Confluent's Terraform provider has become integral to continuous integration pipelines in enterprises with over 3 million downloads since its release in June 2022. HashiCorp's Terraform enables changes to be made to Confluent infrastructure via declarative merge requests, a GitOps approach that provides enhanced security, improved collaboration, and increased operational efficiency. Policy-as-code is used to protect against deploying changes that violate organization's security and auditing requirements, with validation performed for every proposed change to ensure compliance with established policies. The Terraform plan phase generates a plan file in JSON format, which is then validated against established policies using HashiCorp's Sentinel. If the proposed plan meets all of the policies, Terraform can move on to the apply phase and automatically create the cluster, while policy violations trigger potential actions such as advisory, soft-mandatory, or hard-mandatory responses. By utilizing GitOps and policy-as-code, users can propose changes with confidence that they won't accidentally violate important security requirements.