TerraGoat
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.

TerraGoat
TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.
TerraGoat Description
TerraGoat is a deliberately vulnerable Terraform repository created by Bridgecrew that contains intentional cloud infrastructure misconfigurations. The tool serves as a training and testing environment for DevSecOps teams to understand common security issues in cloud deployments. It demonstrates various configuration errors that typically occur in production cloud environments across different cloud providers. TerraGoat enables security professionals to practice identifying and remediating infrastructure misconfigurations. The repository provides examples of vulnerable Terraform code that can be used to test policy-as-code frameworks and security scanning tools. The tool supports testing and validation of infrastructure security tools like Checkov and other static analysis solutions. It helps teams develop and refine their misconfiguration prevention strategies by providing realistic examples of problematic configurations. TerraGoat includes various types of cloud security misconfigurations spanning compute, storage, networking, and identity management services. The vulnerable configurations are designed to mirror real-world scenarios that security teams encounter in production environments.
TerraGoat FAQ
Common questions about TerraGoat including features, pricing, alternatives, and user reviews.
TerraGoat is TerraGoat is a deliberately vulnerable Terraform repository that demonstrates common cloud infrastructure misconfigurations for training and testing security tools.. It is a Cloud Security solution designed to help security teams with Cloud Security, Policy, Education.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox