Introducing the Nirmata Cloud Controller: Preventive Cloud Governance at Scale

20 February 2026

Introducing the Nirmata Cloud Controller: Preventive Cloud Governance at Scale

Introducing the Nirmata Cloud Controller Preventive Cloud Governance at Scale

Cloud governance has a timing problem.

Most organizations discover cloud misconfigurations after they happen, through CSPM dashboards, CNAPP alerts, or tickets that arrive long after the risky change is already live. By then, platform teams are stuck reacting instead of preventing.

The Nirmata Cloud Controller (NCC) changes that model by bringing preventive, policy-as-code governance directly to the cloud API layer, while still providing continuous compliance and visibility as environments evolve.

For platform engineers, Cloud Controller acts as a central control plane for governing cloud actions, cloud drift, and cloud posture, using the same Kyverno-style policies and reporting models they already trust in Kubernetes.

What Is the Nirmata Cloud Controller?

The Nirmata Cloud Controller is a preventive cloud governance platform that enforces policy-as-code on AWS API requests in real time while continuously scanning cloud environments for drift and compliance gaps.

Unlike traditional CSPM or CNAPP tools that detect issues after deployment, Cloud Controller can block non-compliant cloud changes before they are applied.

Stop Risky Cloud Changes The Moment They Happen

The defining capability of the Nirmata Cloud Controller is admission-style control for cloud APIs.

Instead of only scanning for issues later, Cloud Controller can intercept AWS API requests in real-time, evaluate them against policy, and decide whether they should be allowed at all.

Cloud Admission Controller

CLI / SDK / Automation

        |

        v

Nirmata Cloud Admission Controller

        |

   Kyverno Policy Evaluation

        |

   Allow ✅        Deny ❌

        |

        v

     AWS APIs

This applies to:

  • AWS CLI commands
  • Automation and pipelines
  • Scripts and tooling
  • Any direct API-driven cloud change

This is true preventive governance, not just visibility after the fact.

How the Cloud Controller Works

Cloud Controller consists of two complementary control paths:

1. Inline Enforcement (Admission Control)

  • Intercepts AWS API calls
  • Evaluates requests against selected Kyverno JSON policies
  • Blocks or allows changes before AWS applies them

2. Continuous Scanning (Drift & Legacy Detection)

  • Periodically scans existing cloud resources
  • Evaluates real-world state (not just IaC)
  • Produces standardized policy reports

Together, these cover both new changes and existing environments.

Continuous Compliance When Reality Drifts from IaC

Even the best IaC practices don’t capture everything.

Cloud environments drift due to:

  • Console changes
  • Emergency fixes
  • Manual overrides
  • Third-party automation

The Cloud Scanner addresses this gap.

 

Cloud Scanner Flow

Kubernetes Cluster

        |

        v

Cloud Scanner Pod

        |

AWS Cloud Control API

        |

        v

Current Resource State

        |

Kyverno JSON Policies

        |

        v

Policy Reports (CRDs)

Key Characteristics:

  • Runs inside your Kubernetes cluster
    • Uses the AWS Cloud Control API for consistent access across services
  • Evaluates resources using Kyverno JSON policies
  • Generates policy reports on a configurable schedule

This ensures governance stays accurate even as environments evolve.

Kyverno-Style Policies Extended Beyond Kubernetes

One of the biggest differentiators of the Nirmata Cloud Controller is consistency.

If you already use Kyverno for Kubernetes you don’t need to:

  • Learn a new policy model
  • Manage a separate reporting system
  • Fragment governance across tools

Cloud Controller intentionally mirrors the Kyverno experience:

  • Policy-as-code enforcement
  • Label-based policy selection
  • Policy reports aligned with Kubernetes Policy WG formats

Unified Governance Model

Kyverno Policies

      |

      +– Kubernetes Admission Control

      |

      +– Cloud Admission Control (AWS APIs)

      |

      +– Cloud Scanner (Drift & Legacy)

This makes cloud governance feel like a natural extension of Kubernetes governance, not a parallel system.

