Pulumi

Pulumi

Open-source IaC platform for multi-cloud deployments

About Pulumi

Simplify's Rating
Why Pulumi is rated
B-
Rated B on Competitive Edge
Rated B on Growth Potential
Rated C on Differentiation

Industries

Data & Analytics

Enterprise Software

Company Size

51-200

Company Stage

Series C

Total Funding

$106.5M

Headquarters

Seattle, Washington

Founded

2017

Overview

Pulumi provides an open-source infrastructure as code platform that lets developers and IT teams define cloud resources in familiar programming languages like JavaScript, TypeScript, Python, Go, and C#. It supports AWS, Azure, Google Cloud, and Kubernetes, enabling multi-cloud and Kubernetes-based workflows. Users define resources in code, then Pulumi plans and applies changes while tracking state across providers and integrating with CI/CD pipelines. The core product is free and open-source, with paid features for security, governance, and collaboration for larger deployments alongside enterprise support.

Simplify Jobs

Simplify's Take

What believers are saying

  • IaC market grows to $218.2B by 2028 at 15.2% CAGR.
  • AI DevOps market expands from $13.8B to $45.2B by 2030.
  • Kubernetes adoption reaches 71% among enterprises in 2025.

What critics are saying

  • OpenTofu v2.0 native Python/JS support draws users in 6-12 months.
  • CDK for Terraform v1.5 migrates 25% AWS/Azure users by 2027.
  • Neo generates 15% failing PRs, eroding enterprise trust in 3-6 months.

What makes Pulumi unique

  • Pulumi uses familiar languages like Python, TypeScript over HCL for IaC.
  • Pulumi Cloud integrates Neo AI for PR previews and remediation.
  • Pulumi Policies offer AI-powered Get Clean and Stay Clean governance.

Help us improve and share your feedback! Did you find this helpful?

Funding

Total Funding

$106.5M

Meets

Industry Average

Funded Over

5 Rounds

Notable Investors:
Series C funding is usually for startups that are doing well and are looking for more money to fuel major growth, such as acquiring other companies, expanding into global markets, or launching new product lines. Investors typically include larger venture capital firms and private equity.
Series C Funding Comparison
Below Average

Industry standards

$50M
$41M
Pulumi
$50M
Medium
$62M
SeatGeek
$100M
Oura

Benefits

Medical, dental, vision, & supplemental insurance

Unlimited PTO

Parental leave

Remote-first

Professional development & growth

Equity

Monthly wellness fund

Growth & Insights and Company News

Headcount

6 month growth

3%

1 year growth

5%

2 year growth

5%
Pulumi
Mar 9th, 2026
Expanded Version Control Support in Pulumi Cloud

Expanded Version Control support in Pulumi Cloud. Posted on Monday, Mar 9, 2026 Your version control provider shouldn't limit your infrastructure workflows. Pulumi Cloud now works with GitHub, GitHub Enterprise Server, Azure DevOps, and GitLab. Every team gets the same deployment pipelines, PR previews, and AI-powered change summaries regardless of where their code lives. Connect multiple providers and accounts. You can connect multiple VCS providers to a single Pulumi organization simultaneously, like GitHub, GitLab, and Azure DevOps all at once. You can also connect multiple accounts of the same provider, such as two separate GitHub organizations or two GitLab groups. This means teams that work across different repositories, providers, or organizational boundaries can manage everything from one place. GitHub Enterprise Server is currently limited to one connection per Pulumi organization. What your team can do. Deploy on every push. Connect a repository to a stack, and infrastructure deploys automatically when you push. Configure path filters to trigger only when relevant files change, and manage environment variables and secrets directly in Pulumi Cloud. No external CI/CD pipeline required. Preview changes on pull requests. Every pull request gets an infrastructure preview so reviewers can see exactly what will change before merging. The preview runs the same Pulumi operations your deployment would, giving your team confidence that a merge won't break anything. Neo explains your changes. Neo posts AI-generated summaries on your pull requests explaining what infrastructure changes mean in plain language. Reviewers who aren't Pulumi experts can still understand the impact of a change without reading resource diffs. Let Neo open pull requests for you. Ask Neo to make infrastructure changes and it opens pull requests directly against your connected repositories. Describe what you want in natural language, and Neo writes the code, opens the PR, and kicks off a preview, all without leaving Pulumi Cloud. Detect and fix drift. Schedule drift detection to catch out-of-band changes automatically. When someone modifies infrastructure outside of your Pulumi programs, drift detection flags the difference so your team can remediate before it causes issues. Secure authentication. Pulumi Cloud authenticates with your VCS provider using OIDC or OAuth so no long-lived credentials need to be stored. Short-lived tokens keep your deployment pipelines secure without manual secret rotation. Set up new projects from your VCS. The new project wizard discovers your organizations, repositories, and branches so you can scaffold and deploy a new stack without leaving Pulumi Cloud. Pick your repo, choose a branch, and you're ready to deploy. Getting started. * An org admin configures the integration under Settings > Version Control. * Authorize with your VCS provider. * Deploy infrastructure with first-class workflows.

