Visual IAM attack graph for AWS. Instantly analyze permissions, detect privilege-escalation risks, and audit IAM roles — locally, securely.
-
Updated
Dec 18, 2025 - Python
Visual IAM attack graph for AWS. Instantly analyze permissions, detect privilege-escalation risks, and audit IAM roles — locally, securely.
Automated cloud-security detection and response framework for adaptive defense across AWS environments.
CIEM (Cloud Infrastructure Entitlement Management) platform for Zero Trust IAM - Excessive permissions detection, least-privilege scoring, and entitlement risk analysis
Hybrid architecture for Tally backup and NAS modernization using Amazon S3 (Intelligent-Tiering), Amazon FSx for Windows, IPSec VPN connectivity, and encrypted offsite backups with monitoring via SNS.
Schema-driven awesome list of cloud security guardrails powering cloudguardrail.com/tools
A curated list of cloud security tools for AWS, Azure, GCP, and Kubernetes
Serverless, event-driven AI news pipeline using Amazon Bedrock (Llama 3.2), Lambda, S3, and SNS. Delivers daily financial briefings with a focus on Least-Privilege IAM security and automated data governance.
OSINT-based threat intelligence assessment analyzing phishing, brand impersonation, and identity-centric risks affecting an IAM provider.
AI-powered cloud security policy analyzer that detects IAM misconfigurations, policy conflicts, and attack paths using graph reasoning.
How to accidentally hack into AWS through IAM misconfigurations
Securely backup Tally data with encrypted offsite storage, hybrid connectivity, and scalable file storage using AWS FSx and automated monitoring.
Add a description, image, and links to the iam-security topic page so that developers can more easily learn about it.
To associate your repository with the iam-security topic, visit your repo's landing page and select "manage topics."