Skip to main content

Multi-Cloud

Atmos was designed from the ground up to be cloud agnostic. It works with any cloud provider that Terraform supports. Cloud-specific integrations for authentication and stores are community supported.

Atmos is a framework that helps you orchestrate Terraform — whatever you can do in Terraform, you can do with Atmos. Teams use it across a diverse set of environments, from AWS to Azure to GCP, as well as managing other platforms like Cloudflare, DigitalOcean, GitHub, Hetzner, Akamai, Artifactory, Vercel, and the list goes on.

Atmos itself is not aware of your Terraform components or their providers. Stacks, components, inheritance, vendoring, workflows, and the terminal UI are all completely cloud-agnostic. The only cloud-specific features are authentication and stores, which have dedicated integrations for each provider. For simplification, many of our examples reference AWS since it is the most widely adopted cloud among our community, but the concepts apply regardless of which cloud you use.

Design Patterns

Atmos provides design patterns for organizing your stacks across clouds and application repositories.

  • Multi-Cloud Configuration — Organize your stacks so the directory layout mirrors how your cloud provider organizes its resources. Uses cloud-native terminology in folder names (AWS accounts, Azure subscriptions, GCP projects) so engineers immediately understand the layout. Includes a cloud organizational concept mapping table for translating between providers.

  • Application SDLC Environments — A minimal flat structure for application repositories that co-locate infrastructure alongside application code. One file per SDLC environment (dev.yaml, staging.yaml, prod.yaml) with support for ephemeral PR preview environments. Ideal for teams that want to get up and running quickly without deep organizational hierarchy.

Cloud Integrations

To explore how multi-cloud integrations are configured, here are some examples for each provider.

Authentication

Atmos supports multiple AWS authentication flows including SSO, SAML, and GitHub OIDC.

atmos.yaml

auth:
providers:
company-sso:
kind: aws/iam-identity-center
region: us-east-1
start_url: https://company.awsapps.com/start
auto_provision_identities: true

identities:
dev-admin:
kind: aws/permission-set
default: true
via:
provider: company-sso
principal:
name: AdminAccess
account:
name: development

Providers: aws/iam-identity-center, aws/saml, github/oidc Identities: aws/permission-set, aws/assume-role, aws/assume-root, aws/user

Stores

  • AWS SSM Parameter Store: aws-ssm-parameter-store

Terraform Backend

  • S3 + DynamoDB — Remote state with locking

Learn more: Auth Providers · Identities · Stores

AWS Reference Architecture

Cloud Posse provides a commercial reference architecture built on top of Atmos for AWS. If you're using AWS, this is the fastest way to get started with a production-ready foundation that includes hundreds of pre-built components, proven design patterns, and ongoing support.

Ready to get started?

Try Atmos with your cloud provider of choice. The quick start guide walks you through your first deployment.