Protocol // Foundational Cloud Synthesis

Direct Intent
To Architecture.

The agentic control plane for governed cloud infrastructure. Identity-driven RBAC, multi-stage approvals, continuous posture, immutable audit — behind one synthesis engine.

01 // Foundations

The Cloud
Unified.

Treat your entire cloud footprint as a singular, programmable entity. AWS, GCP, and Azure composed through one intent surface — agentic reasoning eliminates the friction of multi-provider management without leaky abstractions.

  • Provider-native HCL. Terraform you can read, fork, and own — never a transpilation layer you have to debug.
  • Identity-bound by default. Every project carries an immutable LOB binding — cross-tenant provisioning is rejected at authz, not after the fact.
  • Defense in depth. UI filter → API authz → Workload Identity Federation → cloud-native org policy. Four gates, one synthesis surface.

3

Hyperscalers

9

Capabilities

1

Surface

Cloud Substrate

AWS

us-east · eu-west

GCP

us-central · asia-se

Azure

eastus · westeu

Synthesis

Provider-native HCL

Plan · Approve · Apply · Audit

02 // Interface Bridge

End-to-End
With Intent.

Every request flows through five deterministic stages — from natural language to a verified, audit-trailed deployment. No manual handoffs.

01

Intent

Plain-English request captured and structured into a typed specification.

02

Synthesis

Agentic reasoning converts spec into provider-native infrastructure-as-code.

03

Policy

Compliance guardrails evaluate the plan against your governance rules.

04

Execution

Sandboxed agent applies Terraform with streaming, observable progress.

05

Audit

Immutable state and decision log persisted to your governance backbone.

Intent Spec HCL State Audit
03 // In Practice

One Sentence.
One Deployment.

The Brain translates engineering intent into deterministic IaC. The Muscle Agent applies it. Every step is observable and reversible.

  • Provider-native HCL — no leaky abstractions to maintain
  • Structured policy verdict before any apply
  • Streaming logs from plan through state-write
  • Approval gates routed to humans where you require them
Intent ↓

"Spin up a private VPC in us-central1 with a Cloud SQL Postgres replica, restrict ingress to my office IP, and ship audit logs to BigQuery."

Architecture ↓
resource "google_compute_network" "core" {
  name                    = "monowall-core"
  auto_create_subnetworks = false
}

resource "google_sql_database_instance" "primary" {
  name             = "monowall-pg"
  region           = "us-central1"
  database_version = "POSTGRES_16"
  settings {
    tier              = "db-custom-2-7680"
    availability_type = "REGIONAL"
  }
}

resource "google_logging_project_sink" "audit" {
  name        = "monowall-audit"
  destination = "bigquery.googleapis.com/.../audit_logs"
}
04 // Manifest

What The Wall
Holds.

A monolithic agent for cloud governance. Nine capabilities behind one identity-driven surface.

01

Multi-Cloud Synthesis

AWS, GCP, and Azure resources composed through a single intent surface — provider-native HCL, no leaky abstractions.

02

Blueprint Catalog

Vetted, parameterized recipes — Cloud SQL HA, GKE Autopilot, Vertex AI endpoints — with compliance and encryption baked in.

03

Tenancy Enforcement

Every project carries an immutable LOB binding. Cross-LOB provisioning rejected at the authz layer before any cloud call.

04

Approval Inbox

Multi-stage chains routed by role and scope. SLA timers, structured rejections, audit-trail-linked decisions.

05

JIT Access

Bounded-duration role elevation with stated reason. No standing admin grants. Auto-revokes on the clock.

06

Security Posture

Continuous CSPM scanning mapped to SOC 2, PCI-DSS, HIPAA, GDPR, ISO 27001, CIS GCP. Findings remediate through your approval chain.

07

Cost Intelligence

Budget tracking by LOB, project, env, service. Forecast, anomaly detection, FinOps gates on prod provisions.

08

Conversational Ops

Gemini-powered chat grounded in your scope. Numbers come from billing exports and audit records — never invented.

09

Immutable Audit

Every decision, state delta, and elevated action persisted with actor, scope, and outcome. Exportable for SOX / SOC 2 evidence.

05 // Posture

Continuous Trust.
Audit-Ready By Default.

