Atmos Pro Logo

Atmos Pro

ProductPricingDocsBlogChangelog
⌘K
Create Workspace
Atmos Pro Logo

Atmos Pro

ProductPricingDocsBlogChangelog
What is Atmos Pro?
Installation
How it Works
Workspaces
Authentication
Ordered Deployments
Deployment Approvals
Deployment Locking
Drift Detection
Event Triggers
Workflow Dispatches
Repository Permissions
Audit Log
Troubleshooting
Workspaces
Atmos Stacks
Atmos CI
Atmos Toolchain
Cloud Authentication
GitHub Repository
GitHub Workflows
GitHub Environments
Deployment Locking
Drift Detection
Webhooks
AWS
Reference
Atmos Docs
Example Repository
What is Atmos Pro?
Installation
How it Works
Workspaces
Authentication
Ordered Deployments
Deployment Approvals
Deployment Locking
Drift Detection
Event Triggers
Workflow Dispatches
Repository Permissions
Audit Log
Troubleshooting
Workspaces
Atmos Stacks
Atmos CI
Atmos Toolchain
Cloud Authentication
GitHub Repository
GitHub Workflows
GitHub Environments
Deployment Locking
Drift Detection
Webhooks
AWS
Reference
Atmos Docs
Example Repository

Deployment Approvals

Atmos Pro leverages GitHub Environments and deployment protection rules to require manual approval before infrastructure changes are applied.


Atmos Pro integrates with GitHub Environments to give your team control over when infrastructure changes are applied. By configuring deployment protection rules on your GitHub environments, you can require manual approval from designated reviewers before any Terraform apply runs.
This is especially important for production environments where infrastructure changes can have significant impact. With deployment approvals, your team gets an explicit gate between a successful plan and the actual apply — ensuring that changes are reviewed and approved by the right people before anything is provisioned.

GitHub Enterprise Required

Custom deployment protection rules — including required reviewers, wait timers, and branch restrictions on environments — are only available for repositories owned by GitHub Enterprise organizations. Public repositories on any plan can use environment protection rules, but private repositories require GitHub Enterprise.

With Deployment Approvals, you can:

Require manual approval before applying infrastructure changes

Designate specific reviewers for each environment

Enforce different approval policies per environment (e.g., staging vs production)

Leverage GitHub's built-in audit trail for all approvals

Deployment approvals are powered entirely by GitHub's native environment protection rules. Atmos Pro dispatches workflows that target GitHub environments, and GitHub enforces the protection rules you've configured.
  1. 1
    A developer merges a pull request containing infrastructure changes.
  2. 2
    Atmos Pro detects the merge and dispatches the configured apply workflows.
  3. 3
    Each workflow targets a specific GitHub environment (e.g., production, staging).
  4. 4
    If the environment has protection rules configured, GitHub pauses the workflow and notifies the designated reviewers.
  5. 5
    A reviewer approves (or rejects) the deployment directly in GitHub.
  6. 6
    Once approved, the workflow proceeds and Terraform apply runs.
  7. 7
    Atmos Pro tracks the workflow status and updates the PR comment accordingly.
Atmos Pro dispatches workflows and tracks their status — it does not implement its own approval mechanism. Approvals are handled entirely by GitHub, which means:
  • You configure protection rules in your GitHub repository settings, not in Atmos Pro.
  • Reviewers approve deployments through the GitHub UI, email notifications, or the GitHub mobile app.
  • GitHub maintains a complete audit trail of who approved what and when.
  • Your existing GitHub access controls and team structures apply.
This design keeps Atmos Pro focused on orchestration while leveraging GitHub's mature, well-understood approval infrastructure.
Deployment approvals are configured entirely through GitHub's native environment settings — there's nothing new to adopt. This keeps your audit surface small, works within your existing compliance tooling, and means your team manages approvals with the same GitHub UI they already know.
Configure GitHub Environments

Ready to configure deployment approvals?

Set up GitHub environment protection rules to require approval before infrastructure changes are applied.

Configure GitHub EnvironmentsGitHub Docs

Ordered DeploymentsDeployment Locking
Atmos Pro Logo

Atmos Pro

The fastest way to deploy your apps on AWS with Terraform and GitHub Actions.

GitHubTwitterLinkedInYouTubeSlack

For Developers

  • Quick Start
  • Example Workflows
  • Atmos Documentation

Community

  • Register for Office Hours
  • Join the Slack Community
  • Try our Newsletter

Company

  • About Cloud Posse
  • Security
  • Pricing
  • Blog
  • Media Kit

Legal

  • SaaS Agreement
  • Terms of Use
  • Privacy Policy
  • Disclaimer
  • Cookie Policy

© 2026 Cloud Posse, LLC. All rights reserved.

Checking status...