Greenfield Generation
Starting a new cloud project? Generate Terraform modules that are compliant from day one.
Initialize a compliant project
Section titled “Initialize a compliant project”Run complyform init to scaffold a Terraform module that satisfies your target frameworks.
complyform init --cloud=gcp --frameworks=soc2,hipaaThis generates a complete Terraform module directory:
complyform-output/├── main.tf # Compliant resource definitions├── variables.tf # Input variables with secure defaults├── outputs.tf # Standard outputs├── terraform.tfvars.example # Example variable values├── README.md # Module documentation└── modules/ ├── compute/ ├── storage/ └── database/Every resource definition includes the configuration required by the selected frameworks — encryption keys, IAM bindings, logging, network restrictions.
Select specific services
Section titled “Select specific services”By default, init generates resources for all supported services. Narrow the scope with --services:
complyform init --cloud=gcp --frameworks=soc2 --services=compute,storage,databaseAvailable service groups vary by cloud provider. Run complyform init --cloud=gcp --help to list them.
Multi-framework generation
Section titled “Multi-framework generation”When you specify multiple frameworks, ComplyForm takes the union of all control requirements. If SOC 2 requires encryption at rest and HIPAA requires audit logging, the generated module includes both. No controls are dropped.
complyform init --cloud=aws --frameworks=soc2,hipaa,iso27001Customize the output
Section titled “Customize the output”Generated files are standard Terraform — modify them freely. Add your own resources, adjust variable defaults, integrate with existing modules. The generated code is yours.
After making changes, re-check compliance:
complyform assess --frameworks=soc2,hipaaThis catches any regressions introduced by your edits.
Example: GCP project with SOC 2 and HIPAA
Section titled “Example: GCP project with SOC 2 and HIPAA”# Generate the modulecomplyform init --cloud=gcp --frameworks=soc2,hipaa --services=compute,database
# Review generated resourcesls complyform-output/
# Customize, then validatecd complyform-outputcomplyform validate
# Deployterraform initterraform planterraform applyNext steps
Section titled “Next steps”complyform init— full init options and service groupscomplyform validate— pre-deploy compliance checks- Brownfield Assessment — assess existing infrastructure