Every project is scanned continuously against eight high-signal CSPM rules. Every action is written to an immutable, exportable audit log. Compliance evidence is a click, not a quarter-long project.

SOC 2

8 controls mapped

PCI-DSS

6 controls mapped

HIPAA

4 controls mapped

GDPR

3 controls mapped

ISO 27001

7 controls mapped

CIS GCP

6 controls mapped

Finding · Critical

Public Cloud Storage bucket

Cloud Storage buckets with allUsers grants expose data to the internet. Detected on gs://payments-fraud-reports.

SOC 2 PCI-DSS ISO 27001 GDPR CIS GCP
# Brain · proposed remediation
resource "google_storage_bucket_iam_binding" "public_remove" {
  bucket  = "payments-fraud-reports"
  role    = "roles/storage.objectViewer"
  members = []
}

Routes through approval chain: Tech Lead → Security → Apply. Auto-closes the finding on apply success.

Audit · Live Stream

Every action recorded.

  • 10:47:21

    carol@approval.granted

    Open ingress :443 retail-banking-prd

  • 10:38:44

    monowall-systemfinding.remediated

    Disk without CMEK · risk-models-prd

  • 10:31:08

    eve@provision.blocked

    Cross-LOB attempt · payments-ledger-prd

  • 10:22:53

    bob@jit.requested

    lob_admin · payments · 4h

  • 10:12:30

    alice@context.switch_lob

    → Risk & Markets

  • 09:58:14

    dave@blueprint.used

    Cloud SQL Postgres (HA) · ledger-stg-2

Exportable: JSON · CSV · indexed by actor, action, scope, time

8 CSPM rules

Public buckets, broad IAM, SA keys, missing CMEK, no flow logs, open SSH, public LB without WAF, missing audit sink.

Agentic remediation

Brain proposes the Terraform fix. Approval chain decides. Apply closes the finding. No human writes the patch.

Compliance evidence

Auditor logs in, exports filtered audit JSON or CSV — actor, action, resource, scope, outcome, IP, timestamp. SOC 2 ready.

06 // Governance

Built For The Enterprise.
Governed By Design.

Onboard hundreds of lines of business onto one synthesis surface. Each LOB gets isolated tenancy, scoped roles, tiered resource catalogs, and an approval chain that mirrors how your organization already changes infrastructure.

01

Tenancy

A Folder, Organizational Unit, or Management Group is provisioned per LOB at onboarding. Billing, IAM, and network are isolated by cloud-native boundaries — Monowall orchestrates above them.

  • GCP Folder per LOB
  • AWS OU per LOB
  • Azure Mgmt Group per LOB
  • Project / Account per app · env
02

Roles × Scope

Identity comes from your IdP — Workspace, Okta, Entra. Capabilities are derived, not selected. The same engineer is a Developer in Payments, an Auditor in Wealth, and nothing in Risk. Scopes nest: Org → LOB → App → Environment.

  • SSO · OIDC / SAML
  • Developer · Tech Lead · App Owner
  • LOB Cloud Admin · Security · Auditor
  • Platform Admin · FinOps
  • Multiple roles, multiple scopes
03

Tiered Approvals + JIT

Resources are catalogued by blast radius. T0 self-applies in dev. T2 production needs Security. T4 regulated routes through CAB. For exceptions, JIT Access grants bounded-duration elevation with a stated reason — auto-revoked.

  • T0 sandbox · auto · TTL
  • T1 standard · lead approve
  • T2 sensitive · + security
  • T3 networking / IAM · + platform
  • T4 regulated · + CAB
  • JIT · 1–12h · audit-trailed
Approval Lanes

Different rigor, same surface.

Development

4 stages
  1. 01

    Request

    Plain-English intent

  2. 02

    Policy

    Auto-evaluation

  3. 03

    Apply

    Auto-applied · TTL on resources

  4. 04

    Audit

    Streamed to log sink

T0 self-service. T1+ requires Tech Lead async approve.

Staging

5 stages
  1. 01

    Request

    Tracked work item required

  2. 02

    Tech Lead

    Approve scope & sizing

  3. 03

    Policy

    Compliance verdict

  4. 04

    Apply

    Streamed apply · canary mirror

  5. 05

    Audit

    Linked to Jira / SNOW

Pre-prod canary uses the same blueprint as prd at reduced sizing.

