Identity, Access, and Credential Management
iam

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Ploy Logo

Ploy

0 (0)

A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.

Securely store and access AWS credentials in a development environment.

A tool that generates least privilege IAM policies for AWS services

IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.

IAMSpy Logo

IAMSpy

0 (0)

A library utilizing Z3 prover to analyze AWS IAM policies.

Repokid Logo

Repokid

0 (0)

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Centralized workforce identity management for AWS applications.

Redirects EC2 metadata API traffic to a container that retrieves temporary AWS credentials and proxies other calls to the EC2 metadata API.

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.

A NodeJS/Typescript library for generating IAM Policy Actions Statements for AWS CDK with predefined constants and a factory class.

Kiam Logo

Kiam

0 (0)

Tool for associating IAM roles to Pods in Kubernetes clusters.

OpenIAM Logo

OpenIAM

0 (0)

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

AWS IAM Security Assessment tool for identifying violations of least privilege and generating risk-prioritized reports.

Tool for generating AWS IAM policy statements with a fluent interface.

A web service for easier AWS IAM permissions and credential management with various login methods and IAM Self-Service Wizard.

AirIAM Logo

AirIAM

0 (0)

AirIAM is an AWS IAM to least privilege Terraform execution framework that compiles AWS IAM usage and leverages that data to create a least-privilege IAM Terraform.

Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.

CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.