Identity Governance and Administration

Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.

Explore 28 curated cybersecurity tools, with 14,802+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Monokee Logo

Monokee is an identity orchestration and access management platform that provides visual, low-code tools for designing authentication workflows, managing digital identities, and implementing secure access controls across multiple domains.

0
SAP Cloud Identity Access Governance Logo

A cloud-based identity and access management solution that provides access governance, compliance monitoring, and risk management for hybrid environments.

0
Pathlock Logo

Pathlock is an identity security platform that provides compliance-focused governance, access management, and continuous controls monitoring across enterprise applications with particular emphasis on ERP systems.

0
Oasis Security - NHI Security Cloud Logo

A Non-Human Identity Management platform that provides discovery, security, and lifecycle management for machine identities across hybrid cloud environments.

0
Clutch Security Logo

A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.

0
Token Security Logo

A cloud-based platform that discovers, monitors, and manages non-human identities and their associated credentials across cloud infrastructure.

0
AWS IAM Access Analyzer Logo

AWS IAM Access Analyzer is a tool for implementing and maintaining least privilege access in AWS environments through automated analysis and validation of IAM policies and permissions.

0
Ploy Logo

A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.

0
Enumerate IAM Permissions Logo

A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.

0
Policy Sentry IAM Least Privilege Policy Generator Logo

Policy Sentry is an automated IAM policy generator that helps developers create least privilege AWS IAM policies through a template-based workflow.

0
AWS Lambda - IAM Access Key Disabler Logo

A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.

0
Aaia Logo

Aaia visualizes AWS IAM and Organizations data in Neo4j graph format to help identify security outliers and conduct privilege escalation analysis through Cypher queries.

0
IAM Zero Logo

IAM Zero detects identity and access management issues and automatically suggests least-privilege policies by analyzing application errors and access patterns in cloud environments.

0
IAMSpy Logo

IAMSpy is a library that uses the Z3 prover to analyze AWS IAM policies and query whether specific actions are allowed or denied.

0
Repokid Logo

Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.

0
AWS IAM Identity Center Logo

Centralized workforce identity management for AWS applications.

0
kube2iam Logo

kube2iam provides IAM credentials to Kubernetes containers by intercepting EC2 metadata API calls and retrieving temporary AWS credentials based on pod annotations.

0
AD Build Script Logo

An automated script that configures Active Directory domains using customizable XML configuration files.

0
Active Directory Control Paths Logo

A tool for analyzing and visualizing control relationships and privilege escalation paths within Active Directory environments using graph-based representations.

0
AWS IAM Policy Generator for AWS CDK Logo

A NodeJS/TypeScript library that generates IAM Policy Actions Statements for AWS services with predefined constants and factory classes for AWS CDK integration.

0
Kiam Logo

Kiam is a Kubernetes agent that allows Pods to assume AWS IAM roles, though it is being deprecated in favor of AWS' official IAM roles for Service Accounts solution.

0
OpenIAM Logo

OpenIAM offers a unified identity governance platform featuring CIAM, MFA, and PAM integration.

0
iam-policies-cli Logo

A CLI tool for generating AWS IAM policy documents, SAM policy templates, and SAM Connectors using JSON definitions from the AWS Policy Generator.

0
IAM Floyd Logo

IAM Floyd is a code generation tool that provides a fluent interface for creating AWS IAM policy statements with comprehensive service coverage and CDK integration support.

0