II.
Workflow JSON
Structured · liveworkflow:iac-security-scanning
IaC Security Scanning json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "workflow:iac-security-scanning",
"_kind": "Workflow",
"_file": "workflows/workflows/workflows-security-compliance-deep.yaml",
"_cluster": "workflows",
"attributes": {
"displayName": "IaC Security Scanning",
"workflowKind": "security",
"triggerType": "event-driven",
"typicalCadence": "per-pull-request",
"complexity": "single-team",
"description": "Scans Infrastructure-as-Code templates (Terraform, CloudFormation, Helm,\nPulumi) for misconfigurations, overly permissive IAM policies, unencrypted\nstorage, public network exposure, and CIS benchmark violations before\nmerge -- triaging findings by severity, suppressing accepted risks, and\nblocking deployments with critical violations. Excludes IaC authoring and\ndrift remediation.\n"
},
"outgoingEdges": [
{
"from": "workflow:iac-security-scanning",
"to": "role:security-reviewer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "role:platform-engineer",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "role:cloud-architect",
"kind": "involves_role",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "skill-area:terraform-infrastructure",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "skill-area:container-security",
"kind": "requires_skill_area",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "domain:security",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "domain:cloud-infra",
"kind": "applies_to_domain",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "responsibility:run-security-scans",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "responsibility:terraform-state-mgmt",
"kind": "triggers_responsibility",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "org-unit:security-team",
"kind": "performed_by_org_unit",
"attributes": {}
},
{
"from": "workflow:iac-security-scanning",
"to": "org-unit:platform-team",
"kind": "performed_by_org_unit",
"attributes": {}
}
],
"incomingEdges": [
{
"from": "stack-profile:security-operations",
"to": "workflow:iac-security-scanning",
"kind": "follows_workflow"
},
{
"from": "stack-profile:terraform-landing-zone",
"to": "workflow:iac-security-scanning",
"kind": "follows_workflow"
}
]
}