Skip to content

Greenfield Generation

Starting a new cloud project? Generate Terraform modules that are compliant from day one.

Run complyform init to scaffold a Terraform module that satisfies your target frameworks.

Terminal window
complyform init --cloud=gcp --frameworks=soc2,hipaa

This generates a complete Terraform module directory:

complyform-output/
├── main.tf # Compliant resource definitions
├── variables.tf # Input variables with secure defaults
├── outputs.tf # Standard outputs
├── terraform.tfvars.example # Example variable values
├── README.md # Module documentation
└── modules/
├── compute/
├── storage/
└── database/

Every resource definition includes the configuration required by the selected frameworks — encryption keys, IAM bindings, logging, network restrictions.

By default, init generates resources for all supported services. Narrow the scope with --services:

Terminal window
complyform init --cloud=gcp --frameworks=soc2 --services=compute,storage,database

Available service groups vary by cloud provider. Run complyform init --cloud=gcp --help to list them.

When you specify multiple frameworks, ComplyForm takes the union of all control requirements. If SOC 2 requires encryption at rest and HIPAA requires audit logging, the generated module includes both. No controls are dropped.

Terminal window
complyform init --cloud=aws --frameworks=soc2,hipaa,iso27001

Generated files are standard Terraform — modify them freely. Add your own resources, adjust variable defaults, integrate with existing modules. The generated code is yours.

After making changes, re-check compliance:

Terminal window
complyform assess --frameworks=soc2,hipaa

This catches any regressions introduced by your edits.

Terminal window
# Generate the module
complyform init --cloud=gcp --frameworks=soc2,hipaa --services=compute,database
# Review generated resources
ls complyform-output/
# Customize, then validate
cd complyform-output
complyform validate
# Deploy
terraform init
terraform plan
terraform apply