Infrastructure as Code (IaC) has reshaped how teams build and manage systems. Configurations, policies, and access rules now live in version control. Deployment is automated. Changes are traceable. But the same trust and openness that make IaC powerful can also open a path for social engineering.
Social engineering in this context is not about guessing passwords or phishing emails. It’s about influencing the human link in the commit chain. A malicious actor can request a minor update to a Terraform file, a Kubernetes manifest, or a CI/CD config. The change might look harmless. It might even solve a real problem. Once merged, it can alter access controls, reroute traffic, or disable security checks.
An attack on Infrastructure as Code leverages process and psychology. Pull requests move fast. Review cycles are often compressed under delivery pressure. The attacker blends into developer culture. They sound helpful, they speak the language of the team, and they follow all visible rules of contribution. This masks intent until after the merge.