Checkov
A static analysis tool for Infrastructure as Code that scans Terraform, CloudFormation, Kubernetes, Helm, ARM, and Serverless configurations for security misconfigurations and compliance violations.
Developer
Bridgecrew (Palo Alto Networks)
description Technical Dossier
Checkov is a static analysis tool purpose-built for Infrastructure as Code security, developed by Bridgecrew (acquired by Palo Alto Networks in 2021) and released under the Apache 2.0 license. It scans IaC configuration files before deployment to detect security misconfigurations, compliance violations, and infrastructure anti-patterns that could lead to data exposure, privilege escalation, or service compromise in cloud environments.
The tool supports all major IaC frameworks: Terraform (both HCL source and JSON plan files), AWS CloudFormation, Azure ARM and Bicep templates, Kubernetes manifests, Helm charts, Serverless Framework configurations, and Dockerfiles. Checkov ships with over 2,500 built-in policies covering AWS, Azure, and GCP resource configurations. Its graph-based analysis engine is a key differentiator — rather than evaluating resources in isolation, Checkov builds a dependency graph that models relationships between resources, enabling checks like “this S3 bucket is referenced by a CloudFront distribution that lacks a WAF” or “this IAM role can assume a role in another account with admin privileges.”
Policies map to established compliance frameworks including CIS Benchmarks for AWS/Azure/GCP, PCI-DSS, HIPAA, SOC2, NIST 800-53, and GDPR, producing framework-aligned reports for audit teams. Custom policies can be authored in Python for complex logic or in a declarative YAML format for simpler attribute and connection checks. Checkov integrates into development workflows via pre-commit hooks, GitHub Actions, GitLab CI, and VS Code extension, with SARIF output for surfacing findings directly in GitHub Advanced Security. As part of the Palo Alto Prisma Cloud ecosystem, Checkov findings can feed into the broader cloud security posture management platform for centralised policy enforcement.
scan Broad IaC Coverage
Analyses Terraform (HCL & plan files), CloudFormation, Kubernetes, Helm, ARM templates, Serverless Framework, Bicep, and Dockerfiles.
account_tree Graph-Based Analysis
Builds a resource dependency graph to evaluate cross-resource relationships — detecting issues like security groups referencing public subnets or IAM roles with excessive scope.
edit_note Custom Policies
Define custom checks in Python or YAML, or use the visual policy editor in Prisma Cloud. Supports attribute, connection, and composite policies.
integration_instructions CI/CD & IDE Integration
Pre-commit hooks, GitHub Actions, GitLab CI, Jenkins, and VS Code extension. Supports SARIF output for GitHub Advanced Security integration.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

IaC Targets
TERRAFORM, CFN, K8S, ARM
Policies
2,500+
Frameworks
CIS, NIST, PCI, SOC2
License
APACHE 2.0