Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Security icon

Assess Readiness and Value for Policy-as-Code

Chart the right path toward value realization with automated policy management.

Rapid changes to security and compliance requirements are outpacing many organizations’ ability to manage and enforce policies across modern infrastructure and delivery environments. Manual processes, inconsistent controls, and fragmented ownership further undermine enforcement. Policy-as-code (PaC) offers a path to codifying and automatically evaluating policies for enforcement but blindly rushing to adoption carries its own risks. This research offers a step-by-step framework to understand PaC’s potential value and your organization’s readiness for adoption.

PaC is sometimes approached as an out-of-the-box enforcement solution, without understanding the strategic, cultural, and procedural shifts required for successful adoption. IT and security leaders must treat PaC as a strategic initiative to be carefully evaluated for suitability and alignment with the security and compliance needs of the organization. Without that foundation, implementing PaC risks codifying existing problems, heightening risk, and degrading delivery performance instead of solving issues.

1. Assess before you adopt.

Treating PaC as plug-and-play automation creates more problems than it solves. Effective adoption starts with an assessment of PaC’s value and a multidimensional view of the organization’s readiness, spanning technical integration, governance, team skills, and metrics. Without this context, PaC risks adding overhead instead of meaningful benefits.

2. Clarify value to gain perspective.

Before investing effort into PaC, organizations must assess whether it will solve their unique challenges. IT leaders must clarify where PaC can drive value – such as compliance automation, infrastructure guardrails, or audit readiness – and whether the organization is ready to unlock that value.

3. Look beyond technical capabilities.

On its own, PaC is just a tool. Deploying it effectively will hinge on the quality of your policies, policy governance structures, and team skills. If those fundamentals are weak, PaC’s benefit to your organization will be limited.

Use this step-by-step research to determine your organization’s readiness for policy-as-code adoption

Our research offers a multistep framework supported by a value and readiness assessment tool to evaluate your organization’s PaC suitability and preparedness. Use these insights and resources to identify where automation can support policy management and enforcement and chart a path to adoption.

  • Complete the value drivers and readiness surveys to understand the potential benefits of PaC for your organization and identify readiness gaps.
  • Review the results of your assessments using a decision matrix to determine whether to move forward, delay, or improve readiness before adoption.
  • Develop next steps to improve readiness, if needed, by reviewing current and target states and using a component-based approach to identify areas where PaC readiness can be improved across four categories.

Assess Readiness and Value for Policy-as-Code Research & Tools

1. Assess Readiness and Value for Policy-as-Code – A practical framework to help you assess the potential of automated policy management and enforcement in your organization.

This research helps organizations understand policy-as-code (PaC): the practice of turning security and compliance rules into automatically enforceable code. Use value and readiness tools to:

  • Assess how much value PaC can bring to your organization.
  • Determine readiness to adopt PaC.
  • Get next steps based on value and readiness scores.

2. Policy-as-Code Value & Readiness Assessment Tool – An Excel-based workbook to identify your organization’s unique PaC context.

Work through this simple-to-use tool to inform your organization’s decision on whether to adopt PaC.

  • Survey stakeholders to gather input on value drivers and readiness dimensions.
  • View dashboard results to determine high-level recommendations.
  • Conduct optional target state planning to close readiness gaps.

Assess Readiness and Value for Policy-as-Code

Chart the right path toward value realization with automated policy management.

Analyst perspective

Get clarity on value and readiness before adopting or dismissing policy-as-code.

The concept of policy-as-code (PaC) – the idea that policies can be codified and automatically evaluated for enforcement – emerged about a decade ago as a response to fragmented policy enforcement and the operational strain faced by security and compliance teams. Yet, despite growing interest in PaC and success stories from large enterprises, adoption by most organizations remains relatively limited.

The fact that PaC remains underutilized is especially surprising given the mainstream adoption of automation in modern DevOps workflows and infrastructure-as-code (IaC), which provide a strong technical foundation for PaC implementation. However, this exact disconnect highlights a key barrier to PaC adoption for many organizations: not the lack of a technical foundation but the lack of stakeholder awareness – of PaC as a whole, or of the non-technical readiness required to adopt it successfully and realize its true benefits.

In the right organizational context, PaC adoption is more than a tooling rollout: it's a strategic process that brings stakeholders together, clarifies true policy intent, and establishes enforceable defaults. Conversely, treating PaC as a plug-and-play extension of IaC risks premature implementation that only codifies chaos, heightens security risk, and degrades delivery performance.

