are using are no longer maintained.

Containers

Container image scanning

Scans your container OS for packages with security issues.

Custom

Connect your own scanner

Imports and auto-triages findings from your current scanner stack.

Is Aikido's software pentested?

Yes. We run a yearly pentest on our platform and also have an ongoing bug bounty program to ensure our security is continuously tested by a wide range of experts.

Can I also generate an SBOM?

You can create a CycloneDX SBOM or csv export with one click. Just go to the Licenses & SBOM report where you'll get a full overview of all the packages & licenses you're using.

What do you do with my source code?

Aikido does not store your code after analysis has taken place. Some of the analysis jobs such as SAST or Secrets Detection require a git clone operation. More detailed information can be found on docs.aikido.dev.

Do I need to give access to my repos to test out the product?

When you log in with your VCS we don’t get access to any of your repositories. You can manually give access to the repositories you’d like to scan. It’s also possible to test out the platform using sample repositories.

I don’t want to connect my repository. Can I try it with a test account?

Of course! When you sign up with your git, don’t give access to any repo & select the demo repo instead!

Does Aikido make changes to my codebase?

We can’t & won’t, this is guaranteed by read-only access.

Review

“Aikido is used by different departments (Dev teams, infra, CISO) to view our security posture. This improves security awareness as well as helps us to place the right priorities to solve issues”

Patrick L

Patrick L

CISO at HRlinkIT

Get started for free
No credit card required.
Aikido dashboardAuto Triggered Issues