Pulumi
Jan 15th, 2026
Introducing the new and improved ESC Editor

Introducing the new and improved ESC Editor. Pulumi ESC is Pulumi Cloud's centralized solution for managing secrets and configuration across every vault and cloud provider you use. It helps teams secure their configuration while adopting modern best practices like short-lived credentials with OIDC and automated secret rotation. Whether you're configuring Pulumi programs, powering applications and services, or managing credentials for tools like the AWS CLI, ESC provides a single, consistent way to do it safely and at scale. Behind the scenes, ESC integrates with multiple cloud providers and secret managers, supports composable environments, and offers rich built-in functions, from simple value transformations to encoding files as Base64. With this level of power, usability matters more than ever. That's why today Pulumi is introducing the new and improved Pulumi ESC Web Editor, designed to make managing secrets and configuration easier, faster, and more intuitive. Today, you can create and manage your Pulumi ESC configuration in multiple ways, such as using the CLI set and edit commands, or through its VS Code extension. For many users, however, their first experience with ESC happens in the Pulumi Cloud Console. Based on feedback from users of both its YAML Document view and Table view in the Console, Pulumi has been working hard to create a new and improved unified editor experience that makes ESC even easier to work with. One of the most notable improvements is a brand new Inspect tab that lets you easily edit secrets and gain deeper insights into your configuration. With this new UI, you can now freely switch between writing YAML and using rich UI elements to manipulate your environment - and the editor keeps everything in sync, with clear, in-context information about what you're doing and what's possible at every step. Adding and editing secrets. Adding secrets is now as simple as selecting Secret from the Add new menu. The Inspect tab lets you view and edit your secret securely, automatically encrypting it as ciphertext in your environment definition. No more worrying about accidentally exposing sensitive values! Using providers and built-in functions. ESC offers a large library of providers and built-in functions to use in your environment. The new editor makes discovering and using them effortless. When you add a provider or function, the editor inserts it with example values to get you started quickly. The Inspect tab provides instant access to documentation, so you can more easily configure the integrations. Exporting configurations. Consuming your configuration where you need it is now easier than ever. The Export menu in the Inspect sidebar lets you quickly expose values as Pulumi config for your stacks, or as environment variables in your shell. The new Pulumi ESC Editor brings together the best of both worlds: the power of the YAML editor with the ease of UI controls. Try it out today in the Pulumi Cloud Console and let Pulumi know what you think!