Treat PaC like the strategic initiative it is, and take the time to understand how it fits your organization, the value it offers, and whether you're ready to adopt it.

A picture of Seva Ioussoufovitch

Seva Ioussoufovitch
Senior Research Analyst, Security & Privacy
Info-Tech Research Group

Executive summary

Your Challenge

Security and compliance policies are inconsistently enforced due to manual processes, undocumented or variable controls, fragmented ownership, and lack of coordination.

Traditional processes can't keep up: policy changes outpace change management, manual audits add significant overhead, and late-stage reviews bottleneck delivery.

Policy-as-code (PaC) is emerging as a core capability for automated enforcement, but your organization has not effectively adopted it.

Common Obstacles

Some stakeholders lack awareness of PaC or may be resistant to change. PaC remains a relatively niche topic, which many stakeholders approach with caution or uncertainty.

Others view PaC as a plug-and-play, policy enforcement panacea, and rush implementation while overlooking critical readiness components that are necessary for effective adoption.

PaC initiatives stall due to unclear policy governance processes, insufficient team technical skills, and inadequate integration strategies.

Info-Tech's Approach

Thoughtfully assess your unique organizational context before implementing PaC:

Confirm key value drivers and clarify how PaC will deliver meaningful value to your organization.

Evaluate readiness across multiple dimensions including technical foundations, governance models, and team skills.

Use the results of your assessments to define next steps. Develop targeted actions to improve readiness and support effective PaC adoption.

Info-Tech Insight

Treating PaC as plug-and-play automation will create more problems than it solves. Effective PaC adoption begins with an evaluation of value and a multidimensional view of readiness that considers technical integration, governance, team skills, and metrics. This context is critical to determining whether PaC will deliver meaningful benefits to your organization or just add unexpected overhead.

Your challenge

Consistent enforcement remains elusive, despite advances in tooling and automation.

  • Organizations still struggle with inconsistent enforcement of security and compliance policies. This inconsistency, which spans development, staging, and production environments, is driven by manual processes, undocumented or inconsistent controls, fragmented ownership, and limited coordination. In large enterprises, frequent team transitions and M&A activities further compound these challenges.
  • Policy automation lags delivery automation. Despite the growing adoption of both infrastructure-as-code and automation in modern DevOps practices, only 30% of organizations report using policy-as-code (PaC) in a significant capacity for compliance automation.

Identifying key barriers to the adoption of automation best practices demands a careful assessment of an organization's unique context beyond technical readiness to implement.

5% Only 5% of CISOs consider their compliance program to be optimized.
Source: The CISO Society, 2025.
30% Less than a third of organizations report using policy-as-code in a significant capacity.
Source: Styra, 2023.

Your challenge

Traditional processes are struggling to keep up.

  • The pace and volume of regulatory change is rising. 85% of executives say compliance requirements have become more complex (PwC, 2025), and nearly half of compliance professionals struggle to keep up with changes (Regology, 2025).
  • Gathering evidence and audit management are top challenges that add significant overhead. Vanta estimates that teams are losing four to five hours per week to manual monitoring and evidence collection that could be automated (Vanta, 2024).
  • Late-stage reviews bottleneck delivery. 81% of security reviews take over a business day, which creates unacceptable deployment bottlenecks and leads organizations to skip over them altogether (CrowdStrike, 2024).

As legacy processes struggle to keep pace with today's requirements, automation shifts from an operational nice-to-have to a core capability for maintaining both control and velocity.

44%

44% of compliance professionals have difficulty keeping up with regulatory changes.
Source: Regology, 2025.

48%

48% of CISOs list evidence gathering as a top challenge when implementing frameworks.
Source: The CISO Society, 2025.

54%

Just over half of major code changes get a full security review before deployment.
Source: CrowdStrike, 2024.

Common obstacles

Effective automation requires awareness and understanding.

  • Some leaders and team members lack awareness of PaC or may be resistant to change. Effective adoption requires stakeholder understanding and buy-in, but PaC remains a relatively niche topic that many stakeholders may be cautious or hesitant about.
  • Others may view PaC as a plug-and-play, policy enforcement panacea. Underestimating the scope and effort of PaC initiatives leads to rushed pilots that overlook the critical readiness components that are necessary for effective and scalable adoption.
  • Lack of readiness leads to a lack of progress. Even if some implementation progress is made, a lack of clear policy governance processes, team technical skills (e.g. authoring policies as code), and integration strategies can cause initiatives to stall or experience significant performance challenges.
88%

Most organizations report facing obstacles preventing them from using or scaling PaC.

