Verifying compliance.tf Modules: From Guardrails to Audit Evidence
Compliance.tf (CTF) modules are designed to make non-compliant infrastructure effectively impossible to create for the controls they cover. Controls are enforced inside the modules through safe defaults, validation rules, and restricted configuration surfaces, as described in the first part of this series.
But if you are on a security or audit team, you still need to answer a simple question: how do we know it really works?
This article walks through how to verify CTF modules in practice, how IaC scanners and infrastructure scanners each play a role, and what kind of audit evidence you can expect.