Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.
Identify AWS IAM permissions by brute-forcing API calls.
Securely store and access AWS credentials in a development environment.
A tool that generates least privilege IAM policies for AWS services
IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.
A library utilizing Z3 prover to analyze AWS IAM policies.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
Centralized workforce identity management for AWS applications.
Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.
An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.
Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.
A NodeJS/Typescript library for generating IAM Policy Actions Statements for AWS CDK with predefined constants and a factory class.
Tool for associating IAM roles to Pods in Kubernetes clusters.
OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.
AWS IAM Security Assessment tool for identifying violations of least privilege and generating risk-prioritized reports.
Tool for generating AWS IAM policy statements with a fluent interface.
A web service for easier AWS IAM permissions and credential management with various login methods and IAM Self-Service Wizard.
AirIAM is an AWS IAM to least privilege Terraform execution framework that compiles AWS IAM usage and leverages that data to create a least-privilege IAM Terraform.
Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.
CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.