Simple Pricing for
Ease-of-Scale

Basic

Free

Enterprise

Custom

Unlimited Concurrent Runs

Active Environments Included

2
Unlimited
Unlimited

Number of Users

3
Unlimited

Monthly Deployments

50
Custom

Monthly Run Minutes

500
2,500
Custom

IaC Automation and GitOps

Atlantis Workflows/
PR Comments

Custom Flows

Automatic Drift Detection

Workflows

Self-hosted Source Control
(inc. Bitbucket, GitLab & GitHub)

Managed Self-Service

Environment Discovery

Slack/Teams and Email Notifications

Environment Scheduling

Environment Time to Live (TTL)

Custom TTL Policies

Remote Backend

Remote State Storage

Remote Plan

Remote Apply

Self-hosted Remote State

Cost Management

Cost Estimation (via Infracost)

Actual Cost Visibility

Centralized Cost Tagging Controls

Cost Alerts

Budget Thresholds

Cloud Compass

IaC Coverage Tracking

Risk Assessment

IaC Code Generator

VIsibility

Monitoring Dashboards

Deployment Log Forwarding

Audit Logs

Private Registry

Private Module Registry

Private Provider Registry

Module Testing

Access Controls

Role-Based Access Control

OIDC

SAML Integration

Team Synchronization from SAML

Environment-Level Access

Custom RBAC Roles

Governance & Compliance

Custom Approval Policies

Access to SOC 2 Report

Self-hosted Agent

Extensibility

API Keys

Plugins

Terraform/OpenTofu Provider

Support

Email Support

Guided POC

Dedicated CSM

Shared Slack/Teams Channel

Enterprise SLA

Unlimited Concurrent Runs

Active Environments Included

2

Number of Users

3

Monthly Deployments

50

Monthly Run Minutes

500

IaC Automation and GitOps

Atlantis Workflows/PR Comments

Custom Workflows

Automatic Drift Detection

Workflows

Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)

Managed Self-Service

Environment Discovery

Slack/Teams and Email Notifications

Environment Scheduling

Environment Time to Live (TTL)

Custom TTL Policies

Remote Backend

Remote State Storage

Remote Plan

Remote Apply

Self-hosted Remote State

Cost Management

Cost Estimation (via Infracost)

Actual Cost Visibility

Centralized Cost Tagging Controls

Cost Alerts

Budget Thresholds

Cloud Compass

IaC Coverage Tracking

Risk Assessment

IaC Code Generator

Visibility

Monitoring Dashboards

Deployment Log Forwarding

Audit Logs

Private Registry

Private Module Registry

Private Provider Registry

Module Testing

Access Controls

Role-Based Access Control

OIDC

SAML Integration

Team Synchronization from SAML

Environment-Level Access

Custom RBAC Roles

Governance & Compliance

Custom Approval Policies

Access to SOC 2 Report

Self-hosted Agent

Extensibility

API Keys

Plugins

Terraform/OpenTofu Provider

Support

Email Support

Guided POC

Dedicated CSM

Shared Slack/Teams Channel

Enterprise SLA

$
/mo

Unlimited Concurrent Runs

Active Environments Included

Unlimited

Number of Users

Monthly Deployments

Monthly Run Minutes

2,500

IaC Automation and GitOps

Atlantis Workflows/PR Comments

Custom Flows

Automatic Drift Detection

Workflows

Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)

Managed Self-Service

Environment Discovery

Slack/Teams and Email Notifications

Environment Scheduling

Environment Time to Live (TTL)

Custom TTL Policies

Remote Backend

Remote State Storage

Remote Plan

Remote Apply

Self-hosted Remote State

Cost Management

Cost Estimation (via Infracost)

Actual Cost Visibility

Centralized Cost Tagging Controls

Cost Alerts

Budget Thresholds

Cloud Compass

IaC Coverage Tracking

Risk Assessment

IaC Code Generator

Visibility

Monitoring Dashboards

Deployment Log Forwarding

Audit Logs

Private Registry

Private Module Registry

Private Provider Registry

Module Testing

Access Controls

Role-Based Access Control

OIDC

SAML Integration

Team Synchronization from SAML

Environment-Level Access

Custom RBAC Roles

Governance & Compliance

Custom Approval Policies

Access to SOC 2 Report

Self-hosted Agent

Extensibility

API Keys

Plugins

Terraform/OpenTofu Provider

Support

Email Support

Guided POC

Dedicated CSM

Shared Slack/Teams Channel

Enterprise SLA

Unlimited Concurrent Runs

Active Environments Included

Unlimited

Number of Users

Unlimited

Monthly Deployments

Custom

Monthly Run Minutes

Custom

IaC Automation and GitOps

Atlantis Workflows/PR Comments

Custom Workflows

Automatic Drift Detection

Workflows

Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)

