iiRecord
Agentic AI Atlas · Terraform Landing Zone (Terraform, HCL, Vault, Go, OPA)
stack-profile:terraform-landing-zonea5c.ai
II.
StackProfile JSON

stack-profile:terraform-landing-zone

Structured · live

Terraform Landing Zone (Terraform, HCL, Vault, Go, OPA) json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/stack-profiles/deep-stacks-5.yamlCluster · domain
Record JSON
{
  "id": "stack-profile:terraform-landing-zone",
  "_kind": "StackProfile",
  "_file": "domain/stack-profiles/deep-stacks-5.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Terraform Landing Zone (Terraform, HCL, Vault, Go, OPA)",
    "description": "An enterprise cloud landing zone provisioned entirely through Terraform,\nusing HCL modules to define account structures, networking, IAM policies,\nand security guardrails across AWS or GCP. HashiCorp Vault manages secrets\nand dynamic credentials, while OPA enforces policy-as-code constraints\nbefore any plan is applied. Custom Go-based Terraform providers extend\nthe platform for internal services. Deployed via Terraform Cloud for\nremote state management and team collaboration. The tradeoff is steep\nlearning curve and long plan/apply cycles for large-scale refactors.\n",
    "composes": [
      "tool:terraform",
      "language:hcl",
      "tool:vault",
      "tool:opa",
      "language:go",
      "tool:terraform-cloud",
      "tool:checkov",
      "tool:sops"
    ]
  },
  "outgoingEdges": [
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:terraform",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "language:hcl",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:vault",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:opa",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "language:go",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:terraform-cloud",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:checkov",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "tool:sops",
      "kind": "composed_of"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "role:platform-engineer",
      "kind": "used_by_role"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "role:cloud-architect",
      "kind": "used_by_role"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "role:security-engineer",
      "kind": "used_by_role"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "workflow:terraform-drift-remediation",
      "kind": "follows_workflow"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "workflow:iac-security-scanning",
      "kind": "follows_workflow"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "domain:cloud-infra",
      "kind": "applies_to"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "domain:infrastructure",
      "kind": "applies_to"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "skill-area:terraform-infrastructure",
      "kind": "requires_skill_area"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "skill-area:iac-security",
      "kind": "requires_skill_area"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "skill-area:secrets-rotation",
      "kind": "requires_skill_area"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "skill-area:policy-enforcement",
      "kind": "requires_skill_area"
    },
    {
      "from": "stack-profile:terraform-landing-zone",
      "to": "skill-area:cloud-infrastructure",
      "kind": "requires_skill_area"
    }
  ],
  "incomingEdges": []
}