Skip to main content
InfraAudit integrates with your cloud accounts, Infrastructure-as-Code tooling, notification channels, and vulnerability scanning databases to give you a unified view of your infrastructure’s security, cost, and compliance posture. Each integration is independent — connect only what you need.

Cloud providers

Connect your cloud accounts to discover resources, detect drift, scan for vulnerabilities, and ingest billing data.

AWS

Connect via IAM credentials. Covers EC2, S3, RDS, Lambda, CloudFront, and Cost Explorer.

Google Cloud Platform

Connect via a service account JSON key. Covers Compute, Cloud Storage, BigQuery billing, and GKE.

Azure

Connect via a service principal. Covers VMs, Storage Accounts, and Cost Management.

Kubernetes

Register clusters via kubeconfig. Multi-cluster support with deployment and pod visibility.

Infrastructure as Code

Upload your IaC definitions so InfraAudit can detect drift between what your code declares and what’s actually running.

Terraform

Upload .tf files or ZIPs. InfraAudit compares declared resources against live state.

CloudFormation

Upload YAML or JSON templates. InfraAudit matches declared resources to live AWS inventory.

Notifications

Route alerts to the channels your team already uses.

Slack

Send formatted alerts to any Slack channel via incoming webhooks, with per-alert-type routing.

Webhooks

Register custom HTTP endpoints to receive any InfraAudit event as a signed JSON payload.

Security scanning

Trivy and NVD

Container image scanning powered by Trivy, enriched with CVSS scores and descriptions from the National Vulnerability Database.
You can connect as many providers as your plan allows. All connected accounts appear in a unified resource inventory and can be filtered by provider, region, or resource type.