Checkmarx IaC Security is the Infrastructure-as-Code scanner inside the Checkmarx One Cloud pillar. It is built on **KICS** (Keeping Infrastructure as Code Secure), the open-source engine Checkmarx maintains. KICS scans Terraform (HCL), CloudFormation (YAML and JSON), Kubernetes manifests, Helm charts, Dockerfiles, Ansible playbooks, Azure Resource Manager templates, OpenAPI specs, and CDK output. The open-source roots matter because customers can audit the rule set, contribute custom rules upstream, and verify that the engine is doing what it claims.
PR-time policy gates are the load-bearing capability for shifting left. IaC misconfigurations (public S3 buckets, overly-permissive IAM roles, unencrypted database snapshots, Kubernetes pods running as root) are easy to introduce and hard to catch after deployment. Checkmarx IaC Security scans the Terraform or CloudFormation diff at PR time, posts findings as PR comments on the changed resources, and gates the merge based on severity and policy. Programs that catch IaC misconfigurations at PR time spend a fraction of the operational effort that programs catching them post-deploy do.
Compare honestly to Checkov and Bridgecrew (now Prisma Cloud). Checkov is open-source, Python-based, and the established alternative. Bridgecrew (now part of Prisma Cloud) commercializes Checkov. KICS is open-source, Go-based, and the engine behind Checkmarx IaC Security. The technical differences are modest; the integration story differs. Programs picking Checkmarx IaC Security usually want consolidation with SAST, SCA, DAST, and Container Security inside Checkmarx One. Programs picking Checkov stay open-source. Both are valid.
What derails IaC Security adoption is rule-set drift and rule-set noise. Default rules generate findings on every minor convention deviation regardless of whether the deviation matters in this environment. Merito's engagement starts with rule-set tuning to the customer's actual cloud provider mix (AWS-heavy programs do not need Azure-specific rules tripping on every scan), application of compensating-control logic (a finding flagged on an internal-only resource may not need PR-time blocking), and policy-as-code authoring so internal cloud standards become enforceable scanner rules.
Ideal use cases
- Terraform, CloudFormation, Kubernetes, Helm, Docker, Ansible, ARM scanning
- PR-time IaC gates inside the customer's CI fabric
- Custom policy-as-code authoring for internal cloud standards
- IaC findings integrated with Container Security on Kubernetes manifests
- IaC compliance for PCI DSS, HIPAA, FedRAMP, SOC 2, and CIS benchmarks