Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable fixes. Overview Common use cases Simple Startup Installation - Installation from pip - Installation from source code (development) Usage - Getting events - Permissions - Same account assets only, no SCPs - Cross-account assets and SCPs CLI Commands - Analyze - Get SCPs Output Format Output Fields - AccessDeniedReason: ResultDetails - PoliciesToAdd - ExplicitDenyPolicies Acknowledgements Appendices - Running AccessUndenied from a Lambda function - Setting up a venv - Getting CloudTrail events via the LookupEvents API with the CLI - Getting Cloudtrail events from the AWS Console's event history Example Cloudtrail event Least privilege AccessUndenied policy Overview Access Undenied analyzes AWS CloudTrail AccessDenied events, scans the environment to identify and explain the reasons for them, and offers actionable least-privilege remediation suggestions. Common use cases Sometimes, the new and more detailed AccessDenied messages provided by AWS will be sufficient. However, that is not always the case. Some AccessDenied messages do not provide details. Among the serv
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
A framework to analyze container images and gather useful information.
Automated script for creating a vulnerable Azure cloud lab to train offensive security skills.
Tool for assessing compliance and running vulnerability scans on Docker images.
An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.
A free training course and lab environment for learning to test and attack cloud infrastructure, including AWS and Azure.
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
Open-source project for detecting security risks in cloud infrastructure accounts with support for AWS, Azure, GCP, OCI, and GitHub.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.