Skip to content

AI Cloud Architect — security at generation time

A–F Security Grade on Every Architecture

Security runs at generation time. Every architecture is scanned against a policy library, scored A–F, and hardened automatically. Findings appear when the code is ready, with inline fixes available.

Security · Posture Report
Security posture report for an Azure architecture showing a Grade B (84%) with categorised findings
AZURE · SECURITY GRADE
Grade B (84%) — findings grouped by category, click to jump to line

Policy library, applied automatically

The scanner runs against a policy library covering CIS, NIST, and HIPAA-aligned controls — encryption at rest and in transit, public-access blocks, audit logging, network isolation, identity least-privilege, key management, deletion protection, secret handling, and many more. Every check is mapped to the resource type and provider, so each finding identifies the specific resource at fault.

Coverage spans Terraform, Pulumi (TypeScript and Python), and Bicep. Pulumi findings map back to the original Pulumi files and lines, so the line-number you click is the line-number in your code.

Scored posture report

Findings are grouped by category — encryption, network, identity, logging, deletion-protection, and so on — with a per-category pass rate and an overall grade from A to F. Categories with no issues collapse out of the way; categories that need attention expand by default. The display surfaces what needs review.

Automatic security hardening runs at generation time, before the scan. The grade reflects what still needs human judgement after hardening has been applied.

Click a finding, jump to the line

Every finding is clickable. Click the file:line reference and the code editor opens to that line with a persistent highlight, so you can read the context that triggered the finding without losing your place.

Fix-with-AI on every finding

Some findings require architectural decisions automation cannot make for you — pick a customer-managed key, attach a WAF, place a resource behind a private endpoint, scope an IAM policy. For every one of those, Fix-with-AI sends the finding plus the relevant file context back through the pipeline and proposes a patch you can review in a diff editor before accepting.

When the fix touches multiple files, the multi-file flow patches every affected file in one pass and shows them as a tabbed diff.

Hardening before the scan

Automatic security hardening covers hundreds of resource types — TLS minimums on storage and load balancers, public-access blocks on buckets, deletion protection on databases, audit logging on key vaults, IMDSv2 on instances, customer-managed encryption companion resources where applicable. This runs before validation, so the code you see has already been hardened.

Related capabilities

Ready to design your next architecture?

Describe, sketch, or upload — diagram, code, security, cost, and docs in one flow.