Managed Self-Service

Environment Discovery

Slack/Teams and Email Notifications

Environment Scheduling

Environment Time to Live (TTL)

Custom TTL Policies

Remote Backend

Remote State Storage

Remote Plan

Remote Apply

Self-hosted Remote State

Cost Management

Cost Estimation (via Infracost)

Actual Cost Visibility

Centralized Cost Tagging Controls

Cost Alerts

Budget Thresholds

Cloud Compass

IaC Coverage Tracking

Risk Assessment

IaC Code Generator

Visibility

Monitoring Dashboards

Deployment Log Forwarding

Audit Logs

Private Registry

Private Module Registry

Private Provider Registry

Module Testing

Access Controls

Role-Based Access Control

OIDC

SAML Integration

Team Synchronization from SAML

Environment-Level Access

Custom RBAC Roles

Governance & Compliance

Custom Approval Policies

Access to SOC 2 Report

Self-hosted Agent

Extensibility

API Keys

Plugins

Terraform/OpenTofu Provider

Support

Email Support

Guided POC

Dedicated CSM

Shared Slack/Teams Channel

Enterprise SLA

Mailo

Frequently Asked Questions

How is an environment defined?

Environments on env0 are defined by Infrastructure-as-Code templates. env0 has native support for Terraform and Terragrunt as an IaC framework, so this means that each environment is equivalent to one Terraform workspace.

What counts as an "active environment"?

An "active environment" is any environment that is managed through env0 that is currently running. Environments that have been destroyed or been manually marked as “Inactive” don't count towards your active environments.

What counts as a “deployment”?

A deployment is counted whenever a successful Terraform Apply occurs. It does not include PR plan, Drift Detections, or Destroy.

Where do environments run?

env0 is not a cloud provider. Deployed environments will run on your own cloud account that you specify via the Terraform code, and whatever credentials you supply during deployment. env0 simply manages the lifecycle of the underlying resources.

Can env0 be used to manage production environments?

Yes, env0 can be used to manage production environments. We recommend that you use env0 to manage both your development environments AND your production environments, keeping your deployment process as identical as possible. env0 provides advanced RBAC and configuration management capabilities, allowing you to use a single IaC codebase, to deploy to both development and production - just like you do with your application code.

Is env0 just for Terraform and Terragrunt?

No. env0 works with CloudFormation, Pulumi, and Kubernetes, too. And with env0 custom flows you can run anything you want at any point in the deployment process. When you are creating, updating, and destroying your environments, you can run Ansible, kubectl, the AWS CLI, your application code... to name a few possibilities. The extensibility possibilities are almost endless.

Is env0 just for running environments on AWS/GCP/Azure?

No, env0 is not limited to AWS, GCP, and Azure. Because env0 relies on Terraform to provision infrastructure, you can use any provider supported by Terraform, as well as 3rd party providers. These include other cloud providers such as IBM Cloud, VMWare, Oracle, and even specific managed solutions such as Auth0, Github and Netlify.

How do you calculate the cost of an environment?

Before deploying your environment, env0 will inject custom tags into your Terraform code using Terratag. After the environment has been deployed, env0 queries the cloud provider’s API, using those custom tags, to get the actual costs of your running environments. This is not an estimation.

Does env0 support Policy-as-Code/OPA?

Yes. You can use OPA in your custom flow (env0.yml) file. Here is an example of validating the Terraform plan using Open Policy Agent. Native OPA support will be added soon!

Where do you store my state files?

Terraform state files can be stored in the built-in env0 remote backend, or in any other remote backend of your choosing.

Are you SOC2 compliant?

Yes! Our most recent SOC 2 Type II report was completed in 2023 and a copy is available upon request from your account manager.

Are you SaaS only?

env0 can be delivered in 2 ways - Full SaaS offering and a Hybrid SaaS + Self-Hosted Agent offering. Self-Hosted Agent is supported on our Business and Enterprise tiers.