26%

Over a quarter of organizations cite lack of PaC awareness as a key adoption barrier.

27%

27% of developers and technical decision-makers say writing efficient policies as code is a major performance challenge.
Source: Styra, 2023.

What is policy-as-code?

First, let's define "policy."

  • In the context of policy-as-code (PaC), a policy is a codified requirement. It defines explicit rules and conditions that must be true for an action to be allowed or denied and is expressed in a machine-readable format.
  • Many organizations create PaC policies mapped to external compliance frameworks. As such, vendors often offer pre-built policy packs to streamline policy creation and support alignment with these standards.
  • Compared to what is typically meant by "policy" in traditional governance, risk, and compliance, policies in PaC are specific, measurable, and enforceable through automation (e.g. All EC2 instances must have a "Name" tag.)

How do we codify policies?

  • Languages such as Rego, YAML, or Python are used to express policies as code; this code is stored in version-controlled repositories and is managed using standard SDLC processes such as testing or peer review.
  • Decoupling of policy logic from system logic allows policies to be easily reused and consistently enforced across diverse environments.

Policy-as-Code Definition

Policy-as-code (PaC) is a method of defining policies using code and evaluating that code with a policy engine that checks inputs against declared rules and returns an explicit decision, typically in real-time (e.g. allow, deny, warn). This method is used to embed dynamic, automated enforcement directly into operational and development workflows.

Related Terms: Security/Compliance-as-Code

While the terms security-as-code and compliance-as-code are often used interchangeably with PaC, they are sub-concepts under the broader PaC umbrella. Security-as-code is specifically focused on security controls and policies, while compliance-as-code is focused on codifying regulatory and compliance requirements.

Understand policy-as-code architecture

A picture showing examples of policy-as-code architecture

Policy frameworks or platforms, such as HashiCorp Sentinel or OPA Gatekeeper, typically offer some combination of a policy engine, a repository, and integrations together in a bundle that can be used to define, evaluate, and manage policies for a specific domain or system.

Some Common Misconceptions

"PaC can be applied to any policy."

Not all policies can (or should) be codified. Many policies are too ambiguous, context-dependent, or qualitative to express as code. Beyond codification, PaC also requires clear enforcement points where rules can be applied, and tooling is usually designed to work in several specific technical domains.

"There are vendor tools that provide a complete PaC solution."

While vendors provide platforms and frameworks to streamline PaC adoption, PaC is not plug-and-play. Organizations must still perform critical tasks such as defining enforcement points, designing and maintaining policies, managing integrations, and handling exceptions.

Assess readiness and value for policy-as-code

1. Define potential scope; 2. Assess value and readiness; 3. Select Path

Info-Tech Insight

Treating PaC as plug-and-play automation will create more problems than it solves. Effective PaC adoption begins with an evaluation of value and a multidimensional view of readiness that considers technical integration, governance, team skills, and metrics. This context is critical to determining whether PaC will deliver meaningful benefits to your organization or just add unexpected overhead.

Insight summary

Assess before you adopt

Treating PaC as plug-and-play automation will create more problems than it solves. Effective PaC adoption begins with an evaluation of value and a multidimensional view of readiness that considers technical integration, governance, team skills, and metrics. This context is critical to determining whether PaC will deliver meaningful benefits to your organization or just add unexpected overhead.

Clarify value to gain perspective

Since PaC adoption demands significant effort and alignment, potential value must be assessed alongside readiness to provide the perspective required for effective decision-making.

Look beyond technical capabilities

Effective PaC adoption hinges on the quality of your policies, policy governance structures, and team skills. Don't underestimate the importance of these components when assessing readiness.

Chart an informed path forward

Adopting PaC is not a binary decision. Leverage the information provided by your assessments to determine the right next steps for your organization.

Ground your expectations

Though the definition of PaC may seem broad, current tooling and integration strategies are designed around a handful of common use cases. Align your expectations with current capabilities.

Build cross-team ownership

Sharing ownership of the definition, implementation, and evolution of PaC across security, governance, platform, and development teams is essential to improving enforcement without impeding delivery.

Chart the right path toward value realization with automated policy management.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

Seva Ioussoufovitch

Contributors

  • Ernest Solomon, Field CTO, Pythian
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171