II.
StackProfile JSON
Structured · livestack-profile:terraform-landing-zone
Terraform Landing Zone (Terraform, HCL, Vault, Go, OPA) json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "stack-profile:terraform-landing-zone",
"_kind": "StackProfile",
"_file": "domain/stack-profiles/deep-stacks-5.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Terraform Landing Zone (Terraform, HCL, Vault, Go, OPA)",
"description": "An enterprise cloud landing zone provisioned entirely through Terraform,\nusing HCL modules to define account structures, networking, IAM policies,\nand security guardrails across AWS or GCP. HashiCorp Vault manages secrets\nand dynamic credentials, while OPA enforces policy-as-code constraints\nbefore any plan is applied. Custom Go-based Terraform providers extend\nthe platform for internal services. Deployed via Terraform Cloud for\nremote state management and team collaboration. The tradeoff is steep\nlearning curve and long plan/apply cycles for large-scale refactors.\n",
"composes": [
"tool:terraform",
"language:hcl",
"tool:vault",
"tool:opa",
"language:go",
"tool:terraform-cloud",
"tool:checkov",
"tool:sops"
]
},
"outgoingEdges": [
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:terraform",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "language:hcl",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:vault",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:opa",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "language:go",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:terraform-cloud",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:checkov",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "tool:sops",
"kind": "composed_of"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "role:platform-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "role:cloud-architect",
"kind": "used_by_role"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "role:security-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "workflow:terraform-drift-remediation",
"kind": "follows_workflow"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "workflow:iac-security-scanning",
"kind": "follows_workflow"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "domain:cloud-infra",
"kind": "applies_to"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "domain:infrastructure",
"kind": "applies_to"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "skill-area:terraform-infrastructure",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "skill-area:iac-security",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "skill-area:secrets-rotation",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "skill-area:policy-enforcement",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "skill-area:cloud-infrastructure",
"kind": "requires_skill_area"
}
],
"incomingEdges": []
}