Describe the drift
Start with a JSON AWS event or a plain-English issue description.
For AWS platform and cloud security teams
DriftGuard AI helps teams running Terraform in GitHub move from drift alert to remediation PR preview with risk context, generated HCL, local validation, and built-in safety checks.
Product promise: DriftGuard prepares reviewable PRs. It does not apply infrastructure changes.
The broken workflow
A drift alert lands. Someone opens AWS, checks Terraform, asks whether the change is risky, drafts HCL, runs validation, and writes a PR summary from memory. If the team is busy, the drift sits.
The DriftGuard workflow
DriftGuard starts with a drift description or event payload and produces the materials a reviewer needs: risk context, Terraform, validation evidence, and a policy-check result.
Start with a JSON AWS event or a plain-English issue description.
The graph triages, writes Terraform, runs terraform validate, and self-corrects failed HCL.
Dry-run mode renders a PR preview. Live mode can open a GitHub PR after validation and built-in policy checks pass.
Why teams care
Move from alert triage to a concrete Terraform PR preview in one repeatable run.
Attach security and cost impact context so reviewers understand the urgency.
Terraform validation and built-in guardrails block obvious unsafe remediation before GitHub writes.
No infrastructure is applied by the tool. Engineers review, approve, and merge.
How it works
DriftGuard is built around one monetizable workflow: AWS drift to validated Terraform remediation PR. It does not try to replace your CI/CD system, policy program, or review process.
Use cases
Turn public-access findings into explicit Terraform public access block remediation.
Catch and block obvious public SSH/RDP remediation mistakes before a PR is opened.
Put impact, validation output, and policy-check results directly into the pull request.
Convert repeated drift tickets into standardized PR-ready remediation work.
Why not the usual workaround?
ChatGPT can draft HCL. DriftGuard is wired to the actual remediation loop: impact summary, Terraform validation, policy checks, and PR formatting.
Spreadsheets track drift. They do not produce reviewed Terraform changes or validation evidence.
Workflow glue can move alerts around. It does not understand Terraform correction loops or PR-ready remediation evidence.
Manual work is fine once. Repeated drift classes deserve a repeatable path from alert to reviewed fix.
Trust boundary
DriftGuard is useful because it narrows the job. It prepares a validated remediation PR for humans to review. It does not bypass your approval process.
Pilot access
Self-serve signup is not open yet. The right next step is a focused pilot: dry-run first, then supervised PR creation after your team reviews the output.
This page does not pretend signup is live. The brief gives you a concrete request to send to the DriftGuard maintainer or your internal platform lead.
Try the workflow online
The online demo uses the sample S3 drift event and deterministic dry-run output. It does not call AWS, GitHub, or an LLM.
See the drift event, triage result, generated Terraform, validation result, policy check, and PR preview in one guided interface.
FAQ
AWS teams using Terraform and GitHub that need faster, reviewable remediation for infrastructure drift.
It is wired to a specific remediation loop: triage, impact summary, Terraform generation, local validation, policy checks, and PR creation.
Python, Terraform CLI, an LLM provider key for real runs, and GitHub configuration for live PR creation. Dry-run demo mode does not need live keys.
The current repo redacts common secrets and account IDs before LLM prompts. Production deployments should add organization-specific DLP rules and durable audit controls.
Today this is a manual pilot request. The right next step is scoping one repo and one drift class before enabling supervised PR creation.
It reduces manual drift triage, HCL drafting, validation copy-paste, and PR summary writing. It does not replace human code review.
It does not provide billing, hosted ingestion, GitHub App auth, durable run history, full policy scanning, or auto-apply.