Technology

How to Earn the Terraform Registry Partner Premier Badge

2026-05-03 10:20:34

Introduction

Building on the success of the basic Partner tag introduced in 2022, HashiCorp has launched a new Partner Premier tier for the Terraform Registry. This elevated status recognizes technology partners who go above and beyond in technical quality, security, and adoption of cutting-edge features. End users can instantly see which providers support advanced capabilities like Terraform search, ephemeral resources, and Terraform actions—core tools for managing Day 2 operations within the Terraform pipeline. This guide walks you through every requirement to qualify for the Partner Premier tag, from existing prerequisites to the new advanced criteria.

How to Earn the Terraform Registry Partner Premier Badge
Source: www.hashicorp.com

What You Need

Before you begin, ensure you have the following:

Step-by-Step Guide

Step 1: Secure the Existing Partner Tag

To be considered for Partner Premier, your provider must first hold the standard Partner tag. This tag was introduced in 2022 as part of the Terraform Partner Integration Program. If you haven’t yet obtained it, review the original criteria—typically involving provider stability, documentation, and community support. Once your provider is published and meets those baseline requirements, you can move to the next step.

Step 2: Generate and Include a Software Bill of Materials (SBOM)

The first new requirement is a Software Bill of Materials for your provider. An SBOM is a machine-readable inventory of all components, dependencies, and licenses used in your provider’s code. This enhances transparency and security, giving users confidence that your provider adheres to modern supply chain security practices.

How to add an SBOM:

For detailed instructions on SBOM generation, see the Tips section below.

Step 3: Implement at Least One Advanced Feature

Partner Premier requires your provider to support at least one of the following advanced features:

  1. Ephemeral resources – Resources that exist only during a Terraform run, enhancing security (e.g., temporary credentials).
  2. Terraform search – Allows users to search across provider resources and data sources natively in the Terraform Registry.
  3. Terraform actions – Preset operations that extend CRUD (Create, Read, Update, Delete) to handle common Day 2 tasks, such as rebooting servers or taking snapshots.

These features were announced at HashiConf 2025 and must be built directly into your provider. Choose the feature that best aligns with your users’ needs and your own development roadmap. For example, if your provider manages infrastructure lifecycles, implementing Terraform actions can automate tasks like configuration saves (as demonstrated by Cisco’s IOS and NX-OS integrations).

Step 4: Validate Your Provider Against Security and Quality Standards

Even if you meet the technical checklist, the Partner Premier tier demands a high commitment to security best practices. Ensure your provider:

Consider performing a security audit and documenting the results. This step isn’t explicitly listed in the requirements table, but the program emphasizes transparency and verifiable components.

Step 5: Submit for Premier Tag Review

Once your provider has the SBOM and at least one advanced feature, you can apply for the Partner Premier tag. The exact submission process may involve contacting HashiCorp through the Partner Program portal or opening a review request. Expect a verification process that checks both the SBOM and the implemented feature against Registry standards.

After approval, your provider will display the Partner Premier badge on its Registry page. End users will be able to filter by this tag to find providers that deliver enhanced security, deeper control, and imperative workflows beyond basic CRUD.

Tips for Success

By following these steps, you’ll not only earn the Partner Premier tag but also provide your users with a more secure, capable, and trusted Terraform provider.

Explore

From COP Stalemate to Action: A Guide to the Colombia Fossil Fuel Summit's Potential Python Releases Security Updates for Versions 3.9 Through 3.12 Ex-NSA Chief Chris Inglis Admits ‘Failure of Enculturation’ Led to Snowden Leaks; Warns CISOs of Insider Threats 13 Years Later GPD BOX: Compact Mini PC with Intel Panther Lake and PCIe 5.0 x8 External Expansion Tesla Moves to Quell HW3 Owner Uproar With Vague FSD V14 Lite Pledge for International Markets