Skip to main content
⏳ Estimated read time: 3 min read

Policy Violation

The Policy Violation tab in the Topology Canvas helps users identify and resolve compliance issues related to security, access control, and governance policies defined in StackGen. It ensures that cloud resources adhere to best practices, organisational policies, and regulatory requirements before deployment.

policy violation

Key Features

  • Automated detection of non-compliant configurations.
  • Real-time validation against security, networking, IAM, and cost governance policies.
  • Actionable recommendations to remediate policy violations.
  • Visibility into compliance risks before deploying infrastructure.

How It Works

Policy Enforcement

StackGen scans all resources in the Topology Canvas against both user-defined policies and built-in compliance standards. It includes built-in policies that align with major regulatory frameworks such as FedRAMP, GDPR, HIPAA, MARS-E, NIST-800-171, NIST-800-53, and NIST-CSF. If a resource has any misconfiguration or fails to meet compliance requirements, it is flagged as a violation.

Violation Reporting

Each policy violation is displayed with a description, severity level, and the affected resource(s). Users receive detailed insights into why the resource is non-compliant, helping them understand the impact of the violation.

StackGen provides automated recommendations to resolve policy violations. Users can apply the suggested changes directly within the Configure Resource panel to bring their infrastructure into compliance.

Common Policy Violations and Resolutions

Security Violations

ViolationDescriptionResolution
S3 Bucket with Public Access EnabledThe bucket is accessible to everyone, violating security policies.Disable public access and apply IAM-based controls.
VM Running Without EncryptionStorage or boot disk encryption is required but not enabled.Enable encryption using cloud provider settings.
IAM Role with Excessive PermissionsThe role has more permissions than necessary, violating least privilege policies.Restrict permissions to only what is required.

Network Violations

ViolationDescriptionResolution
Unrestricted Ingress Rule in Security GroupA security group allows inbound traffic from all IPs (0.0.0.0/0).Restrict access to trusted IPs or private networks.
Missing VPC Flow LogsNetwork traffic monitoring is disabled, violating compliance requirements.Enable VPC Flow Logs for auditing and visibility.

IAM and Access Control Violations

ViolationDescriptionResolution
User Has Full Admin Access Without JustificationA user account has full administrative access without documented approval.Restrict access and enforce RBAC.
Service Account Without Key Rotation PolicyA service account lacks an automated key rotation policy.Configure key rotation to improve security posture.

Cost Governance Violations

ViolationDescriptionResolution
Idle Compute Instances DetectedVM instances are running without activity, leading to unnecessary costs.Identify unused instances and shut them down.
Oversized Database InstancesThe provisioned database instance exceeds workload requirements.Resize to a more cost-effective instance type.

Severity Levels

Each violation is assigned a severity level to help prioritise remediation efforts:

  • Critical: High-risk issues that must be resolved before deployment.
  • Warning: Non-compliance that may not block deployment but requires attention.
  • Informational: Best-practice recommendations for improving security and efficiency.