# Welcome

## Abbey secures cloud infrastructure by enabling any engineer to automate user access directly in Terraform.&#x20;

***

### How Abbey Works

When it comes to employee access to cloud infrastructure, Workflows allow for definition of how someone should get access (who should approve), and Policies define whether someone should have access (or when access should be revoked).

Abbey is built for the Infrastructure engineer, allowing them to define both Workflows and Policies via the Abbey Terraform Provider. Any team can deploy Abbey quickly utilizing your existing Git repository, CI/CD pipeline, and Terraform orchestration system.

Infrastructure engineers can define how access should be granted and when access should be revoked, reducing their manual workload. End users get frictionless access. Security teams can rest easy knowing that a model of least privilege is being followed. And Compliance teams get an automated audit trail of all changes.

{% embed url="<https://www.youtube.com/watch?v=8aNHkpIFeKM>" fullWidth="false" %}
*Abbey in 3 minutes*
{% endembed %}

***

## Get Started

<table data-view="cards"><thead><tr><th align="center"></th><th align="center"></th><th data-hidden align="center"></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden align="center"></th><th data-hidden align="center"></th><th data-hidden></th></tr></thead><tbody><tr><td align="center"><mark style="color:blue;"><strong>Deploy Abbey in 30 Minutes</strong></mark></td><td align="center">Run a full end-to-end demo to see Abbey in action</td><td align="center"></td><td><a href="broken-reference">Broken link</a></td><td><a href="https://1502779850-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FudoTqG501gLo2MLzBG55%2Fuploads%2Fnr1rnilUh34khGk8TxQW%2FScreenshot%202023-09-05%20at%203.55.10%20PM.png?alt=media&#x26;token=fed7bfff-7a46-43b3-82be-bc2270447c27">Screenshot 2023-09-05 at 3.55.10 PM.png</a></td><td align="center"></td><td align="center"></td><td></td></tr><tr><td align="center"><p><mark style="color:blue;"><strong>Tutorials</strong></mark></p><p></p><p>Secure access to critical cloud infrastructure</p></td><td align="center"></td><td align="center"> <strong>GCP, AWS, Databricks, Snowflake, and more</strong></td><td><a href="getting-started/tutorials">tutorials</a></td><td><a href="https://1502779850-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FudoTqG501gLo2MLzBG55%2Fuploads%2FpzrhWApt5BHN3JJFnRlC%2FScreenshot%202023-09-05%20at%205.23.51%20PM.png?alt=media&#x26;token=4cf9414f-b642-46bb-b7f4-7ee0989b0c9a">Screenshot 2023-09-05 at 5.23.51 PM.png</a></td><td align="center"><mark style="color:purple;">Tutorials</mark></td><td align="center"><mark style="color:purple;"><strong>Tutorials</strong></mark></td><td></td></tr><tr><td align="center"><mark style="color:blue;"><strong>Explore Key Concepts</strong></mark></td><td align="center">Deep dive into Grant Kits, Workflows, and Policies to understand how we secure access at Abbey</td><td align="center"></td><td><a href="how-abbey-works/concepts">concepts</a></td><td><a href="https://1502779850-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FudoTqG501gLo2MLzBG55%2Fuploads%2Fc6mGL1EMPkK2PLSauZak%2FGrant_Kits__Request_Flow_(user_perspective)_Isoflow_Diagram_4_10_2023.png?alt=media&#x26;token=6b91347a-3e34-4fc5-bfae-e26784678c9b">Grant_Kits__Request_Flow_(user_perspective)_Isoflow_Diagram_4_10_2023.png</a></td><td align="center"></td><td align="center">Deep dive into Grant Kits, Workflows, and Policies</td><td></td></tr></tbody></table>

## Top Tutorials

<table data-view="cards"><thead><tr><th align="center"></th><th align="center"></th><th></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td align="center"><mark style="color:blue;"><strong>Databricks</strong></mark></td><td align="center">Managing Access to Managed Tables in Unity Catalog</td><td></td><td><a href="getting-started/tutorials/databricks-managing-access-to-managed-tables-in-unity-catalog">databricks-managing-access-to-managed-tables-in-unity-catalog</a></td></tr><tr><td align="center"><mark style="color:blue;"><strong>Google Cloud</strong></mark></td><td align="center">Managing Access to Groups</td><td></td><td><a href="getting-started/tutorials/google-cloud-managing-access-to-groups">google-cloud-managing-access-to-groups</a></td></tr><tr><td align="center"><mark style="color:blue;"><strong>AWS</strong></mark></td><td align="center">Secure Access to IAM Groups</td><td></td><td><a href="broken-reference">Broken link</a></td></tr></tbody></table>
