- InfraCoffee
- Posts
- Found a New Favorite in My DevOps Toolkit: Checkov
Found a New Favorite in My DevOps Toolkit: Checkov
Catching misconfigs before they hit production — IaC scanning just got a lot easier.

We’ve all done it—raise a PR for some Terraform code, tag a peer for review… only to get comments like:
“This S3 bucket is public.”
“Missing tags again?”
“Security group open to the world?”
What if we could automate that feedback before it ever reaches your reviewer?
That’s where Checkov comes in.
An open-source policy-as-code tool by Bridgecrew, it scans your IaC (Terraform, CloudFormation, Kubernetes, etc.) for misconfigurations and policy violations.
Here’s the smart flow we use now:
1. Raise a PR
2. Let Checkov run automatically via GitHub Actions or Bamboo
3. If the pipeline passes → then ask for review
4. If it fails → fix and push again
No human time wasted reviewing broken IaC.
Why Checkov works so well:
• Scans for security misconfigurations (public resources, overly permissive roles, etc.)
• Checks for compliance violations (CIS, SOC2, PCI)
• Supports custom policies
• Integrates easily into CI/CD workflows
It’s not just a tool—it’s a first line of defense in your GitOps/IaC lifecycle.
No more tribal knowledge. No more “Oh, I forgot to encrypt that.”
Just clean, compliant infrastructure—before it hits production.
Are you automating IaC checks in your pipeline?
Would love to hear how others are doing this!