Best Practices and Implementation Tips

To wrap up use cases, here are some general best practices when using Firefly | Manage Your Cloud with Infrastructure-as-Code:

Implement Gradually

Introduce Firefly in phases. First, connect all accounts in read-only mode to get visibility. Next, enable policy scanning and educate teams on the findings (without enforcement). Then introduce guardrails in "monitor" mode (Flexible, with overrides). Finally, tighten to Strict for critical controls. This phased approach avoids overwhelming teams and allows process adjustment.

Engage All Stakeholders

Firefly is not just a DevOps tool or just a Sec tool – it's both and more. Create a cross-functional team (Dev, Ops, Sec, Finance) for the Firefly rollout. Each will have different interests (inventory for ops, policies for sec, cost for finance, automation for dev). Firefly can serve all, but align on priorities and share insights. For example, hold a monthly "cloud governance review" using Firefly dashboards involving all stakeholders.

Keep Firefly Data Current

Make it a practice that whenever a new cloud account, project, or integration comes up, it's added to Firefly immediately. The Support Matrix in Firefly docs shows what services are covered; check it when planning to use a new cloud feature – if unsupported, have a manual check for it until support is added. Also, update Firefly integration credentials if they rotate (so it never loses access). Basically, treat Firefly as a critical piece of your infrastructure – maintain its integrations with the same diligence as the infrastructure itself.

Leverage Firefly API and Automation

Firefly offers a REST API. Advanced teams use it to automate repetitive tasks. For example, after deploying a new stack, you might call Firefly API to get the list of unmanaged resources and automatically open codification PRs. Or integrate Firefly with chatops: e.g., query Firefly from Slack ("/firefly get drift count") via an API call. Best Practice: Integrate Firefly's data into your existing workflows and tools. If you use ServiceNow, ensure Firefly's ServiceNow integration populates the CMDB and incidents. If you use Jira, use Firefly's Jira integration so that any violation can be turned into a Jira ticket with one click (and include Firefly's link for context).

Train the Teams

While Firefly's UI (and AI) is intuitive, invest in a short training for your teams. Show developers how to use Compose AI to get Terraform code (perhaps in a lunch & learn, have them actually generate and apply a small resource). Show security engineers how to write a custom Rego policy in Firefly. When teams understand the tool, they'll embrace it rather than feel it's an imposed watchdog.

Monitor Firefly Itself

Firefly is a SaaS (or could be on-prem for some). Ensure you monitor its status page or set up alerts if Firefly data collection is lagging. It's rare, but if Firefly misses an event due to an outage, you want to know. Also, keep an eye on any errors Firefly reports (e.g., if an integration key expires, Firefly UI will show integration in error – fix that promptly so you don't lose coverage).

Use Tags and Metadata Effectively

Firefly can filter and group by tags, so enforce a tagging strategy that aligns with your organizational needs (e.g., every resource has Environment, Application, and ComplianceCritical: yes/no). Then you can do powerful things like filter "ComplianceCritical = yes" and ensure absolutely no High/Critical violations exist on those resources.

Document and Share Successes

Internally, use Firefly's analytics (see next section) to demonstrate improvements – e.g., "We increased IaC coverage from 60% to 85% in 6 months, here's a graph." or "We reduced drift occurrences by 75% by using Firefly." This not only justifies the tool's value but also incentivizes teams to keep up the good work (gamify it a bit – perhaps reward teams that reach 100% IaC coverage or 0 violations for a quarter).

By following these best practices, you'll ensure that Firefly | Manage Your Cloud with Infrastructure-as-Code truly becomes a central part of your cloud management strategy, bringing agility with control, and not just a one-off tool.

Last updated

Was this helpful?