A perfect plan for every stage of your cloud journey.
Contact us for the best quote possible.
Chart your course with our rapid assessment tool for IaC coverage and drift risk up to 10k cloud resources.
Active Environments
Platform
$49 per day
Limits
What it includes
Command control with our cloud provisioning toolbox. Get self-service, governance, and automation for maturing enterprises running up to 100 environments.
Active Environments
$1 per Environment per day
Platform
Starting at $49 per day
Limits
What it includes
Run at scale with our cloud acceleration platform, powered by AI, delivering end-to-end control for sophisticated enterprises running 100 environments or more.
Active Environments
$1 per Environment per day
Platform
Starting at $99 per day
Limits
What it includes
Active Environments
$1 per Environment per day
$1 per Environment per day
Platform
$49 per day
Starting at $49 per day
Starting at $99 per day
Limits
What it includes
Active Environments
Cloud Resources
Concurrent Runs
Users
Monthly Deployments
Monthly Run Minutes
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
IaC Automation and GitOps
GitOps Workflows
Deploy from PR Comments
Custom Flows
Workflows
Self-hosted Source Control
(inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Drift Remediation: Update your cloud
Drift Remediation: Update your code
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Analytics & Insights
Monitoring Dashboards
Deployment & Audit Log Forwarding
Audit Logs
Cloud Analyst (AI-powered insights)
AI Summary
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
IDP
FinOps
Observability
PAC/SAST
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
env0 POC Guarantee
Active Environments
Cloud Resources
Concurrent Runs
Users
Monthly Deployments
Monthly Run Minutes
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
IaC Automation and GitOps
GitOps Workflows
Deploy from PR Comments
Custom Workflows
Workflows
Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Drift Remediation: Update your cloud
Drift Remediation: Update your code
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Analytics & Insights
Monitoring Dashboards
Deployment Log Forwarding
Audit Logs
Cloud Analyst (AI-powered insights)
AI Summary
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
IDP
FinOps
Observability
PAC/SAST
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
env0 POC Guarantee
Active Environments
Cloud Resources
Concurrent Runs
Users
Monthly Deployments
Monthly Run Minutes
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
IaC Automation and GitOps
GitOps Workflows
Deploy from PR Comments
Custom Workflows
Workflows
Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Drift Remediation: Update your cloud
Drift Remediation: Update your code
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Analytics & Insights
Monitoring Dashboards
Deployment & Audit Log Forwarding
Audit Logs
Cloud Analyst (AI-powered insights)
AI Summary
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
IDP
FinOps
Observability
PAC/SAST
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
env0 POC Guarantee
Active Environments
Cloud Resources
Concurrent Runs
Users
Monthly Deployments
Monthly Run Minutes
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
IaC Automation and GitOps
GitOps Workflows
Deploy from PR Comments
Custom Workflows
Workflows
Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Drift Remediation: Update your cloud
Drift Remediation: Update your code
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Analytics & Insights
Monitoring Dashboards
Deployment & Audit Log Forwarding
Audit Logs
Cloud Analyst (AI-powered insights)
AI Summary
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
IDP
FinOps
Observability
PAC/SAST
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
env0 POC Guarantee
Environments on env0 are defined by Infrastructure-as-Code templates. env0 has native support for Terraform and Terragrunt as an IaC framework, so this means that each environment is equivalent to one Terraform workspace.
An "active environment" is any environment that is managed through env0 that is currently running. Environments that have been destroyed or been manually marked as “Inactive” don't count towards your active environments.
A deployment is counted whenever a successful Terraform Apply occurs. It does not include PR plan, Drift Detections, or Destroy.
env0 is not a cloud provider. Deployed environments will run on your own cloud account that you specify via the Terraform code, and whatever credentials you supply during deployment. env0 simply manages the lifecycle of the underlying resources.
Yes, env0 can be used to manage production environments. We recommend that you use env0 to manage both your development environments AND your production environments, keeping your deployment process as identical as possible. env0 provides advanced RBAC and configuration management capabilities, allowing you to use a single IaC codebase, to deploy to both development and production - just like you do with your application code.
No. env0 works with CloudFormation, Pulumi, and Kubernetes, too. And with env0 custom flows you can run anything you want at any point in the deployment process. When you are creating, updating, and destroying your environments, you can run Ansible, kubectl, the AWS CLI, your application code... to name a few possibilities. The extensibility possibilities are almost endless.
No, env0 is not limited to AWS, GCP, and Azure. Because env0 relies on Terraform to provision infrastructure, you can use any provider supported by Terraform, as well as 3rd party providers. These include other cloud providers such as IBM Cloud, VMWare, Oracle, and even specific managed solutions such as Auth0, Github and Netlify.
Before deploying your environment, env0 will inject custom tags into your Terraform code using Terratag. After the environment has been deployed, env0 queries the cloud provider’s API, using those custom tags, to get the actual costs of your running environments. This is not an estimation.
Yes. You can use OPA in your custom flow (env0.yml) file. Here is an example of validating the Terraform plan using Open Policy Agent. Native OPA support will be added soon!
Terraform state files can be stored in the built-in env0 remote backend, or in any other remote backend of your choosing.
Yes! Our most recent SOC 2 Type II report was completed in 2023 and a copy is available upon request from your account manager.
env0 can be delivered in 2 ways - Full SaaS offering and a Hybrid SaaS + Self-Hosted Agent offering. Self-Hosted Agent is supported on our Business and Enterprise tiers.