TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Abbey – Automate access management to infrastructure with Terraform

30 pointsby jeffchaoover 1 year ago
Hi HN. We’ve been building Abbey and happy to share our beta with you: <a href="https:&#x2F;&#x2F;abbey.io" rel="nofollow noreferrer">https:&#x2F;&#x2F;abbey.io</a>. Abbey makes it easy for engineers to configure how their infrastructure is accessed by other employees in the company. This is especially useful when your company outgrows giving admin access to everyone all the time, typically driven by compliance requirements. With Abbey, you use your existing Terraform setup to configure workflows and policies for how people are granted&#x2F;revoked access to your services. Your end users then use a web app to request access to resources they need and you can approve&#x2F;deny access with an audit trail of all access changes.<p>Why we built this:<p>I&#x27;ve been an engineer for a long time where operating infrastructure at scale and moving quickly was always top-of-mind. However, after a certain point, moving safely becomes just as important, except I&#x27;ve usually had a ton of friction trying to balance shipping software and adhering to requirements given to me by security or compliance teams. As the owner of infrastructure services, I have the most context into how my systems work, so what I really wanted was tooling that could help me implement the most undifferentiated security&#x2F;compliance controls so I could work on other things.<p>What’s in the beta:<p>- Bring your existing setup, whether it’s Terraform Cloud, OpenTF, Atlantis, Spacelift, env0, or Digger.<p>- Workflows - for how someone should get access (who needs to review, how many steps, etc)<p>- Policies - Open Policy Agent policies for granting and revoking access (based on time or if someone’s role or attribute changes)<p>- Native Terraform output - to keep Abbey off the critical path and so you can avoid vendor lock-in<p>- Web app - for your end users to request for access and for you to approve&#x2F;deny requests with an audit trail<p>- Open API to integrate or build your own UI if you want<p>- Integrate incrementally - you should continue using your own CI&#x2F;CD, host your own secrets&#x2F;repo&#x2F;terraform state. Abbey doesn’t touch any of that. We&#x27;re a control plane for your IAM infrastructure that tells your system when it&#x27;s ok to do the `terraform apply`. This means you can enable this flow for any number of resources.<p>We&#x27;re early so we&#x27;d love your feedback. Feel free to try us out for free and let us know what you think here or in our Slack (<a href="https:&#x2F;&#x2F;join.slack.com&#x2F;t&#x2F;abbey-io&#x2F;shared_invite&#x2F;zt-22ivaaw75-JOENp8ftqqnSWwKVWC7zSw" rel="nofollow noreferrer">https:&#x2F;&#x2F;join.slack.com&#x2F;t&#x2F;abbey-io&#x2F;shared_invite&#x2F;zt-22ivaaw75...</a>).<p>Main site: <a href="https:&#x2F;&#x2F;abbey.io" rel="nofollow noreferrer">https:&#x2F;&#x2F;abbey.io</a><p>Docs: <a href="https:&#x2F;&#x2F;docs.abbey.io" rel="nofollow noreferrer">https:&#x2F;&#x2F;docs.abbey.io</a>

2 comments

amoghvkover 1 year ago
The Google groups expiration feature is interesting and useful
OzRabinovitchover 1 year ago
Love the free version