Pulumi
Nov 5th, 2025
New Compliance Packs for CIS, NIST, and PCI DSS

New compliance packs for CIS, NIST, and PCI DSS. Achieving compliance with industry standards such as CIS, NIST, or PCI DSS is a foundational step for every organization. Yet for many teams, it's often a manual, months-long process that involves interpreting controls, authoring custom policies, and validating configurations across multiple clouds. These challenges often slow progress toward a known and secure cloud state. Pulumi is changing that. To simplify this journey, Pulumi launched a new suite of pre-built compliance policy packs for CIS Controls v8.1, NIST SP 800-53 Rev. 5, and PCI DSS v4.0. These packs are your accelerator for the "Get Clean" journey, allowing you to enforce critical security and compliance baselines across your cloud infrastructure in minutes, not months. More than just detection: the complete governance lifecycle. Traditional security tools are reactive, scanning for problems after resources have been deployed. With Pulumi, these new compliance packs are the engine for an end-to-end governance lifecycle that integrates directly into your cloud operations. * Audit for Full Coverage: Run these packs in audit mode to scan your entire cloud estate, including resources managed by Pulumi and those created through other means. This gives you an instant, comprehensive view of your current compliance posture. * Triage and Remediate: When a pack finds a violation, the finding appears in the new Policy Findings hub. From there, your team can triage, assign, and track the issue through its entire lifecycle. And with its new AI-powered capabilities, you can assign the issue to Pulumi Neo to automatically generate a pull request with the fix. * Prevent Non-Compliance: Once your environment is clean, you use these same packs as preventative guardrails. By running them during pulumi up, you block non-compliant resources before they are ever created, ensuring you "Stay Clean." This tri-modal capability - Audit, Remediate, and Prevent - is uniquely powerful, allowing you to fix existing issues while stopping new ones from being introduced. New and expanded compliance packs. Its new policy packs provide extensive, out-of-the-box coverage for some of the most widely adopted security frameworks. They are authored and maintained by Pulumi experts and join its existing library to provide a comprehensive toolkit for cloud governance. Benefits of pre-built packs. * Accelerate Compliance: Implement comprehensive governance controls in minutes without authoring hundreds of policies from scratch. * Leverage Expert Knowledge: Packs are authored and maintained by Pulumi, incorporating deep expertise in cloud and the nuances of each framework. * Codify Controls for Audits: Demonstrate to auditors that specific compliance controls are consistently enforced through code, providing a clear evidence trail. * Reduce Risk Proactively: Catch common security risks and compliance violations before deployment, drastically reducing your organization's exposure. Get started today. These policy packs are available now and are the perfect way to begin your governance journey with Pulumi. To get started, head to the Policies page in your Pulumi Cloud organization and click on the All tab to find these new packs. Add them to an Audit Policy Group and run a scan. Within minutes, you'll see a complete picture of your compliance posture in the Policy Findings hub, ready for triage and remediation. Need a compliance pack for a standard that isn't listed here? Please let Pulumi know by raising a request on its GitHub repository. Try pulumi policies. New to Pulumi? Start your governance journey today. For complete documentation, visit its Policies documentation.

Pulumi
Nov 5th, 2025
Announcing the Next Generation of Pulumi Policies: AI-Accelerated Governance for the Cloud

Announcing the next generation of Pulumi Policies: ai-accelerated governance for the cloud. The era of AI-accelerated development has created a paradox: the faster developers move, the bigger the governance challenge becomes. For years, security and platform teams have worked to "shift left," but the tools available have been incomplete. Most focus on detection, which is necessary but not sufficient. They identify thousands of policy violations across an organization's infrastructure but leave teams with an overwhelming backlog and no scalable way to remediate it. This creates a persistent gap between finding a problem and fixing it. The result is an impossible choice between development velocity and organizational control, forcing leadership to slow down innovation to manage risk. Pulumi is thrilled to announce the next generation of Pulumi Policies, a comprehensive governance solution that moves beyond detection to deliver AI-powered remediation at scale. Pulumi is introducing a new lifecycle to secure your cloud: first, Get Clean by using AI to fix your existing policy violations. Second, Stay Clean by using policy as a universal guardrail that makes AI-driven development not just fast, but fundamentally safe. These are not strictly sequential steps; you can begin enforcing "Stay Clean" policies for all new infrastructure while you simultaneously work on the "Get Clean" process for your existing footprint. Part 1: Get Clean - From thousands of issues to a compliant state. The first step to a secure cloud is tackling the mountain of existing misconfigurations spread across your environments. First, gain complete visibility with the new Policy Findings Hub. To fix your issues, you first need to see them clearly. Pulumi has introduced a powerful Policy Findings Hub designed to give every stakeholder the exact view they need. * The Overview Tab: A high-level dashboard with compliance scores for leadership to track trends and measure your organization's posture. * The Compliance Tab: A control-centric view for auditors and infosec teams, grouping findings by policy (e.g., CIS, NIST) to simplify evidence gathering and prove compliance. * The Issues Tab: A collaborative workspace for platform and development teams to triage, assign, prioritize, and track the remediation of every policy issue. This hub is powered by its flexible audit capabilities. With Audit Scans for IaC Stacks, you can get an instant compliance baseline on all your existing Pulumi-managed infrastructure without blocking developers or re-deploying thousands of stacks. This is combined with discovery scans of your cloud accounts to give you a single, unified view of every resource, whether managed by Pulumi or not. The solution to remediation at scale: ai-powered fixes with Pulumi Neo. Visibility creates a new problem: an overwhelming backlog. Manually fixing thousands of issues is an impossible task. This is where Pulumi Neo provides a powerful solution. Pulumi Neo, its AI platform engineer, is now integrated directly into the Policy Findings hub to automate the most difficult part of the process: the fix itself. From the Issues tab, your teams can now select a group of policy issues, assign them to Neo, and trigger a remediation flow. * Analyze the non-compliant resources and the policies they are violating. * Understand the required configuration to make them compliant. * Generate a pull request with the exact code changes needed to fix the issues. Most powerfully, for an unmanaged resource discovered via a cloud scan, Neo will generate the code to import the resource into a Pulumi stack and apply the fix. This "Import and Fix" workflow transforms unmanaged infrastructure into governed, compliant code, turning a task that could take a developer hours into a simple review-and-merge process. Your teams can finally burn down their issue backlog and achieve a state of continuous compliance. Part 2: Stay Clean - The universal guardrail for humans and AI. Once you begin cleaning your environment, the next challenge is to stay clean. As AI accelerates infrastructure creation, you need robust guardrails to ensure it doesn't also accelerate the creation of security risks. The answer is Policy as Real Code. Pulumi Policies uses general-purpose languages like TypeScript and Python to create sophisticated guardrails that govern every change. To help you establish these controls immediately, Pulumi is launching a new suite of pre-built compliance packs authored and maintained by Pulumi experts. | Framework | AWS | Azure | Google Cloud | | CIS Controls v8.1 | | | NIST SP 800-53 Rev. 5 | / | / | | PCI DSS v4.0 | / | / | | HITRUST CSF v11.5 | | | Pulumi Best Practices | | These policies act as a universal guardrail for your entire organization by blocking non-compliant changes during pulumi up, before they are ever created. Learn more about its compliance packs. And now, you can even use Neo to author new policies. You can ask Neo in plain English to "create a policy that prevents overly permissive IAM roles," and it will generate the code for you. This creates a powerful, dynamic governance system where AI can help you build the very rules that then govern its own actions. If you then ask Neo to create an admin role, the deployment will be blocked by the policy it just helped write. This is how Pulumi make AI safe to go fast. A new era of collaboration. This "Get Clean, Stay Clean" lifecycle transforms how teams work together: * Platform Teams lead prevention by building real-code guardrails, proving their value with measurable compliance scores. * Security Teams drive the "Get Clean" process with continuous, non-blocking audit scans and use the Findings hub to manage compliance without slowing development. Governance that accelerates you. The age of AI-driven development demands AI-powered governance. With this new generation of Pulumi Policies, Pulumi is providing the essential infrastructure for platform engineering teams to not just survive, but thrive. You can finally build preventative guardrails that developers love, secure your cloud at scale, and transform governance from a blocker into a business accelerator. Learn more about Pulumi Insights & Governance capabilities. This powerful new experience is available today. Navigate to the Policies and Policy Findings tab in Pulumi Cloud to explore your new governance capabilities and meet the future of platform engineering.

