<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Iac on Pi Stack</title><link>https://www.pistack.xyz/tags/iac/</link><description>Recent content in Iac on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/iac/index.xml" rel="self" type="application/rss+xml"/><item><title>Checkov vs tfsec vs Trivy: Self-Hosted IaC Security Scanning 2026</title><link>https://www.pistack.xyz/posts/checkov-vs-tfsec-vs-trivy-self-hosted-iac-security-scanning-2026/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/checkov-vs-tfsec-vs-trivy-self-hosted-iac-security-scanning-2026/</guid><description>&lt;p>Infrastructure-as-code has become the standard for provisioning cloud resources, &lt;a href="https://kubernetes.io/">kubernetes&lt;/a> clusters, and container deployments. But with every Terraform module, Helm chart, and &lt;a href="https://www.docker.com/">docker&lt;/a>file committed to version control comes a critical question: &lt;strong>is your infrastructure configuration actually secure?&lt;/strong>&lt;/p></description></item></channel></rss>