Checkov

A static analysis tool for Infrastructure as Code that scans Terraform, CloudFormation, Kubernetes, Helm, ARM, and Serverless configurations for security misconfigurations and compliance violations.

Developer

Bridgecrew (Palo Alto Networks)

verified_user
Visit Official Site open_in_new

description Technical Dossier

Checkov is a static analysis tool purpose-built for Infrastructure as Code security, developed by Bridgecrew (acquired by Palo Alto Networks in 2021) and released under the Apache 2.0 license. It scans IaC configuration files before deployment to detect security misconfigurations, compliance violations, and infrastructure anti-patterns that could lead to data exposure, privilege escalation, or service compromise in cloud environments.

The tool supports all major IaC frameworks: Terraform (both HCL source and JSON plan files), AWS CloudFormation, Azure ARM and Bicep templates, Kubernetes manifests, Helm charts, Serverless Framework configurations, and Dockerfiles. Checkov ships with over 2,500 built-in policies covering AWS, Azure, and GCP resource configurations. Its graph-based analysis engine is a key differentiator — rather than evaluating resources in isolation, Checkov builds a dependency graph that models relationships between resources, enabling checks like “this S3 bucket is referenced by a CloudFront distribution that lacks a WAF” or “this IAM role can assume a role in another account with admin privileges.”

Policies map to established compliance frameworks including CIS Benchmarks for AWS/Azure/GCP, PCI-DSS, HIPAA, SOC2, NIST 800-53, and GDPR, producing framework-aligned reports for audit teams. Custom policies can be authored in Python for complex logic or in a declarative YAML format for simpler attribute and connection checks. Checkov integrates into development workflows via pre-commit hooks, GitHub Actions, GitLab CI, and VS Code extension, with SARIF output for surfacing findings directly in GitHub Advanced Security. As part of the Palo Alto Prisma Cloud ecosystem, Checkov findings can feed into the broader cloud security posture management platform for centralised policy enforcement.

scan Broad IaC Coverage

Analyses Terraform (HCL & plan files), CloudFormation, Kubernetes, Helm, ARM templates, Serverless Framework, Bicep, and Dockerfiles.

account_tree Graph-Based Analysis

Builds a resource dependency graph to evaluate cross-resource relationships — detecting issues like security groups referencing public subnets or IAM roles with excessive scope.

edit_note Custom Policies

Define custom checks in Python or YAML, or use the visual policy editor in Prisma Cloud. Supports attribute, connection, and composite policies.

integration_instructions CI/CD & IDE Integration

Pre-commit hooks, GitHub Actions, GitLab CI, Jenkins, and VS Code extension. Supports SARIF output for GitHub Advanced Security integration.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 70 / 100 High

settings_suggest Deployment Complexity

Low 10 / 100 High

engineering Technical Difficulty

Low 25 / 100 High
Checkov visualization
radar

IaC Targets

TERRAFORM, CFN, K8S, ARM

Policies

2,500+

Frameworks

CIS, NIST, PCI, SOC2

License

APACHE 2.0