Describe the drift
Start with a JSON AWS event or a plain-English issue description.
For AWS platform and cloud security teams
DriftGuard AI helps teams running Terraform in GitHub move from drift alert to remediation PR preview with risk context, generated HCL, local validation, and built-in safety checks.
Product promise: DriftGuard prepares reviewable PRs. It does not apply infrastructure changes.
The broken workflow
A drift alert lands. Someone opens AWS, checks Terraform, asks whether the change is risky, drafts HCL, runs validation, and writes a PR summary from memory. If the team is busy, the drift sits.
The DriftGuard workflow
DriftGuard starts with a drift description or event payload and produces the materials a reviewer needs: risk context, Terraform, validation evidence, and a policy-check result.
Start with a JSON AWS event or a plain-English issue description.
The graph triages, writes Terraform, runs terraform validate, and self-corrects failed HCL.
Dry-run mode renders a PR preview. Live mode can open a GitHub PR after validation and built-in policy checks pass.
Why teams care
Move from alert triage to a concrete Terraform PR preview in one repeatable run.
Attach security and cost impact context so reviewers understand the urgency.
Terraform validation and built-in guardrails block obvious unsafe remediation before GitHub writes.
No infrastructure is applied by the tool. Engineers review, approve, and merge.
How it works
DriftGuard is built around one monetizable workflow: AWS drift to validated Terraform remediation PR. It does not try to replace your CI/CD system, policy program, or review process.
Use cases
Turn public-access findings into explicit Terraform public access block remediation.
Turn public SSH ingress drift into a reviewed Terraform change that restores the approved network boundary.
Surface cost impact when a database is resized outside Terraform and prepare the rollback PR evidence.
Why not the usual workaround?
ChatGPT can draft HCL. DriftGuard is wired to the actual remediation loop: impact summary, Terraform validation, policy checks, and PR formatting.
Spreadsheets track drift. They do not produce reviewed Terraform changes or validation evidence.
Workflow glue can move alerts around. It does not understand Terraform correction loops or PR-ready remediation evidence.
Manual work is fine once. Repeated drift classes deserve a repeatable path from alert to reviewed fix.
Trust boundary
DriftGuard is useful because it narrows the job. It prepares a validated remediation PR for humans to review. It does not bypass your approval process.
Pilot access
Self-serve signup is not open yet. The right next step is a focused pilot: dry-run first, then supervised PR creation after your team reviews the output.
This page does not pretend signup is live. The brief gives you a concrete request to send to the DriftGuard maintainer or your internal platform lead.
Try the workflow online
The online demo includes three deterministic drift scenarios: S3 public access, security group exposure, and RDS instance class drift. It does not call AWS, GitHub, Terraform, or an LLM.
Compare security and cost drift through the same guided flow: input event, triage, impact, Terraform, validation, policy check, and PR preview.
FAQ
AWS teams using Terraform and GitHub that need faster, reviewable remediation for infrastructure drift.
It is wired to a specific remediation loop: triage, impact summary, Terraform generation, local validation, policy checks, and PR creation.
Python, Terraform CLI, an LLM provider key for real runs, and GitHub configuration for live PR creation. Dry-run demo mode does not need live keys.
The current repo redacts common secrets and account IDs before LLM prompts. Production deployments should add organization-specific DLP rules and durable audit controls.
Today this is a manual pilot request. The right next step is scoping one repo and one drift class before enabling supervised PR creation.
It reduces manual drift triage, HCL drafting, validation copy-paste, and PR summary writing. It does not replace human code review.
It does not provide billing, hosted ingestion, GitHub App auth, durable run history, full policy scanning, or auto-apply.