Pulumi
Oct 13th, 2025
Pulumi ESC: Open Approvals

Pulumi ESC: Open Approvals. Many teams live with the fear that a production environment might be accidentally opened, exposing credentials or sensitive systems before anyone even notices. Pulumi is excited to announce a new feature for Pulumi ESC: Open approvals. A governance capability that lets organizations require review and sign-off before an environment is opened (i.e. activated or exposed). Expanding on its mission to enforce compliance and security without slowing teams down. You may recall that earlier this year Pulumi introduced Approvals for updates, which allows teams to require review and sign-off before applying modifications to environment configurations. Pulumi is now extending Pulumi ESC auditing and governance capabilities to enable Just in time (JIT) access control. Many organizations require more robust guardrails around when an environment becomes active or accessible. Open Approvals introduces a gate before environment activation, enforcing that every environment open is intentional, reviewed, and governed. Open Approvals introduces a gate before environment activation, enforcing that every environment open is intentional, reviewed, and governed. How it works. When configuring Approvals gates for your environments under Settings | Approval Rulesets, you can now gate Open actions in addition to Updates. From this very same UI, you can define the approvals requirements: * Number of required reviewers * Specific teams or individuals allowed to approve * Whether self-approval is permitted Once a ruleset is defined, all open operations in the corresponding environment will require to be approved before proceeding. To create an open request, users need to specify the approval duration, how long they need access after opening the environment, and a description explaining why access is needed. Approvals can be later review and approved from the Approvals tab. A request access can also be created from the CLI via the newly introdcued env open-request command. Closing notes. Open approvals expands on Pulumi ESC support for compliance and governance capability while Pulumi stay true to its goal: empower teams to move fast while staying secure and compliant: no matter where or how changes happen. Pulumi is excited about what's ahead and look forward to building it together with your feedback.

Recently Posted Jobs

Sign up to get curated job recommendations

Pulumi is Hiring for 6 Jobs on Simplify!

Find jobs on Simplify and start your career today

Don't see your dream role? Check out thousands of other roles on Simplify. Browse all jobs →