Spacelift layers automation, policy enforcement, and collaboration on top of Terraform with a GitOps model. It adds drift detection, granular RBAC, OPA policies, secure state options, and clear run history.
Terraform alone needs scripts for plans, applies, state, and approvals. Spacelift centralizes this with built-in CI/CD workflows, policy-as-code, drift detection, and fine-grained RBAC to standardize how infrastructure changes move from pull request to production.
Spacelift can manage Terraform state with an optional encrypted backend, or it respects your configured backends like S3 or Azure Blob. For drift, it schedules or triggers proposed runs that compare desired and actual state and highlights differences, with the option to reconcile automatically. Drift reports surface in the UI and can send notifications.
Yes. OPA and Rego apply fine-grained rules for approvals, resource guardrails, and environment controls, with tagging standards and role or branch gates plus full auditability.
Spacelift centralizes workflows around version control with RBAC, shared modules, review gates, and plan previews on pull requests, so teams coordinate changes without collisions. Policy-as-code enforces consistent rules across stacks, while drift detection and approvals keep everyone aligned and reduce rework.