Continuous compliance
Continuous Compliance

The same policy engine
keeps running after deploy.

Compliance is enforced at the gate, audited in live infrastructure, and turned into dashboards and reports from one OPA/Rego system instead of a stack of separate tools.

Same OPA/Rego engine before and after deploy
27+ frameworks with 47 SOC 2 controls defined
State-based scans plus deployment gates
Executive dashboards and shareable snapshot reports
ops0 compliance overview
LIVE POSTURE
Compliance posture

91% control coverage across 34 monitored projects, with one blocking violation stopped before deploy and three live issues awaiting review.

SOC 2
41 / 47
ISO 27001
Aligned
Live scans
3 flagged
Reports
Ready
Compliance lifecycle
Pre-deploy gateOPA blocked public exposure on one database plan
State-based scan3 live violations across 2 projects
Share reportSnapshot link ready for auditor review
Framework coverage
SOC 2ISO 27001CISHIPAAPCI-DSSSTIG
→ Open executive dashboardSnapshot report ready to share
One Engine

The same policy engine blocks bad deploys and audits live state.

ops0 does not split compliance into separate products. The same OPA/Rego engine that evaluates Terraform plans before deploy also scans already-running infrastructure after deploy.

  • Pre-deployment policy checks catch violations before resources are created
  • State-based scans audit infrastructure that is already live
  • One rule engine means one source of truth instead of parallel policy systems
Pre-Deploy

Compliance shows up before audit time.

Plan JSON runs through organization-defined Rego policies before approval. Violations can warn or block, and teams see the issue while the change is still easy to fix.

  • Policy checks run before apply starts
  • Blocking and non-blocking findings are clearly separated
  • Useful for encryption, exposure, tagging, IAM, and change-control rules
Post-Deploy

Already-running infrastructure stays under review.

Compliance does not end when the apply succeeds. ops0 scans deployed resources against attached policy groups at any time, so drift and legacy gaps do not hide until the next audit.

  • Scans can run independently from deployment events
  • Manual console changes are pulled back into the compliance view
  • Useful for legacy estates and long-lived infrastructure that predates current policy
Frameworks

Built-in frameworks, not a blank policy editor.

ops0 ships with 27+ frameworks and 47 fully defined SOC 2 controls, so teams can start from real coverage instead of writing every policy from scratch.

  • SOC 2, ISO 27001, CIS, HIPAA, GDPR, PCI-DSS, STIG, and more
  • SOC 2 controls grouped across governance, access, hardening, monitoring, and incident response
  • Cross-mapping helps teams align one control system to multiple frameworks
Evidence

Auditors get proof, not a scramble.

ops0 produces shareable snapshot reports and executive dashboards from the same compliance data that drives the engine. The audit story is already assembled while the work is happening.

  • Password-protected share links with frozen point-in-time posture
  • PDF export, report IDs, access logging, and revocation controls
  • Executive dashboards communicate posture without requiring platform access
Shift Left

Misconfigurations can be caught before the plan too.

Checkov scanning adds authoring-time security to Terraform and OpenTofu files, so infrastructure issues can be surfaced even before a deployable plan exists.

  • Background scanning for IaC file vulnerabilities and misconfigurations
  • Findings persist with severity and remediation context
  • Complements OPA plan checks instead of replacing them
Next Move

The same posture
should reach runtime too.

After compliance, the next surface is Kubernetes: incidents, costs, vulnerabilities, certificates, and IaC linkage in one operating view.

Make compliance continuous, not ceremonial.

From code to cloud in
minutes, not days.

All services are online
ops0 binary code decoration