Production

9 stages
  1. 01

    Request

    Synthesizes ServiceNow CHG

  2. 02

    Tech Approval

    App Owner / Tech Lead

  3. 03

    Security

    Required for T2+

  4. 04

    Compliance

    Required for T4 regulated

  5. 05

    FinOps Gate

    Cost above LOB threshold

  6. 06

    CAB

    Normal change approval

  7. 07

    Freeze Check

    Org change-freeze respected

  8. 08

    Apply

    Rollback plan registered

  9. 09

    CMDB Update

    CIs written · CHG closed

Emergency changes route to E-CAB with abbreviated approval and post-hoc review.

ServiceNow Native

Your CAB stays where it is.
We integrate.

Production provisions synthesize a ServiceNow Change Request automatically — populated with the Terraform plan, cost estimate, affected CMDB CIs, and assignment group. Approvals flow through your existing CAB; Monowall waits, applies on green-light, and writes implementation notes back to the ticket.

  • Bidirectional sync over OAuth 2.0 client credentials
  • Standard / Normal / Emergency change classification
  • Apply failures auto-create linked Incidents
  • Provisioned resources written to cmdb_ci_cloud_*
Change Request · Synthesized
numberCHG0094217
categoryCloud Infrastructure
typeNormal
assignment_groupLOB-Payments-CloudOps
cmdb_ciapp.payments-ledger
u_monowall_provision_idprv_8f2a…
approver_chainTech Lead
Security
CAB
stateAwaiting CAB
07 // Agentic

Not a chatbot.
A control plane that reasons.

Conversational ops, agentic remediation, and natural-language policy authoring — all grounded in your scope. The model never invents; it answers from your audit, billing, and resource graph, or politely declines.

Conversational Ops

Ask. In your scope.

AC
Which production projects in payments are running anomalies?
Two anomalies on payments-prd projects:
mw-payments-fraud-prd · Compute · +127% over baseline
mw-payments-ledger-prd · Vertex AI · +84%
Both detected in the last 4 days. Want me to surface the projects in Cost Monitoring?

Scope-locked · model: gemini-1.5-flash · grounded in audit + billing

Agentic Remediation

Detect. Propose. Approve. Apply.

01

Detect

CSPM scan flags an open SSH 0.0.0.0/0 firewall rule on risk-models-dev.

02

Propose

Brain emits a Terraform diff: replace open ingress with IAP-tunnel-only pattern.

03

Approve

Routes through Tech Lead → Security via the same approval chain that gates every prod change.

04

Apply

On approve, plan + apply stream live. State written. Finding closes. Audit recorded.

Wiz, Lacework, and Prisma detect. Monowall closes the loop — same governance gating, no human writes the patch.

Grounded answers

Every fact comes from your bundle. The model is instructed to refuse when scope doesn't permit and never invents.

Identity-aware

Bob in Payments and Eve in Retail ask the same question and get different answers — each scoped to what their identity can see.

Closed-loop fixes

Findings → proposed HCL → approval → apply → audit. Same chain that governs human-initiated changes.

08 // Demo

Direct your cloud.
Mean it.

30 minutes with our team. We'll mirror your LOB structure, walk through approvals and posture in your own context, and answer the hard questions about scaling.

What you'll see

  • Tenancy walkthrough

    Folder / OU / Mgmt-Group binding to LOBs · workload identity setup

  • Live approval chain

    Tier 0 → Tier 4 · ServiceNow CHG synthesis · CAB integration

  • CSPM + agentic remediation

    8 rules · proposed Terraform fix · routed through your chain

  • Cost intelligence

    By-LOB / by-service / by-env breakdown · anomaly detection

  • Conversational ops

    Gemini grounded in your RBAC context — scope-locked, never invented

  • Audit & compliance evidence

    Searchable trail · JSON / CSV export · framework mapping

Trusted by teams running

120+

Lines of business

$840M

Cloud spend governed

99.9%

Approval SLA

Prefer email? Reach hello@monowall.ai. Security inquiries: security@monowall.ai.

Request a Demo

All fields marked * are required.

Cloud(s) in use
Select all that apply

Average response · < 4 business hours