Built for Large AWS Organizations

Enterprises don’t operate in single AWS accounts and Cloud Controller reflects that reality.

Using AWSOrgConfig, Cloud Controller can:

  • Discover AWS Organizations recursively
  • Traverse OUs and accounts
  • Automatically create AWSAccountConfig resources
  • Discover EKS clusters via ClusterConfig

Enterprise Discovery Model

This drastically reduces onboarding effort and enables governance to scale without manual configuration per account.

Standardized Policy Reporting for Platform Teams

Cloud Controller produces Kubernetes-native policy reports as CRDs.

These reports:

  • Contain results of applying ValidatingPolicy and ImageVerificationPolicy
  • Are generated per account or globally
  • Follow open Kubernetes Policy WG formats
  • Fit naturally into existing governance workflows

For platform engineers, this means:

  • One reporting mental model
  • Easier integration with dashboards and automation
  • No translation between cloud and Kubernetes governance data

Unified Governance Across Pipelines, Clusters, and Cloud

Cloud Controller is a core part of the Nirmata Cloud Hub (NCH).

Instead of fragmented tools for:

  • CI/CD pipelines
  • Kubernetes clusters
  • Cloud resources

Platform teams get a single source control hub for governance visibility across all 3 layers.

Unified Governance View

Pipelines ──┐

Clusters  ──┼── Nirmata Cloud Hub

Cloud      ──┘

 

This helps platform teams reason about risk holistically, not in isolated silos.

 

How is Cloud Controller Different from CSPM and CNAPP?

CSPM and CNAPP tools tell you what went wrong.

Cloud Controller helps ensure it never happens in the first place.

Key Differences

Traditional CSPM / CNAPP Nirmata Cloud Controller
Detect after deployment Prevent at API boundary
Ticket and alert driven Allow / deny enforcement
Separate policy models Kyverno-native policies
Visibility-focused Control + visibility
Account-by-account setup Org-aware discovery

 

Cloud Controller doesn’t replace visibility tools, it adds a control layer they fundamentally lack.

How to Get Started with Nirmata Cloud Controller

A typical onboarding flow looks like this:

  1. Deploy Cloud Controller into Kubernetes
  2. Configure AWS access and org discovery
  3. Define Kyverno JSON policies
  4. Start in scan-only mode
  5. Enable admission control selectively
  6. Expand coverage across accounts and services

This enables progressive adoption, reducing risk and friction.

From Reactive Cloud Governance to Preventative Platform Control

The Nirmata Cloud Controller represents a shift from reactive cloud governance to preventive platform control.

By combining:

  • Admission-style enforcement at the cloud API boundary
  • Continuous scanning for drift and legacy resources
  • Kyverno-style policies and standardized reports
  • Enterprise-grade AWS organization discovery

It gives platform engineers a practical way to govern cloud environments at scale, without slowing teams down.

Cloud governance doesn’t have to be a cleanup exercise anymore. With Nirmata Cloud Controller, it becomes a first-class platform capability.

Infrastructure Change Is Outpacing Human Governance
AI, Open Source, and the Human Bottleneck

Latest

From the blog

The latest industry news, interviews, technologies, and resources.

View all blogs
AI Bots Are Now Exploiting Your Automation — And Kubernetes Is Next
AI Bots Are Now Exploiting Your Automation — And Kubernetes Is Next

Last week, an autonomous bot called hackerbot-claw — describing itself as “an autonomous security research agent powered by claude-opus-4-5” —…

AI Without Guardrails: How Ungoverned AI Amplifies Cloud Risk and Unpredictable Costs
AI Without Guardrails: How Ungoverned AI Amplifies Cloud Risk and Unpredictable Costs

AI has dramatically lowered the friction to create infrastructure. Developers can now generate Kubernetes manifests, Terraform modules, and CI/CD pipelines…